<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:25:07.203354+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f98e122f-f110-40d7-a3f2-580b3dffd0cd/export</id>
    <title>f98e122f-f110-40d7-a3f2-580b3dffd0cd</title>
    <updated>2026-05-04T09:25:07.568433+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f98e122f-f110-40d7-a3f2-580b3dffd0cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34761", "type": "seen", "source": "https://t.me/cibsecurity/65688", "content": "\u203c CVE-2023-34761 \u203c\n\nAn unauthenticated attacker within BLE proximity can remotely connect to a 7-Eleven LED Message Cup, Hello Cup 1.3.1 for Android, and bypass the application's client-side chat censor filter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T00:13:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f98e122f-f110-40d7-a3f2-580b3dffd0cd/export"/>
    <published>2023-06-29T00:13:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/319229bd-fd8c-4502-9667-b9cd6802d95a/export</id>
    <title>319229bd-fd8c-4502-9667-b9cd6802d95a</title>
    <updated>2026-05-04T09:25:07.563341+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "319229bd-fd8c-4502-9667-b9cd6802d95a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3476", "type": "seen", "source": "https://t.me/cibsecurity/65783", "content": "\u203c CVE-2023-3476 \u203c\n\nA vulnerability was found in SimplePHPscripts GuestBook Script 2.2. It has been classified as problematic. This affects an unknown part of the file preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-232755.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-30T12:15:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/319229bd-fd8c-4502-9667-b9cd6802d95a/export"/>
    <published>2023-06-30T12:15:17+00:00</published>
  </entry>
</feed>
