<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T06:55:15.040975+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fb1d46ce-bf17-4c59-b65b-dfbe42b50e3d/export</id>
    <title>fb1d46ce-bf17-4c59-b65b-dfbe42b50e3d</title>
    <updated>2026-05-06T06:55:15.381781+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fb1d46ce-bf17-4c59-b65b-dfbe42b50e3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3133", "type": "seen", "source": "https://t.me/cibsecurity/65920", "content": "\u203c CVE-2023-3133 \u203c\n\nThe Tutor LMS WordPress plugin before 2.2.1 does not implement adequate permission checks for REST API endpoints, allowing unauthenticated attackers to access information from Lessons that should not be publicly available.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fb1d46ce-bf17-4c59-b65b-dfbe42b50e3d/export"/>
    <published>2023-07-04T12:28:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4eba7a4c-3e98-4fe4-b51d-298c4fcd4a5b/export</id>
    <title>4eba7a4c-3e98-4fe4-b51d-298c4fcd4a5b</title>
    <updated>2026-05-06T06:55:15.381699+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4eba7a4c-3e98-4fe4-b51d-298c4fcd4a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31339", "type": "seen", "source": "https://t.me/cvedetector/3051", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31339 - AMD Zynq UltraScale+ MPSoC/RFSoC Out-of-Bound Read\", \n  \"Content\": \"CVE ID : CVE-2023-31339 \nPublished : Aug. 13, 2024, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Improper input validation in ARM\u00ae Trusted Firmware used in AMD\u2019s Zynq\u2122 UltraScale+\u2122) MPSoC/RFSoC may allow a privileged attacker to perform out of bound reads, potentially resulting in data leakage and denial of service. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T20:28:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4eba7a4c-3e98-4fe4-b51d-298c4fcd4a5b/export"/>
    <published>2024-08-13T20:28:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a5d16ee0-fdd2-4501-8719-8b6e6a93afc4/export</id>
    <title>a5d16ee0-fdd2-4501-8719-8b6e6a93afc4</title>
    <updated>2026-05-06T06:55:15.381608+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a5d16ee0-fdd2-4501-8719-8b6e6a93afc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113987443302136316", "content": "", "creation_timestamp": "2025-02-11T21:45:53.657727Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a5d16ee0-fdd2-4501-8719-8b6e6a93afc4/export"/>
    <published>2025-02-11T21:45:53.657727+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/076dca1b-070e-41f4-b961-a5626d128711/export</id>
    <title>076dca1b-070e-41f4-b961-a5626d128711</title>
    <updated>2026-05-06T06:55:15.381521+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "076dca1b-070e-41f4-b961-a5626d128711", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwophqzgx2s", "content": "", "creation_timestamp": "2025-02-11T22:15:50.915083Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/076dca1b-070e-41f4-b961-a5626d128711/export"/>
    <published>2025-02-11T22:15:50.915083+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/05c1ebb4-24d9-4fa6-9542-748ca19580b6/export</id>
    <title>05c1ebb4-24d9-4fa6-9542-748ca19580b6</title>
    <updated>2026-05-06T06:55:15.381401+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "05c1ebb4-24d9-4fa6-9542-748ca19580b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://t.me/cvedetector/17791", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31331 - Intel DRTM Privilege Escalation Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-31331 \nPublished : Feb. 11, 2025, 10:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Improper access control in the DRTM firmware could allow a privileged attacker to perform multiple driver initializations, resulting in stack memory corruption that could potentially lead to loss of integrity or availability. \nSeverity: 3.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T01:48:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/05c1ebb4-24d9-4fa6-9542-748ca19580b6/export"/>
    <published>2025-02-12T01:48:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d5330123-3751-432e-bb89-71dc23259cad/export</id>
    <title>d5330123-3751-432e-bb89-71dc23259cad</title>
    <updated>2026-05-06T06:55:15.379794+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d5330123-3751-432e-bb89-71dc23259cad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhx4mj55iq2u", "content": "", "creation_timestamp": "2025-02-12T02:24:48.960540Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d5330123-3751-432e-bb89-71dc23259cad/export"/>
    <published>2025-02-12T02:24:48.960540+00:00</published>
  </entry>
</feed>
