<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:43:38.263197+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1d765132-3bbb-4f94-85c2-a8e917be3224/export</id>
    <title>1d765132-3bbb-4f94-85c2-a8e917be3224</title>
    <updated>2026-05-04T13:43:38.519892+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1d765132-3bbb-4f94-85c2-a8e917be3224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44982", "type": "seen", "source": "https://t.me/ctinow/167243", "content": "https://ift.tt/zoFOdJ9\nCVE-2023-44982 | Jordy Meow Perfect Images Plugin up to 6.4.5 on WordPress information disclosure", "creation_timestamp": "2024-01-12T13:46:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1d765132-3bbb-4f94-85c2-a8e917be3224/export"/>
    <published>2024-01-12T13:46:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/07e5ec24-e449-40f9-b986-228c582abdb0/export</id>
    <title>07e5ec24-e449-40f9-b986-228c582abdb0</title>
    <updated>2026-05-04T13:43:38.519820+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "07e5ec24-e449-40f9-b986-228c582abdb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44983", "type": "seen", "source": "https://t.me/ctinow/167631", "content": "https://ift.tt/wXnbtFy\nCVE-2023-44983 | Aruba HiSpeed Cache Plugin up to 2.0.6 on WordPress information disclosure", "creation_timestamp": "2024-01-13T00:26:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/07e5ec24-e449-40f9-b986-228c582abdb0/export"/>
    <published>2024-01-13T00:26:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/940ab03b-2a22-4781-b2dc-30d29fe5d8fa/export</id>
    <title>940ab03b-2a22-4781-b2dc-30d29fe5d8fa</title>
    <updated>2026-05-04T13:43:38.519754+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "940ab03b-2a22-4781-b2dc-30d29fe5d8fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44981", "type": "seen", "source": "https://t.me/ctinow/180568", "content": "https://ift.tt/e3fuc9w\nCVE-2023-44981 | Oracle Communications Service Catalog and Design 7.4.2.8.0 PSR Designer authorization", "creation_timestamp": "2024-02-07T08:41:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/940ab03b-2a22-4781-b2dc-30d29fe5d8fa/export"/>
    <published>2024-02-07T08:41:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/51089e82-d191-4468-beaf-76d04231b0ef/export</id>
    <title>51089e82-d191-4468-beaf-76d04231b0ef</title>
    <updated>2026-05-04T13:43:38.519667+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "51089e82-d191-4468-beaf-76d04231b0ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44981", "type": "seen", "source": "https://t.me/ctinow/180732", "content": "https://ift.tt/7EiR80e\nCVE-2023-44981 | Oracle Communications Cloud Native Core Network Data Analytics Function Automated Test Suite authorization", "creation_timestamp": "2024-02-07T15:16:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/51089e82-d191-4468-beaf-76d04231b0ef/export"/>
    <published>2024-02-07T15:16:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ecfdff91-7836-48be-9d68-e89d11cf7ece/export</id>
    <title>ecfdff91-7836-48be-9d68-e89d11cf7ece</title>
    <updated>2026-05-04T13:43:38.519596+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ecfdff91-7836-48be-9d68-e89d11cf7ece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44981", "type": "seen", "source": "https://t.me/ctinow/181158", "content": "https://ift.tt/L4sXpOw\nCVE-2023-44981 | Oracle Primavera Unifier up to 19.12.16/20.12.16/21.12.17/22.12.11 Document Manager information disclosure", "creation_timestamp": "2024-02-08T05:06:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ecfdff91-7836-48be-9d68-e89d11cf7ece/export"/>
    <published>2024-02-08T05:06:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4327e640-c5fa-4e63-9258-e325f6d590aa/export</id>
    <title>4327e640-c5fa-4e63-9258-e325f6d590aa</title>
    <updated>2026-05-04T13:43:38.519522+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4327e640-c5fa-4e63-9258-e325f6d590aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44988", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113758678589631396", "content": "", "creation_timestamp": "2025-01-02T12:08:01.232706Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4327e640-c5fa-4e63-9258-e325f6d590aa/export"/>
    <published>2025-01-02T12:08:01.232706+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2b69b2a8-d0b5-4fc3-a262-cafbd014e8f2/export</id>
    <title>2b69b2a8-d0b5-4fc3-a262-cafbd014e8f2</title>
    <updated>2026-05-04T13:43:38.519452+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2b69b2a8-d0b5-4fc3-a262-cafbd014e8f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44988", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2j6yt6a25", "content": "", "creation_timestamp": "2025-01-02T12:15:31.823774Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2b69b2a8-d0b5-4fc3-a262-cafbd014e8f2/export"/>
    <published>2025-01-02T12:15:31.823774+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/adeea0d0-d37b-4d9a-9086-c7c03fbbff15/export</id>
    <title>adeea0d0-d37b-4d9a-9086-c7c03fbbff15</title>
    <updated>2026-05-04T13:43:38.519368+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "adeea0d0-d37b-4d9a-9086-c7c03fbbff15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44988", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/210", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-44988\n\ud83d\udd39 Description: Missing Authorization vulnerability in Martin Gibson WP Custom Admin Interface allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Custom Admin Interface: from n/a through 7.32.\n\ud83d\udccf Published: 2025-01-02T11:59:46.731Z\n\ud83d\udccf Modified: 2025-01-06T20:31:13.579Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-custom-admin-interface/vulnerability/wordpress-wp-custom-admin-interface-plugin-7-32-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-06T20:48:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/adeea0d0-d37b-4d9a-9086-c7c03fbbff15/export"/>
    <published>2025-01-06T20:48:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a8780113-3a25-4f81-bb2c-b9804628a809/export</id>
    <title>a8780113-3a25-4f81-bb2c-b9804628a809</title>
    <updated>2026-05-04T13:43:38.519259+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a8780113-3a25-4f81-bb2c-b9804628a809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44982", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2023/CVE-2023-44982.yaml", "content": "", "creation_timestamp": "2026-02-07T09:14:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a8780113-3a25-4f81-bb2c-b9804628a809/export"/>
    <published>2026-02-07T09:14:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/487fbc59-c439-4f98-9fe0-996c4d0febc3/export</id>
    <title>487fbc59-c439-4f98-9fe0-996c4d0febc3</title>
    <updated>2026-05-04T13:43:38.516154+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "487fbc59-c439-4f98-9fe0-996c4d0febc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44982", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3meetgdhvdl2i", "content": "", "creation_timestamp": "2026-02-08T21:02:54.994365Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/487fbc59-c439-4f98-9fe0-996c4d0febc3/export"/>
    <published>2026-02-08T21:02:54.994365+00:00</published>
  </entry>
</feed>
