<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T20:17:57.183678+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4855ed9f-3b26-45e3-86f2-ce3ad8c432ba/export</id>
    <title>4855ed9f-3b26-45e3-86f2-ce3ad8c432ba</title>
    <updated>2026-05-05T20:17:57.487320+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4855ed9f-3b26-45e3-86f2-ce3ad8c432ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44393", "type": "seen", "source": "https://t.me/cibsecurity/71846", "content": "\u203c CVE-2023-44393 \u203c\n\nPiwigo is an open source photo gallery application. Prior to version 14.0.0beta4, a reflected cross-site scripting (XSS) vulnerability is in the` /admin.php?page=plugins&amp;amp;tab=new&amp;amp;installstatus=ok&amp;amp;plugin_id=[here]` page. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by admin users when they visit the URL with the payload. The vulnerability is caused by the insecure injection of the `plugin_id` value from the URL into the HTML page. An attacker can exploit this vulnerability by crafting a malicious URL that contains a specially crafted `plugin_id` value. When a victim who is logged in as an administrator visits this URL, the malicious code will be injected into the HTML page and executed. This vulnerability can be exploited by any attacker who has access to a malicious URL. However, only users who are logged in as administrators are affected. This is because the vulnerability is only present on the `/admin.php?page=plugins&amp;amp;tab=new&amp;amp;installstatus=ok&amp;amp;plugin_id=[here]` page, which is only accessible to administrators. Version 14.0.0.beta4 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T18:16:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4855ed9f-3b26-45e3-86f2-ce3ad8c432ba/export"/>
    <published>2023-10-09T18:16:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/549de767-084f-4fc1-bb0f-bce84d03ae16/export</id>
    <title>549de767-084f-4fc1-bb0f-bce84d03ae16</title>
    <updated>2026-05-05T20:17:57.487118+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "549de767-084f-4fc1-bb0f-bce84d03ae16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44392", "type": "seen", "source": "https://t.me/cibsecurity/71870", "content": "\u203c CVE-2023-44392 \u203c\n\nGarden provides automation for Kubernetes development and testing. Prior tov ersions 0.13.17 and 0.12.65, Garden has a dependency on the cryo library, which is vulnerable to code injection due to an insecure implementation of deserialization. Garden stores serialized objects using cryo in the Kubernetes `ConfigMap` resources prefixed with `test-result` and `run-result` to cache Garden test and run results. These `ConfigMaps` are stored either in the `garden-system` namespace or the configured user namespace. When a user invokes the command `garden test` or `garden run` objects stored in the `ConfigMap` are retrieved and deserialized. This can be used by an attacker with access to the Kubernetes cluster to store malicious objects in the `ConfigMap`, which can trigger a remote code execution on the users machine when cryo deserializes the object. In order to exploit this vulnerability, an attacker must have access to the Kubernetes cluster used to deploy garden remote environments. Further, a user must actively invoke either a `garden test` or `garden run` which has previously cached results. The issue has been patched in Garden versions `0.13.17` (Bonsai) and `0.12.65` (Acorn). Only Garden versions prior to these are vulnerable. No known workarounds are available.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T00:16:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/549de767-084f-4fc1-bb0f-bce84d03ae16/export"/>
    <published>2023-10-10T00:16:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/23292209-f5b1-4b7d-bb06-b570fabdf675/export</id>
    <title>23292209-f5b1-4b7d-bb06-b570fabdf675</title>
    <updated>2026-05-05T20:17:57.486920+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "23292209-f5b1-4b7d-bb06-b570fabdf675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44394", "type": "seen", "source": "https://t.me/cibsecurity/72379", "content": "\u203c CVE-2023-44394 \u203c\n\nMantisBT is an open source bug tracker. Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects' names, by accessing wiki.php with sequentially incremented IDs. This issue has been addressed in commit `65c44883f` which has been included in release `2.258`. Users are advised to upgrade. Users unable to upgrade should disable wiki integration ( `$g_wiki_enable = OFF;`).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T02:32:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/23292209-f5b1-4b7d-bb06-b570fabdf675/export"/>
    <published>2023-10-17T02:32:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6c7b19ce-0f54-4337-bf82-27fb035c556c/export</id>
    <title>6c7b19ce-0f54-4337-bf82-27fb035c556c</title>
    <updated>2026-05-05T20:17:57.486727+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6c7b19ce-0f54-4337-bf82-27fb035c556c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44391", "type": "seen", "source": "https://t.me/cibsecurity/72386", "content": "\u203c CVE-2023-44391 \u203c\n\nDiscourse is an open source platform for community discussion. User summaries are accessible for anonymous users even when `hide_user_profiles_from_public` is enabled. This problem has been patched in the 3.1.1 stable and 3.2.0.beta2 version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T02:37:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6c7b19ce-0f54-4337-bf82-27fb035c556c/export"/>
