<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:25:32.391136+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/19fabb89-c99e-4665-a32d-3ee551570516/export</id>
    <title>19fabb89-c99e-4665-a32d-3ee551570516</title>
    <updated>2026-05-04T10:25:32.780378+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "19fabb89-c99e-4665-a32d-3ee551570516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4371", "type": "seen", "source": "https://t.me/cibsecurity/68538", "content": "\u203c CVE-2023-4371 \u203c\n\nA vulnerability was found in phpRecDB 1.3.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument r/view leads to cross site scripting. The attack may be launched remotely. VDB-237194 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-15T18:30:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/19fabb89-c99e-4665-a32d-3ee551570516/export"/>
    <published>2023-08-15T18:30:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ffd7c692-3039-45e7-90a8-fd4253aaceaf/export</id>
    <title>ffd7c692-3039-45e7-90a8-fd4253aaceaf</title>
    <updated>2026-05-04T10:25:32.780248+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ffd7c692-3039-45e7-90a8-fd4253aaceaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43711", "type": "seen", "source": "https://t.me/cibsecurity/71343", "content": "\u203c CVE-2023-43711 \u203c\n\nOs Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.This vulnerability allows attackers to inject JS through the \"admin_firstname\" parameter,potentially leading to unauthorized execution of scripts within a user's web browser.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-30T07:38:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ffd7c692-3039-45e7-90a8-fd4253aaceaf/export"/>
    <published>2023-09-30T07:38:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3ae36ade-3928-4499-bb85-5b3a810849a2/export</id>
    <title>3ae36ade-3928-4499-bb85-5b3a810849a2</title>
    <updated>2026-05-04T10:25:32.780128+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3ae36ade-3928-4499-bb85-5b3a810849a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43710", "type": "seen", "source": "https://t.me/cibsecurity/71355", "content": "\u203c CVE-2023-43710 \u203c\n\nOs Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.This vulnerability allows attackers to inject JS through the \"configuration_title[1][MODULE_SHIPPING_PERCENT_TEXT_TITLE]\" parameter,potentially leading to unauthorized execution of scripts within a user's web browser.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-30T07:38:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3ae36ade-3928-4499-bb85-5b3a810849a2/export"/>
    <published>2023-09-30T07:38:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/951738f0-5fa8-4220-898d-9fa43c365430/export</id>
    <title>951738f0-5fa8-4220-898d-9fa43c365430</title>
    <updated>2026-05-04T10:25:32.780002+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "951738f0-5fa8-4220-898d-9fa43c365430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43718", "type": "seen", "source": "https://t.me/cibsecurity/71368", "content": "\u203c CVE-2023-43718 \u203c\n\nOs Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.This vulnerability allows attackers to inject JS through the \"MSEARCH_ENABLE_TITLE[1]\" parameter,potentially leading to unauthorized execution of scripts within a user's web browser.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-01T02:39:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/951738f0-5fa8-4220-898d-9fa43c365430/export"/>
    <published>2023-10-01T02:39:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cc726eb2-62f1-4eef-aec7-de735ced1a48/export</id>
    <title>cc726eb2-62f1-4eef-aec7-de735ced1a48</title>
    <updated>2026-05-04T10:25:32.779840+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cc726eb2-62f1-4eef-aec7-de735ced1a48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43717", "type": "seen", "source": "https://t.me/cibsecurity/71369", "content": "\u203c CVE-2023-43717 \u203c\n\nOs Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.This vulnerability allows attackers to inject JS through the \"MSEARCH_HIGHLIGHT_ENABLE_TITLE[1]\" parameter,potentially leading to unauthorized execution of scripts within a user's web browser.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-01T02:39:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cc726eb2-62f1-4eef-aec7-de735ced1a48/export"/>
    <published>2023-10-01T02:39:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/507398c2-3eac-49d2-bfcd-f92716850f21/export</id>
    <title>507398c2-3eac-49d2-bfcd-f92716850f21</title>
    <updated>2026-05-04T10:25:32.777584+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "507398c2-3eac-49d2-bfcd-f92716850f21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43719", "type": "seen", "source": "https://t.me/cibsecurity/71378", "content": "\u203c CVE-2023-43719 \u203c\n\nOs Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.This vulnerability allows attackers to inject JS through the \"SHIPPING_GENDER_TITLE[1]\" parameter,potentially leading to unauthorized execution of scripts within a user's web browser.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-01T02:39:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/507398c2-3eac-49d2-bfcd-f92716850f21/export"/>
    <published>2023-10-01T02:39:21+00:00</published>
  </entry>
</feed>
