<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:29:41.129579+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3843bcf5-a6e5-4bbd-8787-9fa759c64b3c/export</id>
    <title>3843bcf5-a6e5-4bbd-8787-9fa759c64b3c</title>
    <updated>2026-05-04T09:29:41.520949+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3843bcf5-a6e5-4bbd-8787-9fa759c64b3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4774", "type": "seen", "source": "https://t.me/arpsyndicate/2458", "content": "#ExploitObserverAlert\n\nCVE-2023-4774\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-4774. The WP-Matomo Integration (WP-Piwik) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wp-piwik' shortcode in versions up to, and including, 1.0.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\nFIRST-EPSS: 0.000510000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2024-01-04T12:49:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3843bcf5-a6e5-4bbd-8787-9fa759c64b3c/export"/>
    <published>2024-01-04T12:49:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/17122cbe-7640-4ef3-86a3-90012d8d3355/export</id>
    <title>17122cbe-7640-4ef3-86a3-90012d8d3355</title>
    <updated>2026-05-04T09:29:41.520881+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "17122cbe-7640-4ef3-86a3-90012d8d3355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47746", "type": "seen", "source": "https://t.me/ctinow/171394", "content": "https://ift.tt/KlicdEn\nCVE-2023-47746", "creation_timestamp": "2024-01-22T20:26:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/17122cbe-7640-4ef3-86a3-90012d8d3355/export"/>
    <published>2024-01-22T20:26:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1fb2e156-5b76-4c60-b2b0-c35c00f663e5/export</id>
    <title>1fb2e156-5b76-4c60-b2b0-c35c00f663e5</title>
    <updated>2026-05-04T09:29:41.520816+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1fb2e156-5b76-4c60-b2b0-c35c00f663e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47747", "type": "seen", "source": "https://t.me/ctinow/171441", "content": "https://ift.tt/NaUhclX\nCVE-2023-47747", "creation_timestamp": "2024-01-22T21:31:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1fb2e156-5b76-4c60-b2b0-c35c00f663e5/export"/>
    <published>2024-01-22T21:31:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/395638f7-4a1e-45c0-8051-ff29c0cb7dd3/export</id>
    <title>395638f7-4a1e-45c0-8051-ff29c0cb7dd3</title>
    <updated>2026-05-04T09:29:41.520750+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "395638f7-4a1e-45c0-8051-ff29c0cb7dd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47746", "type": "seen", "source": "https://t.me/ctinow/186224", "content": "https://ift.tt/Renfb2q\nCVE-2023-47746 | IBM DB2/DB2 Connect Server 10.5/11.1/11.5 Query denial of service (XFDB-272644)", "creation_timestamp": "2024-02-16T10:11:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/395638f7-4a1e-45c0-8051-ff29c0cb7dd3/export"/>
    <published>2024-02-16T10:11:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2a78587e-dfa1-4b9c-bd7e-8a9d2dadb9d6/export</id>
    <title>2a78587e-dfa1-4b9c-bd7e-8a9d2dadb9d6</title>
    <updated>2026-05-04T09:29:41.520679+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2a78587e-dfa1-4b9c-bd7e-8a9d2dadb9d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47747", "type": "seen", "source": "https://t.me/ctinow/186226", "content": "https://ift.tt/LB4WzAZ\nCVE-2023-47747 | IBM DB2/DB2 Connect Server 10.5/11.1 /11.5 Query denial of service (XFDB-272646)", "creation_timestamp": "2024-02-16T10:11:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2a78587e-dfa1-4b9c-bd7e-8a9d2dadb9d6/export"/>
    <published>2024-02-16T10:11:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fcb44aac-3790-46ec-9984-f54419a08dbd/export</id>
    <title>fcb44aac-3790-46ec-9984-f54419a08dbd</title>
    <updated>2026-05-04T09:29:41.520601+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fcb44aac-3790-46ec-9984-f54419a08dbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47745", "type": "seen", "source": "https://t.me/ctinow/198718", "content": "https://ift.tt/OLIBDtN\nCVE-2023-47745", "creation_timestamp": "2024-03-03T13:26:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fcb44aac-3790-46ec-9984-f54419a08dbd/export"/>
    <published>2024-03-03T13:26:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/951c93d7-752f-49f9-acf1-2e0cd24beffb/export</id>
    <title>951c93d7-752f-49f9-acf1-2e0cd24beffb</title>
    <updated>2026-05-04T09:29:41.520502+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "951c93d7-752f-49f9-acf1-2e0cd24beffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47745", "type": "seen", "source": "https://t.me/ctinow/198720", "content": "https://ift.tt/OLIBDtN\nCVE-2023-47745", "creation_timestamp": "2024-03-03T13:31:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/951c93d7-752f-49f9-acf1-2e0cd24beffb/export"/>
    <published>2024-03-03T13:31:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8508e6d7-ae8e-4bf2-b857-357ee8b1597c/export</id>
    <title>8508e6d7-ae8e-4bf2-b857-357ee8b1597c</title>
    <updated>2026-05-04T09:29:41.520392+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8508e6d7-ae8e-4bf2-b857-357ee8b1597c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47742", "type": "seen", "source": "https://t.me/ctinow/198741", "content": "https://ift.tt/BRg0ZnS\nCVE-2023-47742", "creation_timestamp": "2024-03-03T14:26:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8508e6d7-ae8e-4bf2-b857-357ee8b1597c/export"/>
    <published>2024-03-03T14:26:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fa7d3a6e-2737-41b8-844d-d7a01283180d/export</id>
    <title>fa7d3a6e-2737-41b8-844d-d7a01283180d</title>
    <updated>2026-05-04T09:29:41.516836+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fa7d3a6e-2737-41b8-844d-d7a01283180d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-47742", "type": "seen", "source": "https://t.me/ctinow/198745", "content": "https://ift.tt/BRg0ZnS\nCVE-2023-47742", "creation_timestamp": "2024-03-03T14:31:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fa7d3a6e-2737-41b8-844d-d7a01283180d/export"/>
    <published>2024-03-03T14:31:31+00:00</published>
  </entry>
</feed>
