<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 17:24:37 +0000</lastBuildDate>
    <item>
      <title>a5463f3d-0f55-4d26-b08d-344438e074e8</title>
      <link>https://vulnerability.circl.lu/sighting/a5463f3d-0f55-4d26-b08d-344438e074e8/export</link>
      <description>{"uuid": "a5463f3d-0f55-4d26-b08d-344438e074e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://t.me/thebugbountyhunter/7351", "content": "Adobe ColdFusion RCE CVE-2023-26359\n\nhttps://attackerkb.com/topics/1iRdvtUgtW/cve-2023-26359/rapid7-analysis", "creation_timestamp": "2023-05-17T18:51:29.000000Z"}</description>
      <content:encoded>{"uuid": "a5463f3d-0f55-4d26-b08d-344438e074e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://t.me/thebugbountyhunter/7351", "content": "Adobe ColdFusion RCE CVE-2023-26359\n\nhttps://attackerkb.com/topics/1iRdvtUgtW/cve-2023-26359/rapid7-analysis", "creation_timestamp": "2023-05-17T18:51:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a5463f3d-0f55-4d26-b08d-344438e074e8/export</guid>
      <pubDate>Wed, 17 May 2023 18:51:29 +0000</pubDate>
    </item>
    <item>
      <title>7db45c34-1bea-4e98-becc-53ef37e0b987</title>
      <link>https://vulnerability.circl.lu/sighting/7db45c34-1bea-4e98-becc-53ef37e0b987/export</link>
      <description>{"uuid": "7db45c34-1bea-4e98-becc-53ef37e0b987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-08-21T18:10:02.000000Z"}</description>
      <content:encoded>{"uuid": "7db45c34-1bea-4e98-becc-53ef37e0b987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-08-21T18:10:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7db45c34-1bea-4e98-becc-53ef37e0b987/export</guid>
      <pubDate>Mon, 21 Aug 2023 18:10:02 +0000</pubDate>
    </item>
    <item>
      <title>641683a4-20cb-4920-8d79-b89960baa503</title>
      <link>https://vulnerability.circl.lu/sighting/641683a4-20cb-4920-8d79-b89960baa503/export</link>
      <description>{"uuid": "641683a4-20cb-4920-8d79-b89960baa503", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "https://t.me/thehackernews/3771", "content": "Critical security flaw (CVE-2023-26359) in Adobe ColdFusion added to CISA's catalog of known exploited vulnerabilities. \n \nRead: https://thehackernews.com/2023/08/critical-adobe-coldfusion-flaw-added-to.html \n \nAffects ColdFusion 2018 and 2021. Patched by Adobe in March, but active exploitation evidence is concerning.", "creation_timestamp": "2023-08-22T05:39:52.000000Z"}</description>
      <content:encoded>{"uuid": "641683a4-20cb-4920-8d79-b89960baa503", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "https://t.me/thehackernews/3771", "content": "Critical security flaw (CVE-2023-26359) in Adobe ColdFusion added to CISA's catalog of known exploited vulnerabilities. \n \nRead: https://thehackernews.com/2023/08/critical-adobe-coldfusion-flaw-added-to.html \n \nAffects ColdFusion 2018 and 2021. Patched by Adobe in March, but active exploitation evidence is concerning.", "creation_timestamp": "2023-08-22T05:39:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/641683a4-20cb-4920-8d79-b89960baa503/export</guid>
      <pubDate>Tue, 22 Aug 2023 05:39:52 +0000</pubDate>
    </item>
    <item>
      <title>03292cbd-9242-42f2-95c0-0e0b27bc9b24</title>
      <link>https://vulnerability.circl.lu/sighting/03292cbd-9242-42f2-95c0-0e0b27bc9b24/export</link>
