<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:26:55.208209+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e80821d9-0200-465e-9a28-5204082cb470/export</id>
    <title>e80821d9-0200-465e-9a28-5204082cb470</title>
    <updated>2026-05-06T11:26:55.515762+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e80821d9-0200-465e-9a28-5204082cb470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29636", "type": "seen", "source": "https://t.me/cibsecurity/63128", "content": "\u203c CVE-2023-29636 \u203c\n\nCross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via the \"title\" field in the \"blog management\" page due to the the default configuration not using MyBlogUtils.cleanString.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e80821d9-0200-465e-9a28-5204082cb470/export"/>
    <published>2023-05-01T20:29:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8dce85fb-2c08-4429-895e-630f2f360a75/export</id>
    <title>8dce85fb-2c08-4429-895e-630f2f360a75</title>
    <updated>2026-05-06T11:26:55.515609+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8dce85fb-2c08-4429-895e-630f2f360a75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29637", "type": "seen", "source": "https://t.me/cibsecurity/63130", "content": "\u203c CVE-2023-29637 \u203c\n\nCross Site Scripting (XSS) vulnerability in Qbian61 forum-java, allows attackers to inject arbitrary web script or HTML via editing the article content in the \"article editor\" page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8dce85fb-2c08-4429-895e-630f2f360a75/export"/>
    <published>2023-05-01T20:29:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d44a38f4-9d18-4b26-b61d-936041e8cb9e/export</id>
    <title>d44a38f4-9d18-4b26-b61d-936041e8cb9e</title>
    <updated>2026-05-06T11:26:55.515449+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d44a38f4-9d18-4b26-b61d-936041e8cb9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29638", "type": "seen", "source": "https://t.me/cibsecurity/63132", "content": "\u203c CVE-2023-29638 \u203c\n\nCross Site Scripting (XSS) vulnerability in WinterChenS my-site before commit 3f0423da6d5200c7a46e200da145c1f54ee18548, allows attackers to inject arbitrary web script or HTML via editing blog articles.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d44a38f4-9d18-4b26-b61d-936041e8cb9e/export"/>
    <published>2023-05-01T20:29:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d407885f-9cee-4f4a-9414-42fbc2b2d7ec/export</id>
    <title>d407885f-9cee-4f4a-9414-42fbc2b2d7ec</title>
    <updated>2026-05-06T11:26:55.515295+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d407885f-9cee-4f4a-9414-42fbc2b2d7ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29635", "type": "seen", "source": "https://t.me/cibsecurity/63134", "content": "\u203c CVE-2023-29635 \u203c\n\nFile upload vulnerability in Antabot White-Jotter v0.2.2, allows remote attackers to execute malicious code via the file parameter to function coversUpload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d407885f-9cee-4f4a-9414-42fbc2b2d7ec/export"/>
    <published>2023-05-01T20:29:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b7c9463d-a2c0-4f9e-81b1-abb1331366e0/export</id>
    <title>b7c9463d-a2c0-4f9e-81b1-abb1331366e0</title>
    <updated>2026-05-06T11:26:55.515145+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b7c9463d-a2c0-4f9e-81b1-abb1331366e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29639", "type": "seen", "source": "https://t.me/cibsecurity/63135", "content": "\u203c CVE-2023-29639 \u203c\n\nCross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via editing an article in the \"blog article\" page due to the default configuration not utilizing MyBlogUtils.cleanString.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b7c9463d-a2c0-4f9e-81b1-abb1331366e0/export"/>
    <published>2023-05-01T20:29:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d6117e04-56e3-4e92-bf28-dcf79832df63/export</id>
    <title>d6117e04-56e3-4e92-bf28-dcf79832df63</title>
    <updated>2026-05-06T11:26:55.514981+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d6117e04-56e3-4e92-bf28-dcf79832df63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29632", "type": "seen", "source": "https://t.me/cibsecurity/65022", "content": "\u203c CVE-2023-29632 \u203c\n\nPrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-07T00:29:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d6117e04-56e3-4e92-bf28-dcf79832df63/export"/>
    <published>2023-06-07T00:29:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/76c24dcd-143e-4b45-8fbe-6e5ebb1ecefd/export</id>
    <title>76c24dcd-143e-4b45-8fbe-6e5ebb1ecefd</title>
    <updated>2026-05-06T11:26:55.514763+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "76c24dcd-143e-4b45-8fbe-6e5ebb1ecefd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2963", "type": "seen", "source": "https://t.me/cibsecurity/66829", "content": "\u203c CVE-2023-2963 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oliva Expertise Oliva Expertise EKS allows SQL Injection.This issue affects Oliva Expertise EKS: before 1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T18:40:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/76c24dcd-143e-4b45-8fbe-6e5ebb1ecefd/export"/>
    <published>2023-07-17T18:40:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/38b3016f-b744-4e26-a7b7-4fd0e038bb24/export</id>
    <title>38b3016f-b744-4e26-a7b7-4fd0e038bb24</title>
    <updated>2026-05-06T11:26:55.512627+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "38b3016f-b744-4e26-a7b7-4fd0e038bb24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29632", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/728", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29632\n\ud83d\udd39 Description: PrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php.\n\ud83d\udccf Published: 2023-06-06T00:00:00\n\ud83d\udccf Modified: 2025-01-08T15:45:09.714Z\n\ud83d\udd17 References:\n1. https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmspagebuilder.html", "creation_timestamp": "2025-01-08T16:21:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/38b3016f-b744-4e26-a7b7-4fd0e038bb24/export"/>
    <published>2025-01-08T16:21:07+00:00</published>
  </entry>
</feed>
