<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T19:50:30.034147+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2272f660-3447-457e-a46a-183e2f180b74/export</id>
    <title>2272f660-3447-457e-a46a-183e2f180b74</title>
    <updated>2026-05-06T19:50:30.402333+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2272f660-3447-457e-a46a-183e2f180b74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30960", "type": "seen", "source": "https://t.me/cibsecurity/66317", "content": "\u203c CVE-2023-30960 \u203c\n\nA security defect was discovered in Foundry job-tracker that enabled users to query metadata related to builds on resources they did not have access to. This defect was resolved with the release of job-tracker 4.645.0. The service was rolled out to all affected Foundry instances. No further intervention is required.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T02:24:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2272f660-3447-457e-a46a-183e2f180b74/export"/>
    <published>2023-07-11T02:24:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6d91c2ba-f777-42c1-8aeb-8670cdfe37f4/export</id>
    <title>6d91c2ba-f777-42c1-8aeb-8670cdfe37f4</title>
    <updated>2026-05-06T19:50:30.402222+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6d91c2ba-f777-42c1-8aeb-8670cdfe37f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30963", "type": "seen", "source": "https://t.me/cibsecurity/66321", "content": "\u203c CVE-2023-30963 \u203c\n\nA security defect was discovered in Foundry Frontend which enabled users to perform Stored XSS attacks in Slate if Foundry's CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.229.0. The service was rolled out to all affected Foundry instances. No further intervention is required.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T02:24:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6d91c2ba-f777-42c1-8aeb-8670cdfe37f4/export"/>
    <published>2023-07-11T02:24:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/93706211-a353-40c6-ad7b-79ce56154133/export</id>
    <title>93706211-a353-40c6-ad7b-79ce56154133</title>
    <updated>2026-05-06T19:50:30.402134+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "93706211-a353-40c6-ad7b-79ce56154133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30962", "type": "seen", "source": "https://t.me/cibsecurity/70339", "content": "\u203c CVE-2023-30962 \u203c\n\nThe Gotham Cerberus service was found to have a stored cross-site scripting (XSS) vulnerability that could have allowed an attacker with access to Gotham to launch attacks against other users. This vulnerability is resolved in Cerberus 100.230704.0-27-g031dd58 .\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T22:23:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/93706211-a353-40c6-ad7b-79ce56154133/export"/>
    <published>2023-09-12T22:23:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/10855c00-057c-4dc4-ae4a-f7247a37897f/export</id>
    <title>10855c00-057c-4dc4-ae4a-f7247a37897f</title>
    <updated>2026-05-06T19:50:30.402038+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "10855c00-057c-4dc4-ae4a-f7247a37897f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30969", "type": "seen", "source": "https://t.me/cibsecurity/72932", "content": "\u203c CVE-2023-30969 \u203c\n\nThe Palantir Tiles1 service was found to be vulnerable to an API wide issue where the service was not performing authentication/authorization on all the endpoints.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-26T07:44:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/10855c00-057c-4dc4-ae4a-f7247a37897f/export"/>
    <published>2023-10-26T07:44:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e1c92319-5eda-4c9c-8068-90429794b346/export</id>
    <title>e1c92319-5eda-4c9c-8068-90429794b346</title>
    <updated>2026-05-06T19:50:30.401909+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e1c92319-5eda-4c9c-8068-90429794b346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30967", "type": "seen", "source": "https://t.me/cibsecurity/72933", "content": "\u203c CVE-2023-30967 \u203c\n\nGotham Orbital-Simulator service prior to 0.692.0 was found to be vulnerable to a Path traversal issue allowing an unauthenticated user to read arbitrary files on the file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-26T07:44:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e1c92319-5eda-4c9c-8068-90429794b346/export"/>
    <published>2023-10-26T07:44:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/40108068-5d33-42d4-8372-7b6926e479cf/export</id>
    <title>40108068-5d33-42d4-8372-7b6926e479cf</title>
    <updated>2026-05-06T19:50:30.401729+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "40108068-5d33-42d4-8372-7b6926e479cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30968", "type": "seen", "source": "https://t.me/ctinow/206160", "content": "https://ift.tt/lgdAUFQ\nCVE-2023-30968", "creation_timestamp": "2024-03-12T21:22:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/40108068-5d33-42d4-8372-7b6926e479cf/export"/>
    <published>2024-03-12T21:22:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/39fbf34c-b023-40a2-ae23-2fd939676970/export</id>
    <title>39fbf34c-b023-40a2-ae23-2fd939676970</title>
    <updated>2026-05-06T19:50:30.401314+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "39fbf34c-b023-40a2-ae23-2fd939676970", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30968", "type": "seen", "source": "https://t.me/ctinow/206172", "content": "https://ift.tt/lgdAUFQ\nCVE-2023-30968", "creation_timestamp": "2024-03-12T21:26:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/39fbf34c-b023-40a2-ae23-2fd939676970/export"/>
    <published>2024-03-12T21:26:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5c3142e6-fd5c-43f4-81bc-f96d56d0bcbb/export</id>
    <title>5c3142e6-fd5c-43f4-81bc-f96d56d0bcbb</title>
    <updated>2026-05-06T19:50:30.396939+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5c3142e6-fd5c-43f4-81bc-f96d56d0bcbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30967", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxnbzzf6wjn2", "content": "", "creation_timestamp": "2025-08-30T19:18:33.116642Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5c3142e6-fd5c-43f4-81bc-f96d56d0bcbb/export"/>
    <published>2025-08-30T19:18:33.116642+00:00</published>
  </entry>
</feed>
