<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T22:56:57.459867+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7ebfe6fc-4570-4070-9083-5ccd5b10dd6f/export</id>
    <title>7ebfe6fc-4570-4070-9083-5ccd5b10dd6f</title>
    <updated>2026-05-10T22:56:57.821778+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7ebfe6fc-4570-4070-9083-5ccd5b10dd6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-9838", "type": "seen", "source": "https://t.me/BleepingComputer/400", "content": "Latest news and stories from BleepingComputer.com\nVulnerability in Joomla Allows Attackers to Reset Passwords and Take Over Sites\n\nThe Joomla Project released version 3.6.5 of the Joomla CMS that addresses three security bugs, of which one can allow attackers to take over vulnerable sites. If this wasn't bad enough, this vulnerability, tracked as CVE-2016-9838, affects all Joomla versions released in the past five years. [...]", "creation_timestamp": "2016-12-14T11:51:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7ebfe6fc-4570-4070-9083-5ccd5b10dd6f/export"/>
    <published>2016-12-14T11:51:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1cee3faa-2831-4fc7-b4a5-b120f76595fd/export</id>
    <title>1cee3faa-2831-4fc7-b4a5-b120f76595fd</title>
    <updated>2026-05-10T22:56:57.819337+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1cee3faa-2831-4fc7-b4a5-b120f76595fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-9838", "type": "published-proof-of-concept", "source": "https://t.me/r3_6j/443", "content": "\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0644 \u062b\u063a\u0631\u0647 cve-2016-9838", "creation_timestamp": "2024-04-27T23:51:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1cee3faa-2831-4fc7-b4a5-b120f76595fd/export"/>
    <published>2024-04-27T23:51:27+00:00</published>
  </entry>
</feed>
