<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T22:49:36.206460+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f7ac30bf-5784-49c4-a6dc-0a95ffd1a3ed/export</id>
    <title>f7ac30bf-5784-49c4-a6dc-0a95ffd1a3ed</title>
    <updated>2026-05-06T22:49:36.700278+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f7ac30bf-5784-49c4-a6dc-0a95ffd1a3ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5499", "type": "seen", "source": "https://t.me/cibsecurity/71944", "content": "\u203c CVE-2023-5499 \u203c\n\nInformation exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T18:16:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f7ac30bf-5784-49c4-a6dc-0a95ffd1a3ed/export"/>
    <published>2023-10-10T18:16:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0b6282db-8ddc-4272-9535-c0812dbe74c3/export</id>
    <title>0b6282db-8ddc-4272-9535-c0812dbe74c3</title>
    <updated>2026-05-06T22:49:36.696973+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0b6282db-8ddc-4272-9535-c0812dbe74c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5499", "type": "seen", "source": "https://t.me/arpsyndicate/2401", "content": "#ExploitObserverAlert\n\nCVE-2023-5499\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5499. Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations.\n\nFIRST-EPSS: 0.001030000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-04T01:42:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0b6282db-8ddc-4272-9535-c0812dbe74c3/export"/>
    <published>2024-01-04T01:42:55+00:00</published>
  </entry>
</feed>
