<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T18:21:05.460015+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9c16d715-d17b-400a-b7b1-2a05a83a1536/export</id>
    <title>9c16d715-d17b-400a-b7b1-2a05a83a1536</title>
    <updated>2026-05-05T18:21:05.881976+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9c16d715-d17b-400a-b7b1-2a05a83a1536", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50351", "type": "seen", "source": "https://t.me/ctinow/162166", "content": "https://ift.tt/4ivBNpl\nCVE-2023-50351", "creation_timestamp": "2024-01-03T03:26:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9c16d715-d17b-400a-b7b1-2a05a83a1536/export"/>
    <published>2024-01-03T03:26:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/39df28f0-e184-4ffd-8ef8-cd7b8491516b/export</id>
    <title>39df28f0-e184-4ffd-8ef8-cd7b8491516b</title>
    <updated>2026-05-05T18:21:05.881822+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "39df28f0-e184-4ffd-8ef8-cd7b8491516b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50351", "type": "seen", "source": "https://t.me/cibsecurity/74266", "content": "\u203c\ufe0fCVE-2023-50351\u203c\ufe0f\n\nHCL DRYiCE MyXalytics is impacted by the use of an insecure key rotation mechanism which can allow an attacker to compromise the confidentiality or integrity of data. \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:31:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/39df28f0-e184-4ffd-8ef8-cd7b8491516b/export"/>
    <published>2024-01-04T01:31:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/746f075a-8f0d-4ad4-aa65-b59a1ab6a84d/export</id>
    <title>746f075a-8f0d-4ad4-aa65-b59a1ab6a84d</title>
    <updated>2026-05-05T18:21:05.878993+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "746f075a-8f0d-4ad4-aa65-b59a1ab6a84d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50351", "type": "seen", "source": "https://t.me/ctinow/171940", "content": "https://ift.tt/KJU7xXh\nCVE-2023-50351 | HCL DRYiCE MyXalytics 5.9/6.0/6.1 Key Rotation cryptographic issues (KB0109608)", "creation_timestamp": "2024-01-23T13:31:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/746f075a-8f0d-4ad4-aa65-b59a1ab6a84d/export"/>
    <published>2024-01-23T13:31:48+00:00</published>
  </entry>
</feed>
