<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:30:10.992376+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c4fd0b63-8353-4044-a39e-0a467abd86fd/export</id>
    <title>c4fd0b63-8353-4044-a39e-0a467abd86fd</title>
    <updated>2026-05-06T11:30:11.334977+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c4fd0b63-8353-4044-a39e-0a467abd86fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31655", "type": "seen", "source": "https://t.me/cibsecurity/64433", "content": "\u203c CVE-2023-31655 \u203c\n\nredis-7.0.10 was discovered to contain a segmentation violation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-19T00:32:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c4fd0b63-8353-4044-a39e-0a467abd86fd/export"/>
    <published>2023-05-19T00:32:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a8c4f25c-cc67-479e-8ead-a8a273349a6f/export</id>
    <title>a8c4f25c-cc67-479e-8ead-a8a273349a6f</title>
    <updated>2026-05-06T11:30:11.334909+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a8c4f25c-cc67-479e-8ead-a8a273349a6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3165", "type": "seen", "source": "https://t.me/cibsecurity/65075", "content": "\u203c CVE-2023-3165 \u203c\n\nA vulnerability was found in SourceCodester Life Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file insertNominee.php of the component POST Parameter Handler. The manipulation of the argument nominee_id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231109 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-08T20:27:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a8c4f25c-cc67-479e-8ead-a8a273349a6f/export"/>
    <published>2023-06-08T20:27:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3b3503a5-7cf3-4f31-9fb1-50b71d2517cd/export</id>
    <title>3b3503a5-7cf3-4f31-9fb1-50b71d2517cd</title>
    <updated>2026-05-06T11:30:11.334813+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3b3503a5-7cf3-4f31-9fb1-50b71d2517cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31654", "type": "seen", "source": "https://t.me/ctinow/172396", "content": "https://ift.tt/rCjzT6k\nCVE-2023-31654", "creation_timestamp": "2024-01-23T23:27:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3b3503a5-7cf3-4f31-9fb1-50b71d2517cd/export"/>
    <published>2024-01-23T23:27:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/02a2bb6d-ef4b-4194-8425-5e0961853a5e/export</id>
    <title>02a2bb6d-ef4b-4194-8425-5e0961853a5e</title>
    <updated>2026-05-06T11:30:11.334623+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "02a2bb6d-ef4b-4194-8425-5e0961853a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31654", "type": "seen", "source": "https://t.me/ctinow/177010", "content": "https://ift.tt/JNLwaF8\nCVE-2023-31654 Exploit", "creation_timestamp": "2024-01-31T19:17:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/02a2bb6d-ef4b-4194-8425-5e0961853a5e/export"/>
    <published>2024-01-31T19:17:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8170c3ba-f2a8-4036-9f37-38e2efb74e6b/export</id>
    <title>8170c3ba-f2a8-4036-9f37-38e2efb74e6b</title>
    <updated>2026-05-06T11:30:11.331188+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8170c3ba-f2a8-4036-9f37-38e2efb74e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31654", "type": "seen", "source": "https://t.me/ctinow/186993", "content": "https://ift.tt/jTsiPnm\nCVE-2023-31654 | Redis Raft up to master-7b46079 alloc.c hiredisAllocFns Privilege Escalation (Issue 600)", "creation_timestamp": "2024-02-17T17:46:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8170c3ba-f2a8-4036-9f37-38e2efb74e6b/export"/>
    <published>2024-02-17T17:46:21+00:00</published>
  </entry>
</feed>
