<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:41:31.329927+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ed135bb3-ff1b-49e0-a697-3ffbdf5e7fe0/export</id>
    <title>ed135bb3-ff1b-49e0-a697-3ffbdf5e7fe0</title>
    <updated>2026-05-04T13:41:31.649099+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ed135bb3-ff1b-49e0-a697-3ffbdf5e7fe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31183", "type": "seen", "source": "https://t.me/cibsecurity/63486", "content": "\u203c CVE-2023-31183 \u203c\n\nCybonet PineApp Mail Secure\u00c2\u00a0A reflected cross-site scripting (XSS) vulnerability was identified in the product, using an unspecified endpoint.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T00:42:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ed135bb3-ff1b-49e0-a697-3ffbdf5e7fe0/export"/>
    <published>2023-05-09T00:42:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f181b381-64c1-41dc-93b5-4e643a7c0dba/export</id>
    <title>f181b381-64c1-41dc-93b5-4e643a7c0dba</title>
    <updated>2026-05-04T13:41:31.648927+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f181b381-64c1-41dc-93b5-4e643a7c0dba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31181", "type": "seen", "source": "https://t.me/cibsecurity/63493", "content": "\u203c CVE-2023-31181 \u203c\n\nWJJ Software - InnoKB Server, InnoKB/Console 2.2.1 - CWE-22: Path Traversal\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T00:43:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f181b381-64c1-41dc-93b5-4e643a7c0dba/export"/>
    <published>2023-05-09T00:43:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8466f09b-4f14-4780-94a0-e1cd020b6e21/export</id>
    <title>8466f09b-4f14-4780-94a0-e1cd020b6e21</title>
    <updated>2026-05-04T13:41:31.648754+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8466f09b-4f14-4780-94a0-e1cd020b6e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31180", "type": "seen", "source": "https://t.me/cibsecurity/63516", "content": "\u203c CVE-2023-31180 \u203c\n\nWJJ Software - InnoKB Server, InnoKB/Console 2.2.1 - Reflected cross-site scripting (RXSS) through an unspecified request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T00:51:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8466f09b-4f14-4780-94a0-e1cd020b6e21/export"/>
    <published>2023-05-09T00:51:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a5fb495f-95b4-4269-ab32-948b4b0a22fb/export</id>
    <title>a5fb495f-95b4-4269-ab32-948b4b0a22fb</title>
    <updated>2026-05-04T13:41:31.648563+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a5fb495f-95b4-4269-ab32-948b4b0a22fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3118", "type": "seen", "source": "https://t.me/cibsecurity/66263", "content": "\u203c CVE-2023-3118 \u203c\n\nThe Export All URLs WordPress plugin before 4.6 does not sanitise and escape a parameter before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-10T20:24:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a5fb495f-95b4-4269-ab32-948b4b0a22fb/export"/>
    <published>2023-07-10T20:24:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/be03a801-589c-47af-9adb-7af5ef4034d6/export</id>
    <title>be03a801-589c-47af-9adb-7af5ef4034d6</title>
    <updated>2026-05-04T13:41:31.648360+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "be03a801-589c-47af-9adb-7af5ef4034d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31188", "type": "seen", "source": "https://t.me/cibsecurity/69984", "content": "\u203c CVE-2023-31188 \u203c\n\nMultiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505', Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506', and Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T14:17:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/be03a801-589c-47af-9adb-7af5ef4034d6/export"/>
    <published>2023-09-06T14:17:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9672047-56bf-41b9-9a14-65ad3a6a11db/export</id>
    <title>d9672047-56bf-41b9-9a14-65ad3a6a11db</title>
    <updated>2026-05-04T13:41:31.648033+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9672047-56bf-41b9-9a14-65ad3a6a11db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31189", "type": "seen", "source": "https://t.me/ctinow/201257", "content": "https://ift.tt/HhmAkWC\nCVE-2023-31189 | Intel Server Product OpenBMC prior 1.09 improper authentication (intel-sa-00922)", "creation_timestamp": "2024-03-06T12:11:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9672047-56bf-41b9-9a14-65ad3a6a11db/export"/>
    <published>2024-03-06T12:11:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c1e46c13-9065-452b-8824-4ee4289227e6/export</id>
    <title>c1e46c13-9065-452b-8824-4ee4289227e6</title>
    <updated>2026-05-04T13:41:31.645532+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c1e46c13-9065-452b-8824-4ee4289227e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31184", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1371", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-31184\n\ud83d\udd39 Description: ROZCOM client CWE-798: Use of Hard-coded Credentials\n\ud83d\udccf Published: 2023-05-30T00:00:00\n\ud83d\udccf Modified: 2025-01-13T19:53:19.153Z\n\ud83d\udd17 References:\n1. https://www.gov.il/en/Departments/faq/cve_advisories", "creation_timestamp": "2025-01-13T20:07:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c1e46c13-9065-452b-8824-4ee4289227e6/export"/>
    <published>2025-01-13T20:07:16+00:00</published>
  </entry>
</feed>
