<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:25:18.775402+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/66007783-58e8-4ffb-a150-529147018b1d/export</id>
    <title>66007783-58e8-4ffb-a150-529147018b1d</title>
    <updated>2026-05-04T09:25:19.120356+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "66007783-58e8-4ffb-a150-529147018b1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3701", "type": "seen", "source": "https://t.me/cibsecurity/71562", "content": "\u203c CVE-2023-3701 \u203c\n\nAqua Drive, in its 2.4 version, is vulnerable to a relative path traversal vulnerability. By exploiting this vulnerability, an authenticated non privileged user could access/modify stored resources of other users. It could also be possible to access and modify the source and configuration files of the cloud disk platform, affecting the integrity and availability of the entire platform.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T14:12:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/66007783-58e8-4ffb-a150-529147018b1d/export"/>
    <published>2023-10-04T14:12:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1c493934-3762-4a68-9f41-2f264e84eccc/export</id>
    <title>1c493934-3762-4a68-9f41-2f264e84eccc</title>
    <updated>2026-05-04T09:25:19.120279+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1c493934-3762-4a68-9f41-2f264e84eccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37010", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdnwy7jj42b", "content": "", "creation_timestamp": "2025-01-22T15:16:22.464217Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1c493934-3762-4a68-9f41-2f264e84eccc/export"/>
    <published>2025-01-22T15:16:22.464217+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fda1256b-2a2e-4e13-8ec9-91ce91464e9d/export</id>
    <title>fda1256b-2a2e-4e13-8ec9-91ce91464e9d</title>
    <updated>2026-05-04T09:25:19.120200+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fda1256b-2a2e-4e13-8ec9-91ce91464e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37011", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdnxa4rk22h", "content": "", "creation_timestamp": "2025-01-22T15:16:31.003382Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fda1256b-2a2e-4e13-8ec9-91ce91464e9d/export"/>
    <published>2025-01-22T15:16:31.003382+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4cadc173-f5a6-4278-b026-b21b6b704d4b/export</id>
    <title>4cadc173-f5a6-4278-b026-b21b6b704d4b</title>
    <updated>2026-05-04T09:25:19.120119+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4cadc173-f5a6-4278-b026-b21b6b704d4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37012", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdnxjhkw32t", "content": "", "creation_timestamp": "2025-01-22T15:16:40.614026Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4cadc173-f5a6-4278-b026-b21b6b704d4b/export"/>
    <published>2025-01-22T15:16:40.614026+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/09e7cc9d-5e35-46d7-97e8-9d66a07f0c69/export</id>
    <title>09e7cc9d-5e35-46d7-97e8-9d66a07f0c69</title>
    <updated>2026-05-04T09:25:19.120035+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "09e7cc9d-5e35-46d7-97e8-9d66a07f0c69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37013", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdnxyk3we2j", "content": "", "creation_timestamp": "2025-01-22T15:16:56.541544Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/09e7cc9d-5e35-46d7-97e8-9d66a07f0c69/export"/>
    <published>2025-01-22T15:16:56.541544+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/190ac705-96ce-4293-9381-e30b75fc1bed/export</id>
    <title>190ac705-96ce-4293-9381-e30b75fc1bed</title>
    <updated>2026-05-04T09:25:19.119955+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "190ac705-96ce-4293-9381-e30b75fc1bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37016", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdnyb6lme2b", "content": "", "creation_timestamp": "2025-01-22T15:17:05.563893Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/190ac705-96ce-4293-9381-e30b75fc1bed/export"/>
    <published>2025-01-22T15:17:05.563893+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9178dc3a-239b-4e2c-a837-a371fe5bf840/export</id>
    <title>9178dc3a-239b-4e2c-a837-a371fe5bf840</title>
    <updated>2026-05-04T09:25:19.119867+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9178dc3a-239b-4e2c-a837-a371fe5bf840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37017", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdnyf62xk2t", "content": "", "creation_timestamp": "2025-01-22T15:17:09.638688Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9178dc3a-239b-4e2c-a837-a371fe5bf840/export"/>
    <published>2025-01-22T15:17:09.638688+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0b2e5cd4-ce95-42f8-ae40-2b4551601271/export</id>
    <title>0b2e5cd4-ce95-42f8-ae40-2b4551601271</title>
    <updated>2026-05-04T09:25:19.119748+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0b2e5cd4-ce95-42f8-ae40-2b4551601271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37018", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdnyj2zyc2t", "content": "", "creation_timestamp": "2025-01-22T15:17:13.863063Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0b2e5cd4-ce95-42f8-ae40-2b4551601271/export"/>
    <published>2025-01-22T15:17:13.863063+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c45a7a5-0f67-4251-bd4a-36d77d02b671/export</id>
    <title>8c45a7a5-0f67-4251-bd4a-36d77d02b671</title>
    <updated>2026-05-04T09:25:19.117706+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c45a7a5-0f67-4251-bd4a-36d77d02b671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37019", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdnymx4fg27", "content": "", "creation_timestamp": "2025-01-22T15:17:17.728330Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c45a7a5-0f67-4251-bd4a-36d77d02b671/export"/>
    <published>2025-01-22T15:17:17.728330+00:00</published>
  </entry>
</feed>
