<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T11:26:40.444953+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d2b290e1-0ac2-493a-8a1f-ef11924e92d8/export</id>
    <title>d2b290e1-0ac2-493a-8a1f-ef11924e92d8</title>
    <updated>2026-05-05T11:26:40.874938+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d2b290e1-0ac2-493a-8a1f-ef11924e92d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4682", "type": "seen", "source": "https://t.me/cibsecurity/69566", "content": "\u203c CVE-2023-4682 \u203c\n\nHeap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T20:13:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d2b290e1-0ac2-493a-8a1f-ef11924e92d8/export"/>
    <published>2023-08-31T20:13:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0ee5e255-dff3-4ee3-9368-e2bc1afd90fd/export</id>
    <title>0ee5e255-dff3-4ee3-9368-e2bc1afd90fd</title>
    <updated>2026-05-05T11:26:40.874851+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0ee5e255-dff3-4ee3-9368-e2bc1afd90fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46823", "type": "seen", "source": "https://t.me/cibsecurity/73582", "content": "\u203c CVE-2023-46823 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Avirtum ImageLinks Interactive Image Builder for WordPress allows SQL Injection.This issue affects ImageLinks Interactive Image Builder for WordPress: from n/a through 1.5.4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T12:25:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0ee5e255-dff3-4ee3-9368-e2bc1afd90fd/export"/>
    <published>2023-11-06T12:25:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/90d4c687-ebd1-41c8-a85d-6d10b76c2a6d/export</id>
    <title>90d4c687-ebd1-41c8-a85d-6d10b76c2a6d</title>
    <updated>2026-05-05T11:26:40.874736+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "90d4c687-ebd1-41c8-a85d-6d10b76c2a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46822", "type": "seen", "source": "https://t.me/cibsecurity/73589", "content": "\u203c CVE-2023-46822 \u203c\n\nUnauth. Reflected Cross-Site Scripting') vulnerability in Visser Labs Store Exporter for WooCommerce \u00e2\u20ac\u201c Export Products, Export Orders, Export Subscriptions, and More plugin &amp;lt;=\u00c2\u00a02.7.2 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T12:25:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/90d4c687-ebd1-41c8-a85d-6d10b76c2a6d/export"/>
    <published>2023-11-06T12:25:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5a75879f-55c3-4941-8a2a-3a1f2e3545b9/export</id>
    <title>5a75879f-55c3-4941-8a2a-3a1f2e3545b9</title>
    <updated>2026-05-05T11:26:40.871716+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5a75879f-55c3-4941-8a2a-3a1f2e3545b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46823", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5614", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46823\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Avirtum ImageLinks Interactive Image Builder for WordPress allows SQL Injection.This issue affects ImageLinks Interactive Image Builder for WordPress: from n/a through 1.5.4.\n\n\n\ud83d\udccf Published: 2023-11-06T09:15:09.225Z\n\ud83d\udccf Modified: 2025-02-26T21:14:10.204Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/imagelinks-interactive-image-builder-lite/wordpress-imagelinks-interactive-image-builder-for-wordpress-plugin-1-5-4-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-26T21:25:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5a75879f-55c3-4941-8a2a-3a1f2e3545b9/export"/>
    <published>2025-02-26T21:25:30+00:00</published>
  </entry>
</feed>
