<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:54:20.424300+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/587d5509-0f4e-43df-9716-acb8c2e5179a/export</id>
    <title>587d5509-0f4e-43df-9716-acb8c2e5179a</title>
    <updated>2026-05-04T19:54:20.690128+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "587d5509-0f4e-43df-9716-acb8c2e5179a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32219", "type": "seen", "source": "https://t.me/arpsyndicate/562", "content": "#ExploitObserverAlert\n\nCVE-2023-32219\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32219. A Mazda model (2015-2016) can be unlocked via an unspecified method.\n\nFIRST-EPSS: 0.000480000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-25T02:10:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/587d5509-0f4e-43df-9716-acb8c2e5179a/export"/>
    <published>2023-11-25T02:10:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fa018746-208b-46ab-b517-7e2c8e0af56a/export</id>
    <title>fa018746-208b-46ab-b517-7e2c8e0af56a</title>
    <updated>2026-05-04T19:54:20.690026+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fa018746-208b-46ab-b517-7e2c8e0af56a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32219", "type": "seen", "source": "https://t.me/arpsyndicate/1664", "content": "#ExploitObserverAlert\n\nCVE-2023-32219\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-32219. A Mazda model (2015-2016) can be unlocked via an unspecified method.\n\nFIRST-EPSS: 0.000480000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T17:29:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fa018746-208b-46ab-b517-7e2c8e0af56a/export"/>
    <published>2023-12-10T17:29:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/73f1e94f-89f7-47d6-a530-7715ff5682fc/export</id>
    <title>73f1e94f-89f7-47d6-a530-7715ff5682fc</title>
    <updated>2026-05-04T19:54:20.689927+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "73f1e94f-89f7-47d6-a530-7715ff5682fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32217", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1161", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32217\n\ud83d\udd39 Description: IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\n\n\n\ud83d\udccf Published: 2023-05-31T00:00:00\n\ud83d\udccf Modified: 2025-01-10T15:40:35.132Z\n\ud83d\udd17 References:\n1. https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/", "creation_timestamp": "2025-01-10T16:03:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/73f1e94f-89f7-47d6-a530-7715ff5682fc/export"/>
    <published>2025-01-10T16:03:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/75722828-8c87-431b-85d1-a75522a9c049/export</id>
    <title>75722828-8c87-431b-85d1-a75522a9c049</title>
    <updated>2026-05-04T19:54:20.689828+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "75722828-8c87-431b-85d1-a75522a9c049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32216", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17690", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32216\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Mozilla developers and community members Ronald Crane, Andrew McCreight, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 113.\n\ud83d\udccf Published: 2023-06-19T09:42:17.546Z\n\ud83d\udccf Modified: 2025-05-27T16:53:17.147Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746479%2C1806852%2C1815987%2C1820359%2C1823568%2C1824803%2C1824834%2C1825170%2C1827020%2C1828130\n2. https://security.gentoo.org/glsa/202401-10\n3. https://www.mozilla.org/security/advisories/mfsa2023-16/", "creation_timestamp": "2025-05-27T17:48:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/75722828-8c87-431b-85d1-a75522a9c049/export"/>
    <published>2025-05-27T17:48:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/40016904-30cc-4188-8fb9-3cb57bd9b1cb/export</id>
    <title>40016904-30cc-4188-8fb9-3cb57bd9b1cb</title>
    <updated>2026-05-04T19:54:20.689742+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "40016904-30cc-4188-8fb9-3cb57bd9b1cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32210", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17691", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32210\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Documents were incorrectly assuming an ordering of principal objects when ensuring we were loading an appropriately privileged principal. In certain circumstances it might have been possible to cause a document to be loaded with a higher privileged principal than intended. This vulnerability affects Firefox &amp;lt; 113.\n\ud83d\udccf Published: 2023-06-19T09:37:25.092Z\n\ud83d\udccf Modified: 2025-05-27T16:53:16.609Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1776755\n2. https://security.gentoo.org/glsa/202401-10\n3. https://www.mozilla.org/security/advisories/mfsa2023-16/", "creation_timestamp": "2025-05-27T17:49:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/40016904-30cc-4188-8fb9-3cb57bd9b1cb/export"/>
    <published>2025-05-27T17:49:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c2517497-05de-4c69-a63d-067443c65d04/export</id>
    <title>c2517497-05de-4c69-a63d-067443c65d04</title>
    <updated>2026-05-04T19:54:20.689642+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c2517497-05de-4c69-a63d-067443c65d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32215", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17694", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32215\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:14.999Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540883%2C1751943%2C1814856%2C1820210%2C1821480%2C1827019%2C1827024%2C1827144%2C1827359%2C1830186\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c2517497-05de-4c69-a63d-067443c65d04/export"/>
    <published>2025-05-27T17:49:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fd43e4c4-e0b2-4522-b507-b48039359f72/export</id>
    <title>fd43e4c4-e0b2-4522-b507-b48039359f72</title>
    <updated>2026-05-04T19:54:20.689540+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fd43e4c4-e0b2-4522-b507-b48039359f72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32214", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17695", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32214\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service.\n*Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-19T09:38:56.644Z\n\ud83d\udccf Modified: 2025-05-27T16:53:14.473Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1828716\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fd43e4c4-e0b2-4522-b507-b48039359f72/export"/>
    <published>2025-05-27T17:49:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/683a6cbd-8650-4d6d-85fa-795e0c4ec6bb/export</id>
    <title>683a6cbd-8650-4d6d-85fa-795e0c4ec6bb</title>
    <updated>2026-05-04T19:54:20.689454+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "683a6cbd-8650-4d6d-85fa-795e0c4ec6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17696", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32213\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:13.932Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1826666\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/683a6cbd-8650-4d6d-85fa-795e0c4ec6bb/export"/>
    <published>2025-05-27T17:49:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bceddd39-16ff-4c44-9b69-ae8543236818/export</id>
    <title>bceddd39-16ff-4c44-9b69-ae8543236818</title>
    <updated>2026-05-04T19:54:20.689310+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bceddd39-16ff-4c44-9b69-ae8543236818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32212", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17697", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32212\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An attacker could have positioned a `datalist` element to obscure the address bar. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:13.344Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1826622\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bceddd39-16ff-4c44-9b69-ae8543236818/export"/>
    <published>2025-05-27T17:49:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5a4abfea-f3ac-475a-aad0-c3e5a8a7960c/export</id>
    <title>5a4abfea-f3ac-475a-aad0-c3e5a8a7960c</title>
    <updated>2026-05-04T19:54:20.687062+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5a4abfea-f3ac-475a-aad0-c3e5a8a7960c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32211", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17698", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32211\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:12.745Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1823379\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5a4abfea-f3ac-475a-aad0-c3e5a8a7960c/export"/>
    <published>2025-05-27T17:49:13+00:00</published>
  </entry>
</feed>
