<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T08:59:54.187268+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/98c2f9af-0509-4bbf-bf4e-83a7415893f8/export</id>
    <title>98c2f9af-0509-4bbf-bf4e-83a7415893f8</title>
    <updated>2026-05-06T08:59:54.477664+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "98c2f9af-0509-4bbf-bf4e-83a7415893f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30789", "type": "seen", "source": "https://t.me/cibsecurity/63527", "content": "\u203c CVE-2023-30789 \u203c\n\nMonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/work` endpoint and job and company parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T00:54:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/98c2f9af-0509-4bbf-bf4e-83a7415893f8/export"/>
    <published>2023-05-09T00:54:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/85196cd1-ebcf-499e-9205-7c442ef52007/export</id>
    <title>85196cd1-ebcf-499e-9205-7c442ef52007</title>
    <updated>2026-05-06T08:59:54.477583+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "85196cd1-ebcf-499e-9205-7c442ef52007", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30780", "type": "seen", "source": "https://t.me/cibsecurity/64391", "content": "\u203c CVE-2023-30780 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in TheGuideX User IP and Location plugin &amp;lt;=\u00c2\u00a02.2 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-18T14:32:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/85196cd1-ebcf-499e-9205-7c442ef52007/export"/>
    <published>2023-05-18T14:32:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e1825327-96ac-4c1a-9982-030c74b54b20/export</id>
    <title>e1825327-96ac-4c1a-9982-030c74b54b20</title>
    <updated>2026-05-06T08:59:54.477500+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e1825327-96ac-4c1a-9982-030c74b54b20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30784", "type": "seen", "source": "https://t.me/cibsecurity/68623", "content": "\u203c CVE-2023-30784 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Kaya Studio Kaya QR Code Generator plugin &amp;lt;=\u00c2\u00a01.5.2 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-16T14:41:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e1825327-96ac-4c1a-9982-030c74b54b20/export"/>
    <published>2023-08-16T14:41:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/06e1c8b3-0473-4679-9df6-ac43b4a67dc7/export</id>
    <title>06e1c8b3-0473-4679-9df6-ac43b4a67dc7</title>
    <updated>2026-05-06T08:59:54.477402+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "06e1c8b3-0473-4679-9df6-ac43b4a67dc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30782", "type": "seen", "source": "https://t.me/cibsecurity/68624", "content": "\u203c CVE-2023-30782 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in Andy Moyle Church Admin plugin &amp;lt;=\u00c2\u00a03.7.5 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-16T14:41:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/06e1c8b3-0473-4679-9df6-ac43b4a67dc7/export"/>
    <published>2023-08-16T14:41:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3211ca21-8640-4439-ba31-2c357bc07fc9/export</id>
    <title>3211ca21-8640-4439-ba31-2c357bc07fc9</title>
    <updated>2026-05-06T08:59:54.477326+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3211ca21-8640-4439-ba31-2c357bc07fc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30785", "type": "seen", "source": "https://t.me/cibsecurity/68628", "content": "\u203c CVE-2023-30785 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Video Grid plugin &amp;lt;=\u00c2\u00a01.21 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-16T14:47:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3211ca21-8640-4439-ba31-2c357bc07fc9/export"/>
    <published>2023-08-16T14:47:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a56cbbc-d56b-47c2-83fc-c63749175cc1/export</id>
    <title>4a56cbbc-d56b-47c2-83fc-c63749175cc1</title>
    <updated>2026-05-06T08:59:54.477247+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a56cbbc-d56b-47c2-83fc-c63749175cc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30786", "type": "seen", "source": "https://t.me/cibsecurity/68630", "content": "\u203c CVE-2023-30786 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Benjamin Guy Captcha Them All plugin &amp;lt;=\u00c2\u00a01.3.3 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-16T14:50:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a56cbbc-d56b-47c2-83fc-c63749175cc1/export"/>
    <published>2023-08-16T14:50:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ea045c6a-77fc-4664-b646-e59ad1a0874e/export</id>
    <title>ea045c6a-77fc-4664-b646-e59ad1a0874e</title>
    <updated>2026-05-06T08:59:54.477164+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ea045c6a-77fc-4664-b646-e59ad1a0874e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3078", "type": "seen", "source": "https://t.me/cibsecurity/68766", "content": "\u203c CVE-2023-3078 \u203c\n\nAn uncontrolled search path vulnerability was reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-17T20:37:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ea045c6a-77fc-4664-b646-e59ad1a0874e/export"/>
    <published>2023-08-17T20:37:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9b223b3b-c5b0-4b18-bddf-c9906dc2fb6a/export</id>
    <title>9b223b3b-c5b0-4b18-bddf-c9906dc2fb6a</title>
    <updated>2026-05-06T08:59:54.477070+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9b223b3b-c5b0-4b18-bddf-c9906dc2fb6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30781", "type": "seen", "source": "https://t.me/cibsecurity/72527", "content": "\u203c CVE-2023-30781 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in Theme Blvd Tweeple plugin &amp;lt;=\u00c2\u00a00.9.5 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-18T18:33:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9b223b3b-c5b0-4b18-bddf-c9906dc2fb6a/export"/>
    <published>2023-10-18T18:33:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f248a45f-b800-4645-b7b4-23c998709d7a/export</id>
    <title>f248a45f-b800-4645-b7b4-23c998709d7a</title>
    <updated>2026-05-06T08:59:54.476926+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f248a45f-b800-4645-b7b4-23c998709d7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3078", "type": "seen", "source": "https://t.me/arpsyndicate/2413", "content": "#ExploitObserverAlert\n\nCVE-2023-3078\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-3078. An uncontrolled search path vulnerability was reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-04T02:56:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f248a45f-b800-4645-b7b4-23c998709d7a/export"/>
    <published>2024-01-04T02:56:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c9a0c39-d180-4358-b093-0807c4e2bb68/export</id>
    <title>8c9a0c39-d180-4358-b093-0807c4e2bb68</title>
    <updated>2026-05-06T08:59:54.473780+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c9a0c39-d180-4358-b093-0807c4e2bb68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30789", "type": "seen", "source": "Telegram/iOf1uBHdGjKRe0ts-6xpGDe4s7IKRbq92LJP7VvGncZJ2yPo", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c9a0c39-d180-4358-b093-0807c4e2bb68/export"/>
    <published>2025-02-06T02:40:19+00:00</published>
  </entry>
</feed>
