<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T11:12:43.993272+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ddd13229-49d0-446f-aa99-efb165c00be6/export</id>
    <title>ddd13229-49d0-446f-aa99-efb165c00be6</title>
    <updated>2026-05-04T11:12:44.276403+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ddd13229-49d0-446f-aa99-efb165c00be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "published-proof-of-concept", "source": "Telegram/6PZKKGQl03Vi6ZEkQInhbXHc7Cdk1szybYRTzghfbAVd-Q", "content": "", "creation_timestamp": "2023-07-02T10:21:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ddd13229-49d0-446f-aa99-efb165c00be6/export"/>
    <published>2023-07-02T10:21:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/158c7bc2-3d15-48df-a6f1-ae75133dfa28/export</id>
    <title>158c7bc2-3d15-48df-a6f1-ae75133dfa28</title>
    <updated>2026-05-04T11:12:44.276332+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "158c7bc2-3d15-48df-a6f1-ae75133dfa28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3787", "content": "\ud83d\udcdfDataLeak:\n\n\ud83d\udcccAsia Vital Components Leak : https://www.system32.ink/2023/06/asia-vital-components-leak.html\n\n\ud83d\udcccposkok_info Data Leak : https://www.system32.ink/2023/06/poskokinfo-data-leak.html\n\n\ud83d\udcccGeotecsacr Digital Marketing Agency Leak : https://www.system32.ink/2023/06/geotecsacr-digital-marketing-agency-leak.html\n\n\ud83d\udcccDarkForum Leak : https://www.system32.ink/2023/06/darkforums-data-leak.html\n\n\ud83d\udcccRussian Champion Tennis Club in Tomsk Leak : https://www.system32.ink/2023/06/russian-champion-tennis-club-in-tomsk.html\n\n\ud83e\uddeeExploits:\n\n\ud83d\udcccLightdash Exploit (CVE-2023-35844) : https://www.system32.ink/2023/06/lightdash-exploit-cve-2023-35844.html\n\n\ud83d\udcccCVE-2023-33140 OneNote Exploit : https://www.system32.ink/2023/06/cve-2023-33140-onenote-exploit.html\n\n\ud83d\udcccCVE-2023-34840 XSS POC OF angular-ui-notification : https://www.system32.ink/2023/06/cve-2023-34840-xss-poc-of-angular-ui.html\n\n\u2699\ufe0fTools:\n\n\ud83d\udcccCrackMapExec : https://www.system32.ink/2023/06/crackmapexec.html\n\n\ud83d\udcccSAFIREFUZZ - Same-Architecture Firmware Rehosting and Fuzzing : https://www.system32.ink/2023/06/safirefuzz-same-architecture-firmware.html\n\n\ud83d\udcccPwnDoc-ng - Pentest Report Generator : https://www.system32.ink/2023/06/pwndoc-ng-pentest-report-generator.html\n\n\ud83d\udcccVulnX - An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms : https://www.system32.ink/2023/06/vulnx-intelligent-bot-auto-shell.html\n\n\ud83d\udcccNetwork Signal Guru APK : https://www.system32.ink/2023/06/network-signal-guru-apk.html\n\n\ud83d\udcccGoogle CTF : https://www.system32.ink/2023/06/google-ctf.html\n\n\ud83e\udda0Rootkit ANd RAT:\n\n\ud83d\udccc888 RAT New Version 2023 ( 1.2.6 Full Setup ) For Lifetime : https://www.system32.ink/2023/06/888-rat-new-version-2023-126-full-setup.html\n\n\ud83d\udcccreveng_rtkit Rootkit : https://www.system32.ink/2023/06/revengrtkit-rootkit.html", "creation_timestamp": "2023-07-02T12:30:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/158c7bc2-3d15-48df-a6f1-ae75133dfa28/export"/>
    <published>2023-07-02T12:30:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e4d2a21d-c388-446a-8353-9d2df242d223/export</id>
    <title>e4d2a21d-c388-446a-8353-9d2df242d223</title>
    <updated>2026-05-04T11:12:44.276268+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e4d2a21d-c388-446a-8353-9d2df242d223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35843", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4710", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-35843 NocoDB \u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\nURL\uff1ahttps://github.com/b3nguang/CVE-2023-35843\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-09T04:19:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e4d2a21d-c388-446a-8353-9d2df242d223/export"/>
    <published>2023-07-09T04:19:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ea12b54b-e7c0-491f-9885-b7f193191703/export</id>
    <title>ea12b54b-e7c0-491f-9885-b7f193191703</title>
    <updated>2026-05-04T11:12:44.276207+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ea12b54b-e7c0-491f-9885-b7f193191703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/871", "content": "", "creation_timestamp": "2023-07-13T05:10:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ea12b54b-e7c0-491f-9885-b7f193191703/export"/>
    <published>2023-07-13T05:10:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b7c20b63-5006-4a48-93b4-c81c8104a45e/export</id>
    <title>b7c20b63-5006-4a48-93b4-c81c8104a45e</title>
