<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T02:31:38.362901+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/33446d1b-0e6c-4a87-a333-0b1bad4b457f/export</id>
    <title>33446d1b-0e6c-4a87-a333-0b1bad4b457f</title>
    <updated>2026-05-07T02:31:38.715330+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "33446d1b-0e6c-4a87-a333-0b1bad4b457f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4409", "type": "seen", "source": "https://t.me/cibsecurity/68830", "content": "\u203c CVE-2023-4409 \u203c\n\nA vulnerability, which was classified as critical, has been found in NBS&amp;amp;HappySoftWeChat 1.1.6. Affected by this issue is some unknown functionality. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237512.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-18T16:38:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/33446d1b-0e6c-4a87-a333-0b1bad4b457f/export"/>
    <published>2023-08-18T16:38:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d911c511-d4ee-46ab-a5ef-871e0a3d012c/export</id>
    <title>d911c511-d4ee-46ab-a5ef-871e0a3d012c</title>
    <updated>2026-05-07T02:31:38.715251+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d911c511-d4ee-46ab-a5ef-871e0a3d012c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44094", "type": "seen", "source": "https://t.me/cibsecurity/72073", "content": "\u203c CVE-2023-44094 \u203c\n\nType confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T14:22:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d911c511-d4ee-46ab-a5ef-871e0a3d012c/export"/>
    <published>2023-10-11T14:22:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3b82f089-3b96-4e58-a855-9a911594e386/export</id>
    <title>3b82f089-3b96-4e58-a855-9a911594e386</title>
    <updated>2026-05-07T02:31:38.715168+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3b82f089-3b96-4e58-a855-9a911594e386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44096", "type": "seen", "source": "https://t.me/cibsecurity/72075", "content": "\u203c CVE-2023-44096 \u203c\n\nVulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T14:22:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3b82f089-3b96-4e58-a855-9a911594e386/export"/>
    <published>2023-10-11T14:22:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c00bb78-6897-48c2-96c2-104347ee2950/export</id>
    <title>3c00bb78-6897-48c2-96c2-104347ee2950</title>
    <updated>2026-05-07T02:31:38.715091+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c00bb78-6897-48c2-96c2-104347ee2950", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44093", "type": "seen", "source": "https://t.me/cibsecurity/72076", "content": "\u203c CVE-2023-44093 \u203c\n\nVulnerability of package names' public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T14:22:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c00bb78-6897-48c2-96c2-104347ee2950/export"/>
    <published>2023-10-11T14:22:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/563d4cbc-e869-42b5-91ca-32912959eddb/export</id>
    <title>563d4cbc-e869-42b5-91ca-32912959eddb</title>
    <updated>2026-05-07T02:31:38.715012+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "563d4cbc-e869-42b5-91ca-32912959eddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44097", "type": "seen", "source": "https://t.me/cibsecurity/72090", "content": "\u203c CVE-2023-44097 \u203c\n\nVulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T16:22:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/563d4cbc-e869-42b5-91ca-32912959eddb/export"/>
    <published>2023-10-11T16:22:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0afc1c85-4567-454c-b408-7c1cb7ce7009/export</id>
    <title>0afc1c85-4567-454c-b408-7c1cb7ce7009</title>
    <updated>2026-05-07T02:31:38.714932+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0afc1c85-4567-454c-b408-7c1cb7ce7009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44095", "type": "seen", "source": "https://t.me/cibsecurity/72091", "content": "\u203c CVE-2023-44095 \u203c\n\nUse-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T16:22:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0afc1c85-4567-454c-b408-7c1cb7ce7009/export"/>
    <published>2023-10-11T16:22:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/87e8c0a2-9264-4738-94bb-abee2986b005/export</id>
    <title>87e8c0a2-9264-4738-94bb-abee2986b005</title>
    <updated>2026-05-07T02:31:38.714836+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "87e8c0a2-9264-4738-94bb-abee2986b005", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44099", "type": "seen", "source": "https://t.me/ctinow/160805", "content": "https://ift.tt/ecDjWdr\nCVE-2023-44099 | Huawei HarmonyOS/EMUI Kernel Module unusual condition", "creation_timestamp": "2023-12-30T08:36:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/87e8c0a2-9264-4738-94bb-abee2986b005/export"/>
    <published>2023-12-30T08:36:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2eef7a9a-9050-42a6-aa11-ff56d391d104/export</id>
    <title>2eef7a9a-9050-42a6-aa11-ff56d391d104</title>
    <updated>2026-05-07T02:31:38.714756+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2eef7a9a-9050-42a6-aa11-ff56d391d104", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44090", "type": "seen", "source": "https://t.me/ctinow/211801", "content": "https://ift.tt/egKEU1B\nCVE-2023-44090", "creation_timestamp": "2024-03-19T18:26:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2eef7a9a-9050-42a6-aa11-ff56d391d104/export"/>
    <published>2024-03-19T18:26:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/24507682-8b67-459c-b4f2-de750fbb3cb1/export</id>
    <title>24507682-8b67-459c-b4f2-de750fbb3cb1</title>
    <updated>2026-05-07T02:31:38.714643+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "24507682-8b67-459c-b4f2-de750fbb3cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44091", "type": "seen", "source": "https://t.me/ctinow/211802", "content": "https://ift.tt/A3hBou7\nCVE-2023-44091", "creation_timestamp": "2024-03-19T18:26:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/24507682-8b67-459c-b4f2-de750fbb3cb1/export"/>
    <published>2024-03-19T18:26:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f604a5c5-3ed9-47d6-8faf-a518d42bd9e2/export</id>
    <title>f604a5c5-3ed9-47d6-8faf-a518d42bd9e2</title>
    <updated>2026-05-07T02:31:38.712905+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f604a5c5-3ed9-47d6-8faf-a518d42bd9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44092", "type": "seen", "source": "https://t.me/ctinow/211803", "content": "https://ift.tt/o0KDFwB\nCVE-2023-44092", "creation_timestamp": "2024-03-19T18:26:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f604a5c5-3ed9-47d6-8faf-a518d42bd9e2/export"/>
    <published>2024-03-19T18:26:51+00:00</published>
  </entry>
</feed>
