<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:00:09.616926+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7ec661a9-f057-46b2-bf34-2a8df40a83b2/export</id>
    <title>7ec661a9-f057-46b2-bf34-2a8df40a83b2</title>
    <updated>2026-05-06T09:00:09.918255+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7ec661a9-f057-46b2-bf34-2a8df40a83b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52112", "type": "seen", "source": "https://t.me/ctinow/178646", "content": "https://ift.tt/FoPC2Mm\nCVE-2023-52112 | Huawei HarmonyOS/EMUI Wallpaper Service Module access control", "creation_timestamp": "2024-02-03T21:26:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7ec661a9-f057-46b2-bf34-2a8df40a83b2/export"/>
    <published>2024-02-03T21:26:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f2c83d1f-dd24-400e-bf0f-1b076074f8e5/export</id>
    <title>f2c83d1f-dd24-400e-bf0f-1b076074f8e5</title>
    <updated>2026-05-06T09:00:09.918116+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f2c83d1f-dd24-400e-bf0f-1b076074f8e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52114", "type": "seen", "source": "https://t.me/ctinow/178647", "content": "https://ift.tt/1pQ4G5o\nCVE-2023-52114 | Huawei HarmonyOS/EMUI ScreenReader Module access control", "creation_timestamp": "2024-02-03T21:26:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f2c83d1f-dd24-400e-bf0f-1b076074f8e5/export"/>
    <published>2024-02-03T21:26:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a/export</id>
    <title>ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a</title>
    <updated>2026-05-06T09:00:09.917955+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52115", "type": "seen", "source": "https://t.me/ctinow/178649", "content": "https://ift.tt/7dE8tZa\nCVE-2023-52115 | Huawei HarmonyOS 4.0.0 iAware Module use after free", "creation_timestamp": "2024-02-03T21:56:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a/export"/>
    <published>2024-02-03T21:56:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9497497-978f-4b37-b191-8c2d30f3d9da/export</id>
    <title>d9497497-978f-4b37-b191-8c2d30f3d9da</title>
    <updated>2026-05-06T09:00:09.917803+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9497497-978f-4b37-b191-8c2d30f3d9da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52116", "type": "seen", "source": "https://t.me/ctinow/178650", "content": "https://ift.tt/P1DVlgI\nCVE-2023-52116 | Huawei HarmonyOS/EMUI Multi-Screen Interaction Module privileges management", "creation_timestamp": "2024-02-03T21:56:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9497497-978f-4b37-b191-8c2d30f3d9da/export"/>
    <published>2024-02-03T21:56:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c1f7f180-6712-4717-a832-c925e3a9e88e/export</id>
    <title>c1f7f180-6712-4717-a832-c925e3a9e88e</title>
    <updated>2026-05-06T09:00:09.917637+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c1f7f180-6712-4717-a832-c925e3a9e88e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52118", "type": "seen", "source": "https://t.me/ctinow/192464", "content": "https://ift.tt/BvFUC6A\nCVE-2023-52118 | WP Event Manager WP User Profile Avatar Plugin up to 1.0 on WordPress cross site scripting", "creation_timestamp": "2024-02-24T08:11:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c1f7f180-6712-4717-a832-c925e3a9e88e/export"/>
    <published>2024-02-24T08:11:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d023180e-97a0-43cf-b464-4b0327ace53f/export</id>
    <title>d023180e-97a0-43cf-b464-4b0327ace53f</title>
    <updated>2026-05-06T09:00:09.917466+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d023180e-97a0-43cf-b464-4b0327ace53f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52119", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17418", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52119\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Icegram Icegram Engage \u2013 WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building.This issue affects Icegram Engage \u2013 WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building: from n/a through 3.1.18.\n\n\n\ud83d\udccf Published: 2024-01-05T09:28:10.115Z\n\ud83d\udccf Modified: 2025-05-23T16:03:25.681Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/icegram/wordpress-icegram-engage-plugin-3-1-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-23T16:46:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d023180e-97a0-43cf-b464-4b0327ace53f/export"/>
    <published>2025-05-23T16:46:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/12126801-9432-47e4-a4fb-6ee452551eed/export</id>
    <title>12126801-9432-47e4-a4fb-6ee452551eed</title>
    <updated>2026-05-06T09:00:09.917303+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "12126801-9432-47e4-a4fb-6ee452551eed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52115", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18304", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52115\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The iaware module has a Use-After-Free (UAF) vulnerability. Successful exploitation of this vulnerability may affect the system functions.\n\ud83d\udccf Published: 2024-01-16T08:22:31.324Z\n\ud83d\udccf Modified: 2025-06-13T16:10:42.713Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-13T16:37:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/12126801-9432-47e4-a4fb-6ee452551eed/export"/>
    <published>2025-06-13T16:37:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b70554e5-cb59-4cf9-8efe-af4c4b64fafb/export</id>
    <title>b70554e5-cb59-4cf9-8efe-af4c4b64fafb</title>
    <updated>2026-05-06T09:00:09.917129+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b70554e5-cb59-4cf9-8efe-af4c4b64fafb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52113", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19017", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52113\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability.\n\ud83d\udccf Published: 2024-01-16T07:58:43.439Z\n\ud83d\udccf Modified: 2025-06-20T17:20:27.978Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b70554e5-cb59-4cf9-8efe-af4c4b64fafb/export"/>
    <published>2025-06-20T17:46:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e81867e3-568e-4fb7-850d-11e429a2cefb/export</id>
    <title>e81867e3-568e-4fb7-850d-11e429a2cefb</title>
    <updated>2026-05-06T09:00:09.916900+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e81867e3-568e-4fb7-850d-11e429a2cefb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52112", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19018", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52112\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2024-01-16T07:57:06.023Z\n\ud83d\udccf Modified: 2025-06-20T17:19:28.707Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e81867e3-568e-4fb7-850d-11e429a2cefb/export"/>
    <published>2025-06-20T17:46:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b0fac721-ef92-4135-96df-143ec5716047/export</id>
    <title>b0fac721-ef92-4135-96df-143ec5716047</title>
    <updated>2026-05-06T09:00:09.914705+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b0fac721-ef92-4135-96df-143ec5716047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52110", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19019", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52110\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The sensor module has an out-of-bounds access vulnerability.Successful exploitation of this vulnerability may affect availability.\n\ud83d\udccf Published: 2024-01-16T07:54:39.422Z\n\ud83d\udccf Modified: 2025-06-20T17:18:42.847Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b0fac721-ef92-4135-96df-143ec5716047/export"/>
    <published>2025-06-20T17:46:39+00:00</published>
  </entry>
</feed>