    <updated>2026-05-04T11:12:44.276124+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b7c20b63-5006-4a48-93b4-c81c8104a45e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35843", "type": "seen", "source": "https://t.me/kasraone_com/376", "content": "\ud83d\udd34 CVE\n\u00a0\u00a0\u00a0\u00a0\u00a0\n      CVE-2023-35843\n\n\n\u0646\u0633\u062e\u0647 0.106.0 (\u06cc\u0627 0.109.1) \u0627\u0632 NocoDB \u062f\u0627\u0631\u0627\u06cc \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0646\u0627\u0648\u0628\u0631\u06cc \u0645\u0633\u06cc\u0631 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647 \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0628\u062f\u0648\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631 \u0631\u0627 \u0628\u0627 \u062a\u063a\u06cc\u06cc\u0631 \u067e\u0627\u0631\u0627\u0645\u062a\u0631 \u0645\u0633\u06cc\u0631 \u062f\u0631 \u0645\u0633\u06cc\u0631 /download \u0645\u06cc\u200c\u062f\u0647\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u0628\u0647 \u06cc\u06a9 \u062d\u0645\u0644\u0647\u200c\u06a9\u0646\u0646\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627 \u0648 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631 \u0631\u0627\u060c \u0634\u0627\u0645\u0644 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc\u060c \u06a9\u062f \u0645\u0646\u0628\u0639 \u0648 \u0633\u0627\u06cc\u0631 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633\u060c \u0628\u062f\u0647\u062f.", "creation_timestamp": "2023-07-15T05:28:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b7c20b63-5006-4a48-93b4-c81c8104a45e/export"/>
    <published>2023-07-15T05:28:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/81ba869c-685f-4e0f-83a0-dfb240687dc0/export</id>
    <title>81ba869c-685f-4e0f-83a0-dfb240687dc0</title>
    <updated>2026-05-04T11:12:44.276056+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "81ba869c-685f-4e0f-83a0-dfb240687dc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3584", "type": "seen", "source": "https://t.me/cibsecurity/66847", "content": "\u203c CVE-2023-3584 \u203c\n\nMattermost fails to properly check the authorization of\u00c2\u00a0POST /api/v4/teams when passing a team override scheme ID in the request,\u00c2\u00a0allowing an authenticated attacker with knowledge of a Team Override Scheme ID to create a new team with said team override scheme.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T20:40:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/81ba869c-685f-4e0f-83a0-dfb240687dc0/export"/>
    <published>2023-07-17T20:40:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5df54a45-6d2a-484e-ab3c-d5088c32e708/export</id>
    <title>5df54a45-6d2a-484e-ab3c-d5088c32e708</title>
    <updated>2026-05-04T11:12:44.275976+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5df54a45-6d2a-484e-ab3c-d5088c32e708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35843", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/899", "content": "#CVE202335843", "creation_timestamp": "2023-07-22T03:48:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5df54a45-6d2a-484e-ab3c-d5088c32e708/export"/>
    <published>2023-07-22T03:48:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/95c60f63-f1e7-4f87-9078-b561e84af032/export</id>
    <title>95c60f63-f1e7-4f87-9078-b561e84af032</title>
    <updated>2026-05-04T11:12:44.275892+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "95c60f63-f1e7-4f87-9078-b561e84af032", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35845", "type": "seen", "source": "https://t.me/cibsecurity/70192", "content": "\u203c CVE-2023-35845 \u203c\n\nAnaconda 3 2023.03-1-Linux allows local users to disrupt TLS certificate validation by modifying the cacert.pem file used by the installed pip program. This occurs because many files are installed as world-writable on Linux, ignoring umask, even when these files are installed as root. Miniconda is also affected.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-11T12:22:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/95c60f63-f1e7-4f87-9078-b561e84af032/export"/>
    <published>2023-09-11T12:22:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dbf2ebde-de34-4ea4-9c69-bc468eb39547/export</id>
    <title>dbf2ebde-de34-4ea4-9c69-bc468eb39547</title>
    <updated>2026-05-04T11:12:44.275783+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dbf2ebde-de34-4ea4-9c69-bc468eb39547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-04)", "content": "", "creation_timestamp": "2025-04-04T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dbf2ebde-de34-4ea4-9c69-bc468eb39547/export"/>
    <published>2025-04-04T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d6dcbf9a-f537-4b93-91b5-81a39166ae31/export</id>
    <title>d6dcbf9a-f537-4b93-91b5-81a39166ae31</title>
    <updated>2026-05-04T11:12:44.273013+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d6dcbf9a-f537-4b93-91b5-81a39166ae31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35844", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d6dcbf9a-f537-4b93-91b5-81a39166ae31/export"/>
    <published>2025-07-27T00:00:00+00:00</published>
  </entry>
</feed>
