<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T02:08:33.271140+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8892fad5-633e-46d1-a3d4-6e0de0c172f8/export</id>
    <title>8892fad5-633e-46d1-a3d4-6e0de0c172f8</title>
    <updated>2026-05-05T02:08:33.641819+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8892fad5-633e-46d1-a3d4-6e0de0c172f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50345", "type": "seen", "source": "https://t.me/ctinow/162162", "content": "https://ift.tt/zD2EuWZ\nCVE-2023-50345", "creation_timestamp": "2024-01-03T03:26:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8892fad5-633e-46d1-a3d4-6e0de0c172f8/export"/>
    <published>2024-01-03T03:26:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/98857aed-491f-40f5-a267-65365db798bb/export</id>
    <title>98857aed-491f-40f5-a267-65365db798bb</title>
    <updated>2026-05-05T02:08:33.641412+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "98857aed-491f-40f5-a267-65365db798bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50345", "type": "seen", "source": "https://t.me/cibsecurity/74262", "content": "\u203c\ufe0fCVE-2023-50345\u203c\ufe0f\n\nHCL DRYiCE MyXalytics is impacted by an Open Redirect vulnerability which could allow an attacker to redirect users to malicious sites, potentially leading to phishing attacks or other security threats. \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:31:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/98857aed-491f-40f5-a267-65365db798bb/export"/>
    <published>2024-01-04T01:31:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/aec42acf-dd3a-4f67-8d23-778b284c3c45/export</id>
    <title>aec42acf-dd3a-4f67-8d23-778b284c3c45</title>
    <updated>2026-05-05T02:08:33.637658+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "aec42acf-dd3a-4f67-8d23-778b284c3c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50345", "type": "seen", "source": "https://t.me/ctinow/171810", "content": "https://ift.tt/vmtI79R\nCVE-2023-50345 | HCL DRYiCE MyXalytics 5.9/6.0/6.1 redirect (KB0109608)", "creation_timestamp": "2024-01-23T09:56:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/aec42acf-dd3a-4f67-8d23-778b284c3c45/export"/>
    <published>2024-01-23T09:56:23+00:00</published>
  </entry>
</feed>