    <published>2023-10-17T02:37:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/79b19bb5-fd74-4e96-b073-384bbfc46497/export</id>
    <title>79b19bb5-fd74-4e96-b073-384bbfc46497</title>
    <updated>2026-05-05T20:17:57.486548+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "79b19bb5-fd74-4e96-b073-384bbfc46497", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44397", "type": "seen", "source": "https://t.me/cibsecurity/73197", "content": "\u203c CVE-2023-44397 \u203c\n\nCloudExplorer Lite is an open source, lightweight cloud management platform. Prior to version 1.4.1, the gateway filter of CloudExplorer Lite uses a controller with path starting with `matching/API/`, which can cause a permission bypass. Version 1.4.1 contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-31T01:20:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/79b19bb5-fd74-4e96-b073-384bbfc46497/export"/>
    <published>2023-10-31T01:20:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5fe5e1b4-218d-42c9-8ac4-5ec6e0a6bb62/export</id>
    <title>5fe5e1b4-218d-42c9-8ac4-5ec6e0a6bb62</title>
    <updated>2026-05-05T20:17:57.486357+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5fe5e1b4-218d-42c9-8ac4-5ec6e0a6bb62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44398", "type": "seen", "source": "https://t.me/cibsecurity/73620", "content": "\u203c CVE-2023-44398 \u203c\n\nExiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, `BmffImage::brotliUncompress`, is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. This bug is fixed in version v0.28.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T20:25:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5fe5e1b4-218d-42c9-8ac4-5ec6e0a6bb62/export"/>
    <published>2023-11-06T20:25:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/155f2066-bb32-49e1-a26d-0908ee77f52f/export</id>
    <title>155f2066-bb32-49e1-a26d-0908ee77f52f</title>
    <updated>2026-05-05T20:17:57.486151+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "155f2066-bb32-49e1-a26d-0908ee77f52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44395", "type": "seen", "source": "https://t.me/ctinow/171272", "content": "https://ift.tt/wR3KvDm\nCVE-2023-44395", "creation_timestamp": "2024-01-22T16:24:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/155f2066-bb32-49e1-a26d-0908ee77f52f/export"/>
    <published>2024-01-22T16:24:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9a901b99-93d3-4bdb-8a07-7dffb90dbe80/export</id>
    <title>9a901b99-93d3-4bdb-8a07-7dffb90dbe80</title>
    <updated>2026-05-05T20:17:57.485951+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9a901b99-93d3-4bdb-8a07-7dffb90dbe80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44395", "type": "seen", "source": "https://t.me/ctinow/186209", "content": "https://ift.tt/kYSKX7f\nCVE-2023-44395 | Autolab up to 2.11.x Assessment path traversal (GHSA-h8wq-ghfq-5hfx)", "creation_timestamp": "2024-02-16T09:41:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9a901b99-93d3-4bdb-8a07-7dffb90dbe80/export"/>
    <published>2024-02-16T09:41:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e1ba744a-59b2-4ccb-9de8-62331d2af72f/export</id>
    <title>e1ba744a-59b2-4ccb-9de8-62331d2af72f</title>
    <updated>2026-05-05T20:17:57.485693+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e1ba744a-59b2-4ccb-9de8-62331d2af72f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44398", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5613", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-44398\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, `BmffImage::brotliUncompress`, is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. This bug is fixed in version v0.28.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2023-11-06T17:30:54.394Z\n\ud83d\udccf Modified: 2025-02-26T21:15:17.204Z\n\ud83d\udd17 References:\n1. https://github.com/Exiv2/exiv2/security/advisories/GHSA-hrw9-ggg3-3r4r\n2. https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5\n3. https://security.gentoo.org/glsa/202312-06", "creation_timestamp": "2025-02-26T21:25:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e1ba744a-59b2-4ccb-9de8-62331d2af72f/export"/>
    <published>2025-02-26T21:25:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9a1bccc2-c2c2-46d1-b44f-367589804131/export</id>
    <title>9a1bccc2-c2c2-46d1-b44f-367589804131</title>
    <updated>2026-05-05T20:17:57.481518+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9a1bccc2-c2c2-46d1-b44f-367589804131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44398", "type": "seen", "source": "https://github.blog/security/vulnerability-research/bugs-that-survive-the-heat-of-continuous-fuzzing/", "content": "", "creation_timestamp": "2025-12-29T21:01:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9a1bccc2-c2c2-46d1-b44f-367589804131/export"/>
    <published>2025-12-29T21:01:14+00:00</published>
  </entry>
</feed>
