<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 18:24:19 +0000</lastBuildDate>
    <item>
      <title>46d59999-d523-466e-b0c0-5159a098a763</title>
      <link>https://vulnerability.circl.lu/sighting/46d59999-d523-466e-b0c0-5159a098a763/export</link>
      <description>{"uuid": "46d59999-d523-466e-b0c0-5159a098a763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "seen", "source": "https://t.me/cibsecurity/58484", "content": "\u203c CVE-2023-22232 \u203c\n\nAdobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-18T00:13:38.000000Z"}</description>
      <content:encoded>{"uuid": "46d59999-d523-466e-b0c0-5159a098a763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "seen", "source": "https://t.me/cibsecurity/58484", "content": "\u203c CVE-2023-22232 \u203c\n\nAdobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-18T00:13:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/46d59999-d523-466e-b0c0-5159a098a763/export</guid>
      <pubDate>Sat, 18 Feb 2023 00:13:38 +0000</pubDate>
    </item>
    <item>
      <title>ffeda214-7312-4929-9a13-3ab817bb3b09</title>
      <link>https://vulnerability.circl.lu/sighting/ffeda214-7312-4929-9a13-3ab817bb3b09/export</link>
      <description>{"uuid": "ffeda214-7312-4929-9a13-3ab817bb3b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "seen", "source": "https://t.me/arpsyndicate/1827", "content": "#ExploitObserverAlert\n\nCVE-2023-22232\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-22232. Adobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.\n\nFIRST-EPSS: 0.096260000\nNVD-IS: 1.4\nNVD-ES: 3.9", "creation_timestamp": "2023-12-16T14:29:20.000000Z"}</description>
      <content:encoded>{"uuid": "ffeda214-7312-4929-9a13-3ab817bb3b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "seen", "source": "https://t.me/arpsyndicate/1827", "content": "#ExploitObserverAlert\n\nCVE-2023-22232\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-22232. Adobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.\n\nFIRST-EPSS: 0.096260000\nNVD-IS: 1.4\nNVD-ES: 3.9", "creation_timestamp": "2023-12-16T14:29:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ffeda214-7312-4929-9a13-3ab817bb3b09/export</guid>
      <pubDate>Sat, 16 Dec 2023 14:29:20 +0000</pubDate>
    </item>
    <item>
      <title>0e62e0f6-d5ad-41fd-bf5b-6d7bb86082cf</title>
      <link>https://vulnerability.circl.lu/sighting/0e62e0f6-d5ad-41fd-bf5b-6d7bb86082cf/export</link>
      <description>{"uuid": "0e62e0f6-d5ad-41fd-bf5b-6d7bb86082cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "seen", "source": "https://t.me/codeb0ss/1373", "content": "https://nvd.nist.gov/vuln/detail/CVE-2023-22232", "creation_timestamp": "2024-02-12T22:31:57.000000Z"}</description>
      <content:encoded>{"uuid": "0e62e0f6-d5ad-41fd-bf5b-6d7bb86082cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "seen", "source": "https://t.me/codeb0ss/1373", "content": "https://nvd.nist.gov/vuln/detail/CVE-2023-22232", "creation_timestamp": "2024-02-12T22:31:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0e62e0f6-d5ad-41fd-bf5b-6d7bb86082cf/export</guid>
      <pubDate>Mon, 12 Feb 2024 22:31:57 +0000</pubDate>
    </item>
    <item>
      <title>cef48afd-340f-4411-b233-04603d2ff7be</title>
      <link>https://vulnerability.circl.lu/sighting/cef48afd-340f-4411-b233-04603d2ff7be/export</link>
      <description>{"uuid": "cef48afd-340f-4411-b233-04603d2ff7be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1374", "content": "", "creation_timestamp": "2024-02-12T22:31:59.000000Z"}</description>
      <content:encoded>{"uuid": "cef48afd-340f-4411-b233-04603d2ff7be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1374", "content": "", "creation_timestamp": "2024-02-12T22:31:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cef48afd-340f-4411-b233-04603d2ff7be/export</guid>
      <pubDate>Mon, 12 Feb 2024 22:31:59 +0000</pubDate>
    </item>
    <item>
      <title>cc679b57-3998-40ba-88d0-1ac555348264</title>
