<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 07:26:22 +0000</lastBuildDate>
    <item>
      <title>e1b8a150-64b7-4ef2-843c-1575800c7ff5</title>
      <link>https://vulnerability.circl.lu/sighting/e1b8a150-64b7-4ef2-843c-1575800c7ff5/export</link>
      <description>{"uuid": "e1b8a150-64b7-4ef2-843c-1575800c7ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22493", "type": "seen", "source": "https://t.me/cibsecurity/56488", "content": "\u203c CVE-2023-22493 \u203c\n\nRSSHub is an open source RSS feed generator. RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. An attacker could also use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. The patch for this issue can be found in commit a66cbcf.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-13T18:31:13.000000Z"}</description>
      <content:encoded>{"uuid": "e1b8a150-64b7-4ef2-843c-1575800c7ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22493", "type": "seen", "source": "https://t.me/cibsecurity/56488", "content": "\u203c CVE-2023-22493 \u203c\n\nRSSHub is an open source RSS feed generator. RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. An attacker could also use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. The patch for this issue can be found in commit a66cbcf.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-13T18:31:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e1b8a150-64b7-4ef2-843c-1575800c7ff5/export</guid>
      <pubDate>Fri, 13 Jan 2023 18:31:13 +0000</pubDate>
    </item>
    <item>
      <title>f2efb672-20d1-4b10-bb3f-9eb9968b564c</title>
      <link>https://vulnerability.circl.lu/sighting/f2efb672-20d1-4b10-bb3f-9eb9968b564c/export</link>
      <description>{"uuid": "f2efb672-20d1-4b10-bb3f-9eb9968b564c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22493", "type": "published-proof-of-concept", "source": "Telegram/3kjMLtWVSsmD2y1OzP7zGlpEhe6KWlREURwzXKH3eCeJgh0", "content": "", "creation_timestamp": "2025-07-31T03:00:05.000000Z"}</description>
      <content:encoded>{"uuid": "f2efb672-20d1-4b10-bb3f-9eb9968b564c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22493", "type": "published-proof-of-concept", "source": "Telegram/3kjMLtWVSsmD2y1OzP7zGlpEhe6KWlREURwzXKH3eCeJgh0", "content": "", "creation_timestamp": "2025-07-31T03:00:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2efb672-20d1-4b10-bb3f-9eb9968b564c/export</guid>
      <pubDate>Thu, 31 Jul 2025 03:00:05 +0000</pubDate>
    </item>
  </channel>
</rss>
