<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T03:38:06.413970+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d8170b6b-ab95-4743-afa3-99b16f5c7566/export</id>
    <title>d8170b6b-ab95-4743-afa3-99b16f5c7566</title>
    <updated>2026-05-05T03:38:06.786177+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d8170b6b-ab95-4743-afa3-99b16f5c7566", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51417", "type": "seen", "source": "https://t.me/ctinow/160552", "content": "https://ift.tt/1JUZNM3\nCVE-2023-51417", "creation_timestamp": "2023-12-29T15:26:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d8170b6b-ab95-4743-afa3-99b16f5c7566/export"/>
    <published>2023-12-29T15:26:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a9229d24-01be-4adb-99eb-d11db825aa7a/export</id>
    <title>a9229d24-01be-4adb-99eb-d11db825aa7a</title>
    <updated>2026-05-05T03:38:06.786078+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a9229d24-01be-4adb-99eb-d11db825aa7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51417", "type": "seen", "source": "https://t.me/cibsecurity/73983", "content": "\u203c\ufe0fCVE-2023-51417\u203c\ufe0f\n\nUnrestricted Upload of File with Dangerous Type vulnerability in Joris van Montfort JVM Gutenberg Rich Text Icons.This issue affects JVM Gutenberg Rich Text Icons from na through 1.2.3.  \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:41:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a9229d24-01be-4adb-99eb-d11db825aa7a/export"/>
    <published>2023-12-30T01:41:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c06748e-c63b-4a30-bc76-6ae3c791bfdf/export</id>
    <title>8c06748e-c63b-4a30-bc76-6ae3c791bfdf</title>
    <updated>2026-05-05T03:38:06.783600+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c06748e-c63b-4a30-bc76-6ae3c791bfdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-51417", "type": "seen", "source": "https://t.me/ctinow/170856", "content": "https://ift.tt/wx3DFlc\nCVE-2023-51417 | Joris van Montfort JVM Gutenberg Rich Text Icons Plugin up to 1.2.3 on WordPress unrestricted upload", "creation_timestamp": "2024-01-21T15:16:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c06748e-c63b-4a30-bc76-6ae3c791bfdf/export"/>
    <published>2024-01-21T15:16:10+00:00</published>
  </entry>
</feed>
