<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:32:08.686100+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7757a343-fb6b-415f-96c4-c92058da5153/export</id>
    <title>7757a343-fb6b-415f-96c4-c92058da5153</title>
    <updated>2026-05-06T11:32:08.928664+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7757a343-fb6b-415f-96c4-c92058da5153", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42578", "type": "seen", "source": "https://t.me/ctinow/158787", "content": "https://ift.tt/4JSwk8L\nCVE-2023-42578 | Samsung Data Store prior 5.2.00.7 permission", "creation_timestamp": "2023-12-23T11:41:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7757a343-fb6b-415f-96c4-c92058da5153/export"/>
    <published>2023-12-23T11:41:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/93581ee4-2ed8-4c06-a113-6ff96c0ddc3c/export</id>
    <title>93581ee4-2ed8-4c06-a113-6ff96c0ddc3c</title>
    <updated>2026-05-06T11:32:08.928601+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "93581ee4-2ed8-4c06-a113-6ff96c0ddc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42579", "type": "seen", "source": "https://t.me/ctinow/158799", "content": "https://ift.tt/wZXmhRJ\nCVE-2023-42579 | Samsung Keyboard SogouSDK information disclosure", "creation_timestamp": "2023-12-23T12:11:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/93581ee4-2ed8-4c06-a113-6ff96c0ddc3c/export"/>
    <published>2023-12-23T12:11:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a7de739e-7e2b-411a-b0b8-d3ec6048741d/export</id>
    <title>a7de739e-7e2b-411a-b0b8-d3ec6048741d</title>
    <updated>2026-05-06T11:32:08.928528+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a7de739e-7e2b-411a-b0b8-d3ec6048741d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42571", "type": "seen", "source": "https://t.me/ctinow/158814", "content": "https://ift.tt/4weoIBX\nCVE-2023-42571 | Samsung Find My Mobile prior 7.3.13.4 improper authentication", "creation_timestamp": "2023-12-23T13:46:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a7de739e-7e2b-411a-b0b8-d3ec6048741d/export"/>
    <published>2023-12-23T13:46:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6a8865b1-790b-487f-bd00-0620f2ad9399/export</id>
    <title>6a8865b1-790b-487f-bd00-0620f2ad9399</title>
    <updated>2026-05-06T11:32:08.928460+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6a8865b1-790b-487f-bd00-0620f2ad9399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42577", "type": "seen", "source": "https://t.me/ctinow/158816", "content": "https://ift.tt/8lSoLn5\nCVE-2023-42577 | Samsung Voice Recorder access control", "creation_timestamp": "2023-12-23T13:46:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6a8865b1-790b-487f-bd00-0620f2ad9399/export"/>
    <published>2023-12-23T13:46:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/70491f7e-8649-48d1-99d1-7a791652878f/export</id>
    <title>70491f7e-8649-48d1-99d1-7a791652878f</title>
    <updated>2026-05-06T11:32:08.928381+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "70491f7e-8649-48d1-99d1-7a791652878f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42570", "type": "seen", "source": "https://t.me/ctinow/158945", "content": "https://ift.tt/S5JcmR8\nCVE-2023-42570 | Samsung Smart Phone KnoxCustomManagerService permission", "creation_timestamp": "2023-12-24T08:06:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/70491f7e-8649-48d1-99d1-7a791652878f/export"/>
    <published>2023-12-24T08:06:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/abf02cd1-b261-4a7c-b73b-35ef99cbedfa/export</id>
    <title>abf02cd1-b261-4a7c-b73b-35ef99cbedfa</title>
    <updated>2026-05-06T11:32:08.928307+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "abf02cd1-b261-4a7c-b73b-35ef99cbedfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42572", "type": "seen", "source": "https://t.me/ctinow/158953", "content": "https://ift.tt/W2ubJEV\nCVE-2023-42572 | Samsung Samsung Account Web SDK prior 1.5.24 information disclosure", "creation_timestamp": "2023-12-24T08:41:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/abf02cd1-b261-4a7c-b73b-35ef99cbedfa/export"/>
    <published>2023-12-24T08:41:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/018ecee4-e912-4cf2-af81-de4f67ca1c36/export</id>
    <title>018ecee4-e912-4cf2-af81-de4f67ca1c36</title>
    <updated>2026-05-06T11:32:08.928226+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "018ecee4-e912-4cf2-af81-de4f67ca1c36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42573", "type": "seen", "source": "https://t.me/ctinow/158987", "content": "https://ift.tt/utHeBwQ\nCVE-2023-42573 | Samsung Search Widget up to 3.3 Pendingetent access control", "creation_timestamp": "2023-12-24T10:41:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/018ecee4-e912-4cf2-af81-de4f67ca1c36/export"/>
    <published>2023-12-24T10:41:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a6e3fe31-80f2-469f-8a2a-f489b04206a8/export</id>
    <title>a6e3fe31-80f2-469f-8a2a-f489b04206a8</title>
    <updated>2026-05-06T11:32:08.928150+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a6e3fe31-80f2-469f-8a2a-f489b04206a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42574", "type": "seen", "source": "https://t.me/ctinow/158988", "content": "https://ift.tt/Kp9Hisw\nCVE-2023-42574 | Samsung GameHomeCN prior 4.2.60.2 access control", "creation_timestamp": "2023-12-24T10:41:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a6e3fe31-80f2-469f-8a2a-f489b04206a8/export"/>
    <published>2023-12-24T10:41:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/598515fa-4335-41a6-8b7f-98d0813b9084/export</id>
    <title>598515fa-4335-41a6-8b7f-98d0813b9084</title>
    <updated>2026-05-06T11:32:08.927954+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "598515fa-4335-41a6-8b7f-98d0813b9084", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42575", "type": "seen", "source": "https://t.me/ctinow/158989", "content": "https://ift.tt/2tO0RnC\nCVE-2023-42575 | Samsung Samsung Pass prior 4.3.00.17 Flag Setting improper authentication", "creation_timestamp": "2023-12-24T10:41:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/598515fa-4335-41a6-8b7f-98d0813b9084/export"/>
    <published>2023-12-24T10:41:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/19d26711-0b50-40fa-b8bf-89a6452c8250/export</id>
    <title>19d26711-0b50-40fa-b8bf-89a6452c8250</title>
    <updated>2026-05-06T11:32:08.924607+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "19d26711-0b50-40fa-b8bf-89a6452c8250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-42576", "type": "seen", "source": "https://t.me/ctinow/158990", "content": "https://ift.tt/VIhMyT6\nCVE-2023-42576 | Samsung Samsung Pass prior 4.3.00.17 improper authentication", "creation_timestamp": "2023-12-24T11:11:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/19d26711-0b50-40fa-b8bf-89a6452c8250/export"/>
    <published>2023-12-24T11:11:57+00:00</published>
  </entry>
</feed>