      <description>{"uuid": "03292cbd-9242-42f2-95c0-0e0b27bc9b24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://t.me/JerusalemElectronicArmy/558", "content": "#\u0623\u062e\u0628\u0627\u0631_\u0627\u0644\u0633\u0627\u064a\u0628\u0631 \n\n\u062b\u063a\u0631\u0629 \u0623\u0645\u0627\u0646 \u062d\u0631\u062c\u0629 (CVE-2023-26359) \u0641\u064a Adobe ColdFusion \u062a\u0645\u062a \u0625\u0636\u0627\u0641\u062a\u0647\u0627 \u0625\u0644\u0649 \u0641\u0647\u0631\u0633 CISA \u0644\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0639\u0631\u0648\u0641\u0629 \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627.\n#\u062c\u064a\u0634_\u0627\u0644\u0642\u062f\u0633_\u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a", "creation_timestamp": "2023-08-22T07:17:54.000000Z"}</description>
      <content:encoded>{"uuid": "03292cbd-9242-42f2-95c0-0e0b27bc9b24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://t.me/JerusalemElectronicArmy/558", "content": "#\u0623\u062e\u0628\u0627\u0631_\u0627\u0644\u0633\u0627\u064a\u0628\u0631 \n\n\u062b\u063a\u0631\u0629 \u0623\u0645\u0627\u0646 \u062d\u0631\u062c\u0629 (CVE-2023-26359) \u0641\u064a Adobe ColdFusion \u062a\u0645\u062a \u0625\u0636\u0627\u0641\u062a\u0647\u0627 \u0625\u0644\u0649 \u0641\u0647\u0631\u0633 CISA \u0644\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0639\u0631\u0648\u0641\u0629 \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627.\n#\u062c\u064a\u0634_\u0627\u0644\u0642\u062f\u0633_\u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a", "creation_timestamp": "2023-08-22T07:17:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/03292cbd-9242-42f2-95c0-0e0b27bc9b24/export</guid>
      <pubDate>Tue, 22 Aug 2023 07:17:54 +0000</pubDate>
    </item>
    <item>
      <title>51fb57b1-d957-4524-b987-359881dd9b5a</title>
      <link>https://vulnerability.circl.lu/sighting/51fb57b1-d957-4524-b987-359881dd9b5a/export</link>
      <description>{"uuid": "51fb57b1-d957-4524-b987-359881dd9b5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "https://t.me/KomunitiSiber/685", "content": "Critical Adobe ColdFusion Flaw Added to CISA's Exploited Vulnerability Catalog\nhttps://thehackernews.com/2023/08/critical-adobe-coldfusion-flaw-added-to.html\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has\u00a0added\u00a0a critical security flaw in Adobe ColdFusion to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.\nThe vulnerability, cataloged as\u00a0CVE-2023-26359\u00a0(CVSS score: 9.8), relates to a deserialization flaw present in Adobe ColdFusion 2018 (Update 15 and earlier) and ColdFusion 2021 (", "creation_timestamp": "2023-08-22T07:19:28.000000Z"}</description>
      <content:encoded>{"uuid": "51fb57b1-d957-4524-b987-359881dd9b5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "https://t.me/KomunitiSiber/685", "content": "Critical Adobe ColdFusion Flaw Added to CISA's Exploited Vulnerability Catalog\nhttps://thehackernews.com/2023/08/critical-adobe-coldfusion-flaw-added-to.html\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has\u00a0added\u00a0a critical security flaw in Adobe ColdFusion to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.\nThe vulnerability, cataloged as\u00a0CVE-2023-26359\u00a0(CVSS score: 9.8), relates to a deserialization flaw present in Adobe ColdFusion 2018 (Update 15 and earlier) and ColdFusion 2021 (", "creation_timestamp": "2023-08-22T07:19:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/51fb57b1-d957-4524-b987-359881dd9b5a/export</guid>
      <pubDate>Tue, 22 Aug 2023 07:19:28 +0000</pubDate>
    </item>
    <item>
      <title>38259d74-a4e2-4d12-b746-365816100f2d</title>
      <link>https://vulnerability.circl.lu/sighting/38259d74-a4e2-4d12-b746-365816100f2d/export</link>
      <description>{"uuid": "38259d74-a4e2-4d12-b746-365816100f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "Telegram/VnNTtyy2npF0CtTntnVyvzAJ1oW5ItcL1tiJ9G0Xzen4Fw", "content": "", "creation_timestamp": "2023-08-22T07:53:38.000000Z"}</description>
