<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T16:14:29.146005+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4f409d80-4fb5-4787-9c2b-2d7c0ec5040a/export</id>
    <title>4f409d80-4fb5-4787-9c2b-2d7c0ec5040a</title>
    <updated>2026-05-04T16:14:29.612933+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4f409d80-4fb5-4787-9c2b-2d7c0ec5040a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3438", "type": "seen", "source": "https://t.me/cibsecurity/65856", "content": "\u203c CVE-2023-3438 \u203c\n\nAn unquoted Windows search path vulnerability existed in the install the MOVE 4.10.x and earlier Windows install service (mvagtsce.exe). The misconfiguration allowed an unauthorized local user to insert arbitrary code into the unquoted service path to obtain privilege escalation and stop antimalware services.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T12:09:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4f409d80-4fb5-4787-9c2b-2d7c0ec5040a/export"/>
    <published>2023-07-13T12:09:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/86114542-100c-44b9-8698-21855eaee81c/export</id>
    <title>86114542-100c-44b9-8698-21855eaee81c</title>
    <updated>2026-05-04T16:14:29.612833+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "86114542-100c-44b9-8698-21855eaee81c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34383", "type": "seen", "source": "https://t.me/cibsecurity/73520", "content": "\u203c CVE-2023-34383 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP Project Manager wedevs-project-manager allows SQL Injection.This issue affects WP Project Manager: from n/a through 2.6.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-03T15:23:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/86114542-100c-44b9-8698-21855eaee81c/export"/>
    <published>2023-11-03T15:23:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/67ab46f2-54e1-4f0d-8249-dd8676bb5746/export</id>
    <title>67ab46f2-54e1-4f0d-8249-dd8676bb5746</title>
    <updated>2026-05-04T16:14:29.612732+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "67ab46f2-54e1-4f0d-8249-dd8676bb5746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34385", "type": "seen", "source": "https://t.me/ctinow/157283", "content": "https://ift.tt/6yORM3U\nCVE-2023-34385", "creation_timestamp": "2023-12-20T20:29:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/67ab46f2-54e1-4f0d-8249-dd8676bb5746/export"/>
    <published>2023-12-20T20:29:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/297a1ff9-d45a-4001-a850-9b6aeb165931/export</id>
    <title>297a1ff9-d45a-4001-a850-9b6aeb165931</title>
    <updated>2026-05-04T16:14:29.612631+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "297a1ff9-d45a-4001-a850-9b6aeb165931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34389", "type": "seen", "source": "https://t.me/ctinow/157572", "content": "https://ift.tt/vSnYXC7\nCVE-2023-34389 | Schweitzer Engineering Laboratories SEL-451 20230830 allocation of resources", "creation_timestamp": "2023-12-21T10:12:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/297a1ff9-d45a-4001-a850-9b6aeb165931/export"/>
    <published>2023-12-21T10:12:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e224cef6-d85d-4d01-97f9-05d5447a5d7c/export</id>
    <title>e224cef6-d85d-4d01-97f9-05d5447a5d7c</title>
    <updated>2026-05-04T16:14:29.612523+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e224cef6-d85d-4d01-97f9-05d5447a5d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34388", "type": "seen", "source": "https://t.me/ctinow/157580", "content": "https://ift.tt/kr8RU59\nCVE-2023-34388 | Schweitzer Engineering Laboratories SEL-451 20230830 improper authentication", "creation_timestamp": "2023-12-21T10:37:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e224cef6-d85d-4d01-97f9-05d5447a5d7c/export"/>
    <published>2023-12-21T10:37:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e7d5c023-7807-4d82-8a1d-16c240a9e719/export</id>
    <title>e7d5c023-7807-4d82-8a1d-16c240a9e719</title>
    <updated>2026-05-04T16:14:29.612420+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e7d5c023-7807-4d82-8a1d-16c240a9e719", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34382", "type": "seen", "source": "https://t.me/ctinow/167762", "content": "https://ift.tt/dVRwYZT\nCVE-2023-34382 | weDevs Dokan Plugin up to 3.7.19 on WordPress deserialization", "creation_timestamp": "2024-01-13T09:16:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e7d5c023-7807-4d82-8a1d-16c240a9e719/export"/>
    <published>2024-01-13T09:16:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/61aa7b18-a204-43ac-8455-ca8ce236ff6b/export</id>
    <title>61aa7b18-a204-43ac-8455-ca8ce236ff6b</title>
    <updated>2026-05-04T16:14:29.612299+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "61aa7b18-a204-43ac-8455-ca8ce236ff6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34385", "type": "seen", "source": "https://t.me/ctinow/167942", "content": "https://ift.tt/EfOgsxU\nCVE-2023-34385 | Akshay Menariya Export Import Menus Plugin up to 1.8.0 on WordPress unrestricted upload", "creation_timestamp": "2024-01-14T06:36:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/61aa7b18-a204-43ac-8455-ca8ce236ff6b/export"/>
    <published>2024-01-14T06:36:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ab124b14-8f05-42ef-9ae6-1549e66246a2/export</id>
    <title>ab124b14-8f05-42ef-9ae6-1549e66246a2</title>
    <updated>2026-05-04T16:14:29.612150+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ab124b14-8f05-42ef-9ae6-1549e66246a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34381", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646696252877760", "content": "", "creation_timestamp": "2024-12-13T17:29:26.223044Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ab124b14-8f05-42ef-9ae6-1549e66246a2/export"/>
    <published>2024-12-13T17:29:26.223044+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/523aa448-45b8-4323-b939-e372c1c3b266/export</id>
    <title>523aa448-45b8-4323-b939-e372c1c3b266</title>
    <updated>2026-05-04T16:14:29.609053+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "523aa448-45b8-4323-b939-e372c1c3b266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34387", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646696266743506", "content": "", "creation_timestamp": "2024-12-13T17:29:26.508215Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/523aa448-45b8-4323-b939-e372c1c3b266/export"/>
    <published>2024-12-13T17:29:26.508215+00:00</published>
  </entry>
</feed>