      <link>https://vulnerability.circl.lu/sighting/cc679b57-3998-40ba-88d0-1ac555348264/export</link>
      <description>{"uuid": "cc679b57-3998-40ba-88d0-1ac555348264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1187", "content": "CVE-2023-22232\n\nDescription\nAdobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.\n\nTemplate: https://github.com/projectdiscovery/nuclei-templates/blob/63028aebaf9056c4d786df3d9d2eff800e6db64c/http/cves/2023/CVE-2023-22232.yaml\n\nCVE-2023-22232\n\n\u062a\u0648\u0636\u06cc\u062d\u0627\u062a:\n\u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc 11.4.5 (\u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644\u06cc) \u0648 12.1.5 (\u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644\u06cc) Adobe Connect \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u0631\u0633\u06cc \u0646\u0627\u062f\u0631\u0633\u062a \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u0646\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u062f\u0648\u0631 \u0632\u062f\u0646 \u0648\u06cc\u0698\u06af\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0634\u0648\u062f. \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0631\u0627\u06cc \u062a\u0627\u062b\u06cc\u0631 \u0628\u0631 \u062a\u0645\u0627\u0645\u06cc\u062a \u06cc\u06a9 \u0648\u06cc\u0698\u06af\u06cc \u062c\u0632\u0626\u06cc \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u062f. \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u0646\u06cc\u0627\u0632\u06cc \u0628\u0647 \u062a\u0639\u0627\u0645\u0644 \u06a9\u0627\u0631\u0628\u0631 \u0646\u062f\u0627\u0631\u062f.\n\n\u0627\u0644\u06af\u0648: https://github.com/projectdiscovery/nuclei-templates/blob/63028aebaf9056c4d786df3d9d2eff800e6db64c/http/cves/2023/CVE-2023-22232.yaml", "creation_timestamp": "2024-06-26T11:36:28.000000Z"}</description>
      <content:encoded>{"uuid": "cc679b57-3998-40ba-88d0-1ac555348264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22232", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1187", "content": "CVE-2023-22232\n\nDescription\nAdobe Connect versions 11.4.5 (and earlier), 12.1.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the integrity of a minor feature. Exploitation of this issue does not require user interaction.\n\nTemplate: https://github.com/projectdiscovery/nuclei-templates/blob/63028aebaf9056c4d786df3d9d2eff800e6db64c/http/cves/2023/CVE-2023-22232.yaml\n\nCVE-2023-22232\n\n\u062a\u0648\u0636\u06cc\u062d\u0627\u062a:\n\u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc 11.4.5 (\u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644\u06cc) \u0648 12.1.5 (\u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0642\u0628\u0644\u06cc) Adobe Connect \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u0631\u0633\u06cc \u0646\u0627\u062f\u0631\u0633\u062a \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u0646\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u062f\u0648\u0631 \u0632\u062f\u0646 \u0648\u06cc\u0698\u06af\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0634\u0648\u062f. \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0631\u0627\u06cc \u062a\u0627\u062b\u06cc\u0631 \u0628\u0631 \u062a\u0645\u0627\u0645\u06cc\u062a \u06cc\u06a9 \u0648\u06cc\u0698\u06af\u06cc \u062c\u0632\u0626\u06cc \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u062f. \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u0646\u06cc\u0627\u0632\u06cc \u0628\u0647 \u062a\u0639\u0627\u0645\u0644 \u06a9\u0627\u0631\u0628\u0631 \u0646\u062f\u0627\u0631\u062f.\n\n\u0627\u0644\u06af\u0648: https://github.com/projectdiscovery/nuclei-templates/blob/63028aebaf9056c4d786df3d9d2eff800e6db64c/http/cves/2023/CVE-2023-22232.yaml", "creation_timestamp": "2024-06-26T11:36:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cc679b57-3998-40ba-88d0-1ac555348264/export</guid>
      <pubDate>Wed, 26 Jun 2024 11:36:28 +0000</pubDate>
    </item>
  </channel>
</rss>