      <content:encoded>{"uuid": "38259d74-a4e2-4d12-b746-365816100f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "Telegram/VnNTtyy2npF0CtTntnVyvzAJ1oW5ItcL1tiJ9G0Xzen4Fw", "content": "", "creation_timestamp": "2023-08-22T07:53:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/38259d74-a4e2-4d12-b746-365816100f2d/export</guid>
      <pubDate>Tue, 22 Aug 2023 07:53:38 +0000</pubDate>
    </item>
    <item>
      <title>ca380ac3-f36b-43b8-8638-dceb183486e0</title>
      <link>https://vulnerability.circl.lu/sighting/ca380ac3-f36b-43b8-8638-dceb183486e0/export</link>
      <description>{"uuid": "ca380ac3-f36b-43b8-8638-dceb183486e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://t.me/arpsyndicate/953", "content": "#ExploitObserverAlert\n\nCVE-2023-26359\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-26359. Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.\n\nFIRST-EPSS: 0.563320000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-03T14:22:33.000000Z"}</description>
      <content:encoded>{"uuid": "ca380ac3-f36b-43b8-8638-dceb183486e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://t.me/arpsyndicate/953", "content": "#ExploitObserverAlert\n\nCVE-2023-26359\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-26359. Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.\n\nFIRST-EPSS: 0.563320000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-03T14:22:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ca380ac3-f36b-43b8-8638-dceb183486e0/export</guid>
      <pubDate>Sun, 03 Dec 2023 14:22:33 +0000</pubDate>
    </item>
    <item>
      <title>c7419e72-2642-4f05-8b9c-aa3823b98e3f</title>
      <link>https://vulnerability.circl.lu/sighting/c7419e72-2642-4f05-8b9c-aa3823b98e3f/export</link>
      <description>{"uuid": "c7419e72-2642-4f05-8b9c-aa3823b98e3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971869", "content": "", "creation_timestamp": "2024-12-24T20:35:02.411398Z"}</description>
      <content:encoded>{"uuid": "c7419e72-2642-4f05-8b9c-aa3823b98e3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971869", "content": "", "creation_timestamp": "2024-12-24T20:35:02.411398Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c7419e72-2642-4f05-8b9c-aa3823b98e3f/export</guid>
      <pubDate>Tue, 24 Dec 2024 20:35:02 +0000</pubDate>
    </item>
    <item>
      <title>ef7fd5e4-619b-4a85-8cc3-574134ad1edc</title>
      <link>https://vulnerability.circl.lu/sighting/ef7fd5e4-619b-4a85-8cc3-574134ad1edc/export</link>
      <description>{"uuid": "ef7fd5e4-619b-4a85-8cc3-574134ad1edc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:45.000000Z"}</description>
      <content:encoded>{"uuid": "ef7fd5e4-619b-4a85-8cc3-574134ad1edc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26359", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ef7fd5e4-619b-4a85-8cc3-574134ad1edc/export</guid>
      <pubDate>Sun, 23 Feb 2025 02:10:45 +0000</pubDate>
    </item>
    <item>
      <title>ed9fd404-a188-42d3-b0f4-74e59f63e24b</title>
      <link>https://vulnerability.circl.lu/sighting/ed9fd404-a188-42d3-b0f4-74e59f63e24b/export</link>
      <description>{"uuid": "ed9fd404-a188-42d3-b0f4-74e59f63e24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2cf50a8b-557f-41df-9110-8c80dee31012", "content": "", "creation_timestamp": "2026-02-02T12:26:53.641725Z"}</description>
      <content:encoded>{"uuid": "ed9fd404-a188-42d3-b0f4-74e59f63e24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-26359", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2cf50a8b-557f-41df-9110-8c80dee31012", "content": "", "creation_timestamp": "2026-02-02T12:26:53.641725Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ed9fd404-a188-42d3-b0f4-74e59f63e24b/export</guid>
      <pubDate>Mon, 02 Feb 2026 12:26:53 +0000</pubDate>
    </item>
  </channel>
</rss>
