<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:23:41.646377+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/977c6ad1-7b49-4605-b3d1-ce5e65f8077b/export</id>
    <title>977c6ad1-7b49-4605-b3d1-ce5e65f8077b</title>
    <updated>2026-05-04T09:23:42.079586+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "977c6ad1-7b49-4605-b3d1-ce5e65f8077b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32095", "type": "seen", "source": "https://t.me/ctinow/160400", "content": "https://ift.tt/2LF5gPe\nCVE-2023-32095", "creation_timestamp": "2023-12-29T10:26:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/977c6ad1-7b49-4605-b3d1-ce5e65f8077b/export"/>
    <published>2023-12-29T10:26:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8a2f6eb8-9dd6-45cc-b007-53e4b0edc036/export</id>
    <title>8a2f6eb8-9dd6-45cc-b007-53e4b0edc036</title>
    <updated>2026-05-04T09:23:42.079443+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8a2f6eb8-9dd6-45cc-b007-53e4b0edc036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32095", "type": "seen", "source": "https://t.me/cibsecurity/73915", "content": "\u203c\ufe0fCVE-2023-32095\u203c\ufe0f\n\nImproper Control of Generation of Code 'Code Injection' vulnerability in Milan Dini? Rename Media Files.This issue affects Rename Media Files from na through 1.0.1.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:35:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8a2f6eb8-9dd6-45cc-b007-53e4b0edc036/export"/>
    <published>2023-12-30T01:35:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/66c3261a-9500-41fc-b698-7bbe339e984a/export</id>
    <title>66c3261a-9500-41fc-b698-7bbe339e984a</title>
    <updated>2026-05-04T09:23:42.077784+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "66c3261a-9500-41fc-b698-7bbe339e984a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32095", "type": "seen", "source": "https://t.me/ctinow/170754", "content": "https://ift.tt/hXFw8ps\nCVE-2023-32095 | Milan Dini\u0107 Rename Media Files Plugin up to 1.0.1 on WordPress code injection", "creation_timestamp": "2024-01-21T07:07:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/66c3261a-9500-41fc-b698-7bbe339e984a/export"/>
    <published>2024-01-21T07:07:57+00:00</published>
  </entry>
</feed>
