<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:44:24.337524+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bc79e3f3-92ed-445c-9abc-823a04f1ff84/export</id>
    <title>bc79e3f3-92ed-445c-9abc-823a04f1ff84</title>
    <updated>2026-05-04T19:44:24.672531+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bc79e3f3-92ed-445c-9abc-823a04f1ff84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "seen", "source": "https://t.me/ctinow/166571", "content": "https://ift.tt/1isDCkL\nCVE-2023-50159", "creation_timestamp": "2024-01-11T15:52:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bc79e3f3-92ed-445c-9abc-823a04f1ff84/export"/>
    <published>2024-01-11T15:52:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0903e36a-c348-4a26-b312-3de6ddb1106e/export</id>
    <title>0903e36a-c348-4a26-b312-3de6ddb1106e</title>
    <updated>2026-05-04T19:44:24.672440+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0903e36a-c348-4a26-b312-3de6ddb1106e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "seen", "source": "https://t.me/ctinow/169934", "content": "https://ift.tt/qKDtVWv\nCVE-2023-50159 Exploit", "creation_timestamp": "2024-01-18T21:16:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0903e36a-c348-4a26-b312-3de6ddb1106e/export"/>
    <published>2024-01-18T21:16:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a16cb9cf-868b-4bdb-9fa2-badde183670d/export</id>
    <title>a16cb9cf-868b-4bdb-9fa2-badde183670d</title>
    <updated>2026-05-04T19:44:24.672303+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a16cb9cf-868b-4bdb-9fa2-badde183670d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "seen", "source": "https://t.me/ctinow/175967", "content": "https://ift.tt/XKhI1vH\nCVE-2023-50159 | ScaleFusion 10.5.2 Kiosk Mode access control", "creation_timestamp": "2024-01-30T15:22:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a16cb9cf-868b-4bdb-9fa2-badde183670d/export"/>
    <published>2024-01-30T15:22:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/73e91fc2-d4a6-45bf-bd35-9a93d6529580/export</id>
    <title>73e91fc2-d4a6-45bf-bd35-9a93d6529580</title>
    <updated>2026-05-04T19:44:24.669177+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "73e91fc2-d4a6-45bf-bd35-9a93d6529580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18625", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-50159\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ScaleFusion (Windows Desktop App) agent 10.5.2, Kiosk mode application restrictions can be bypassed allowing arbitrary code to be executed. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.\n\ud83d\udccf Published: 2024-01-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-17T16:03:06.166Z\n\ud83d\udd17 References:\n1. https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59\n2. https://medium.com/nestedif/vulnerability-disclosure-browser-mode-kiosk-bypass-scalefusion-832f5a18ebb6\n3. https://help.scalefusion.com/docs/security-advisory-for-windows-mdm-agent", "creation_timestamp": "2025-06-17T16:41:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/73e91fc2-d4a6-45bf-bd35-9a93d6529580/export"/>
    <published>2025-06-17T16:41:22+00:00</published>
  </entry>
</feed>
