<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:51:43.592163+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1155dc33-3ef5-4c9c-aad0-7753a2199cda/export</id>
    <title>1155dc33-3ef5-4c9c-aad0-7753a2199cda</title>
    <updated>2026-05-04T14:51:43.923755+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1155dc33-3ef5-4c9c-aad0-7753a2199cda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51358", "type": "seen", "source": "https://t.me/ctinow/160531", "content": "https://ift.tt/hZLFQzD\nCVE-2023-51358", "creation_timestamp": "2023-12-29T14:26:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1155dc33-3ef5-4c9c-aad0-7753a2199cda/export"/>
    <published>2023-12-29T14:26:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/02b395dd-78c3-4584-8623-2bea39a3765a/export</id>
    <title>02b395dd-78c3-4584-8623-2bea39a3765a</title>
    <updated>2026-05-04T14:51:43.923625+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "02b395dd-78c3-4584-8623-2bea39a3765a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51358", "type": "seen", "source": "https://t.me/cibsecurity/73970", "content": "\u203c\ufe0fCVE-2023-51358\u203c\ufe0f\n\nCrossSite Request Forgery CSRF vulnerability in Bright Plugins Block IPs for Gravity Forms.This issue affects Block IPs for Gravity Forms from na through 1.0.1.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:40:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/02b395dd-78c3-4584-8623-2bea39a3765a/export"/>
    <published>2023-12-30T01:40:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/178fb3d8-e637-462d-b353-debe3ccdf20e/export</id>
    <title>178fb3d8-e637-462d-b353-debe3ccdf20e</title>
    <updated>2026-05-04T14:51:43.921014+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "178fb3d8-e637-462d-b353-debe3ccdf20e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51358", "type": "seen", "source": "https://t.me/ctinow/170880", "content": "https://ift.tt/uCBVlsv\nCVE-2023-51358 | Bright Plugins Block IPs for Gravity Forms Plugin up to 1.0.1 on WordPress cross-site request forgery", "creation_timestamp": "2024-01-21T16:16:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/178fb3d8-e637-462d-b353-debe3ccdf20e/export"/>
    <published>2024-01-21T16:16:37+00:00</published>
  </entry>
</feed>
