<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:17:59.024294+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fd91cbb4-d288-47e7-a125-5238494016ce/export</id>
    <title>fd91cbb4-d288-47e7-a125-5238494016ce</title>
    <updated>2026-05-04T09:17:59.292695+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fd91cbb4-d288-47e7-a125-5238494016ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34652", "type": "seen", "source": "https://t.me/cibsecurity/65693", "content": "\u203c CVE-2023-34652 \u203c\n\nPHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS) via Add New Course.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T00:13:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fd91cbb4-d288-47e7-a125-5238494016ce/export"/>
    <published>2023-06-29T00:13:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a74a7770-08cd-483b-af2e-ab9e5a522694/export</id>
    <title>a74a7770-08cd-483b-af2e-ab9e5a522694</title>
    <updated>2026-05-04T09:17:59.292586+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a74a7770-08cd-483b-af2e-ab9e5a522694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34650", "type": "seen", "source": "https://t.me/cibsecurity/65696", "content": "\u203c CVE-2023-34650 \u203c\n\nPHPgurukl Small CRM v.1.0 is vulnerable to Cross Site Scripting (XSS).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T00:13:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a74a7770-08cd-483b-af2e-ab9e5a522694/export"/>
    <published>2023-06-29T00:13:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8daaed2c-35c9-4e6f-b561-5219326843ef/export</id>
    <title>8daaed2c-35c9-4e6f-b561-5219326843ef</title>
    <updated>2026-05-04T09:17:59.292474+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8daaed2c-35c9-4e6f-b561-5219326843ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34656", "type": "seen", "source": "https://t.me/cibsecurity/65720", "content": "\u203c CVE-2023-34656 \u203c\n\nAn issue was discovered with the JSESSION IDs in Xiamen Si Xin Communication Technology Video management system 3.1 thru 4.1 allows attackers to gain escalated privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T18:14:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8daaed2c-35c9-4e6f-b561-5219326843ef/export"/>
    <published>2023-06-29T18:14:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ea0fb4ca-ad88-46f2-b481-8078625fefee/export</id>
    <title>ea0fb4ca-ad88-46f2-b481-8078625fefee</title>
    <updated>2026-05-04T09:17:59.292369+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ea0fb4ca-ad88-46f2-b481-8078625fefee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34658", "type": "seen", "source": "https://t.me/cibsecurity/65732", "content": "\u203c CVE-2023-34658 \u203c\n\nTelegram v9.6.3 on iOS allows attackers to hide critical information on the User Interface via calling the function SFSafariViewController.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T20:14:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ea0fb4ca-ad88-46f2-b481-8078625fefee/export"/>
    <published>2023-06-29T20:14:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/db864aaa-75a6-441d-a82b-9774ac78957a/export</id>
    <title>db864aaa-75a6-441d-a82b-9774ac78957a</title>
    <updated>2026-05-04T09:17:59.292262+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "db864aaa-75a6-441d-a82b-9774ac78957a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34654", "type": "seen", "source": "https://t.me/cibsecurity/66022", "content": "\u203c CVE-2023-34654 \u203c\n\ntaocms &amp;lt;=3.0.2 is vulnerable to Cross Site Scripting (XSS).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T03:14:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/db864aaa-75a6-441d-a82b-9774ac78957a/export"/>
    <published>2023-07-06T03:14:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c1da1c51-b939-4822-8d1c-f519865d29f9/export</id>
    <title>c1da1c51-b939-4822-8d1c-f519865d29f9</title>
    <updated>2026-05-04T09:17:59.292138+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c1da1c51-b939-4822-8d1c-f519865d29f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3465", "type": "seen", "source": "https://t.me/cibsecurity/65763", "content": "\u203c CVE-2023-3465 \u203c\n\nA vulnerability was found in SimplePHPscripts Classified Ads Script 1.8. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file user.php of the component HTTP POST Request Handler. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-232711.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T04:37:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c1da1c51-b939-4822-8d1c-f519865d29f9/export"/>
    <published>2023-07-11T04:37:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/31219a6c-24c4-453d-9c2f-10a7cc925913/export</id>
    <title>31219a6c-24c4-453d-9c2f-10a7cc925913</title>
    <updated>2026-05-04T09:17:59.292026+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "31219a6c-24c4-453d-9c2f-10a7cc925913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34659", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-30)", "content": "", "creation_timestamp": "2025-05-30T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/31219a6c-24c4-453d-9c2f-10a7cc925913/export"/>
    <published>2025-05-30T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fd85cea2-84fc-4712-a50a-aad18231dc48/export</id>
    <title>fd85cea2-84fc-4712-a50a-aad18231dc48</title>
    <updated>2026-05-04T09:17:59.291911+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fd85cea2-84fc-4712-a50a-aad18231dc48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34659", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-07)", "content": "", "creation_timestamp": "2025-07-07T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fd85cea2-84fc-4712-a50a-aad18231dc48/export"/>
    <published>2025-07-07T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2284b115-fc55-42e0-8982-6be2beb6bf1e/export</id>
    <title>2284b115-fc55-42e0-8982-6be2beb6bf1e</title>
    <updated>2026-05-04T09:17:59.291767+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2284b115-fc55-42e0-8982-6be2beb6bf1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34659", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-09)", "content": "", "creation_timestamp": "2025-11-09T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2284b115-fc55-42e0-8982-6be2beb6bf1e/export"/>
    <published>2025-11-09T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/17bc4239-2c35-43f7-88ca-8c4354819ac3/export</id>
    <title>17bc4239-2c35-43f7-88ca-8c4354819ac3</title>
    <updated>2026-05-04T09:17:59.289238+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "17bc4239-2c35-43f7-88ca-8c4354819ac3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34659", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-13)", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/17bc4239-2c35-43f7-88ca-8c4354819ac3/export"/>
    <published>2026-03-13T00:00:00+00:00</published>
  </entry>
</feed>
