<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 09:47:00 +0000</lastBuildDate>
    <item>
      <title>5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad</title>
      <link>https://vulnerability.circl.lu/sighting/5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad/export</link>
      <description>{"uuid": "5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27013", "type": "seen", "source": "https://t.me/cibsecurity/61636", "content": "\u203c CVE-2023-27013 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:09.000000Z"}</description>
      <content:encoded>{"uuid": "5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27013", "type": "seen", "source": "https://t.me/cibsecurity/61636", "content": "\u203c CVE-2023-27013 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5f9de64a-d4a3-4a71-b8a4-b96d1a2a5aad/export</guid>
      <pubDate>Fri, 07 Apr 2023 07:27:09 +0000</pubDate>
    </item>
    <item>
      <title>ca5c01e5-ceb4-4c9a-8249-2109df599fc8</title>
      <link>https://vulnerability.circl.lu/sighting/ca5c01e5-ceb4-4c9a-8249-2109df599fc8/export</link>
      <description>{"uuid": "ca5c01e5-ceb4-4c9a-8249-2109df599fc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27016", "type": "seen", "source": "https://t.me/cibsecurity/61637", "content": "\u203c CVE-2023-27016 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the R7WebsSecurityHandler function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:10.000000Z"}</description>
      <content:encoded>{"uuid": "ca5c01e5-ceb4-4c9a-8249-2109df599fc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27016", "type": "seen", "source": "https://t.me/cibsecurity/61637", "content": "\u203c CVE-2023-27016 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the R7WebsSecurityHandler function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ca5c01e5-ceb4-4c9a-8249-2109df599fc8/export</guid>
      <pubDate>Fri, 07 Apr 2023 07:27:10 +0000</pubDate>
    </item>
    <item>
      <title>f3305c4c-b9c7-4007-8e0a-47d31ca76de1</title>
      <link>https://vulnerability.circl.lu/sighting/f3305c4c-b9c7-4007-8e0a-47d31ca76de1/export</link>
      <description>{"uuid": "f3305c4c-b9c7-4007-8e0a-47d31ca76de1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27017", "type": "seen", "source": "https://t.me/cibsecurity/61640", "content": "\u203c CVE-2023-27017 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_45DC58 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:16.000000Z"}</description>
      <content:encoded>{"uuid": "f3305c4c-b9c7-4007-8e0a-47d31ca76de1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27017", "type": "seen", "source": "https://t.me/cibsecurity/61640", "content": "\u203c CVE-2023-27017 \u203c\n\nTenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_45DC58 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f3305c4c-b9c7-4007-8e0a-47d31ca76de1/export</guid>
      <pubDate>Fri, 07 Apr 2023 07:27:16 +0000</pubDate>
    </item>
    <item>
      <title>30019dea-6529-4676-b008-0c97a5f77a18</title>
      <link>https://vulnerability.circl.lu/sighting/30019dea-6529-4676-b008-0c97a5f77a18/export</link>
      <description>{"uuid": "30019dea-6529-4676-b008-0c97a5f77a18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2701", "type": "seen", "source": "https://t.me/cibsecurity/66818", "content": "\u203c CVE-2023-2701 \u203c\n\nThe Gravity Forms WordPress plugin before 2.7.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high-privileged users such as admin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T18:40:15.000000Z"}</description>
      <content:encoded>{"uuid": "30019dea-6529-4676-b008-0c97a5f77a18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2701", "type": "seen", "source": "https://t.me/cibsecurity/66818", "content": "\u203c CVE-2023-2701 \u203c\n\nThe Gravity Forms WordPress plugin before 2.7.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high-privileged users such as admin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T18:40:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/30019dea-6529-4676-b008-0c97a5f77a18/export</guid>
      <pubDate>Mon, 17 Jul 2023 18:40:15 +0000</pubDate>
    </item>
    <item>
      <title>2e1a08df-7101-4383-b259-ecae1bc096ae</title>
      <link>https://vulnerability.circl.lu/sighting/2e1a08df-7101-4383-b259-ecae1bc096ae/export</link>
      <description>{"uuid": "2e1a08df-7101-4383-b259-ecae1bc096ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27019", "type": "seen", "source": "Telegram/5hH5ajtM-oZI8EMttLkpzze1UyaglwRFKGyZ2ZBcuYombhG4", "content": "", "creation_timestamp": "2025-02-14T10:05:08.000000Z"}</description>
      <content:encoded>{"uuid": "2e1a08df-7101-4383-b259-ecae1bc096ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27019", "type": "seen", "source": "Telegram/5hH5ajtM-oZI8EMttLkpzze1UyaglwRFKGyZ2ZBcuYombhG4", "content": "", "creation_timestamp": "2025-02-14T10:05:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2e1a08df-7101-4383-b259-ecae1bc096ae/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:05:08 +0000</pubDate>
    </item>
    <item>
      <title>3fd001b6-3647-4d84-98de-2b9e56644aee</title>
      <link>https://vulnerability.circl.lu/sighting/3fd001b6-3647-4d84-98de-2b9e56644aee/export</link>
      <description>{"uuid": "3fd001b6-3647-4d84-98de-2b9e56644aee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27012", "type": "seen", "source": "Telegram/YPd9jOc1W5QBJWC4avKUZMxMcGEJ1YmZAhAcR_Lo5OO4fhXc", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</description>
      <content:encoded>{"uuid": "3fd001b6-3647-4d84-98de-2b9e56644aee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27012", "type": "seen", "source": "Telegram/YPd9jOc1W5QBJWC4avKUZMxMcGEJ1YmZAhAcR_Lo5OO4fhXc", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3fd001b6-3647-4d84-98de-2b9e56644aee/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:05:58 +0000</pubDate>
    </item>
    <item>
      <title>5f41fdf1-93a3-47f3-b5a6-81135d317305</title>
      <link>https://vulnerability.circl.lu/sighting/5f41fdf1-93a3-47f3-b5a6-81135d317305/export</link>
      <description>{"uuid": "5f41fdf1-93a3-47f3-b5a6-81135d317305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27013", "type": "seen", "source": "Telegram/oi9pEo4KGGyZPVX_mB9XSRpABw0G6yyvQG1vw7Vw34XYS7cY", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</description>
      <content:encoded>{"uuid": "5f41fdf1-93a3-47f3-b5a6-81135d317305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27013", "type": "seen", "source": "Telegram/oi9pEo4KGGyZPVX_mB9XSRpABw0G6yyvQG1vw7Vw34XYS7cY", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5f41fdf1-93a3-47f3-b5a6-81135d317305/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:05:58 +0000</pubDate>
    </item>
    <item>
      <title>d9cfbcb3-6663-42aa-9095-63eea291d9ea</title>
      <link>https://vulnerability.circl.lu/sighting/d9cfbcb3-6663-42aa-9095-63eea291d9ea/export</link>
      <description>{"uuid": "d9cfbcb3-6663-42aa-9095-63eea291d9ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27014", "type": "seen", "source": "Telegram/bqW1OtssH0_6EKpCgn9HzhryrFaFAEjb6quxNe8OLIohZiUq", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</description>
      <content:encoded>{"uuid": "d9cfbcb3-6663-42aa-9095-63eea291d9ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27014", "type": "seen", "source": "Telegram/bqW1OtssH0_6EKpCgn9HzhryrFaFAEjb6quxNe8OLIohZiUq", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d9cfbcb3-6663-42aa-9095-63eea291d9ea/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:05:58 +0000</pubDate>
    </item>
    <item>
      <title>d309112c-df6c-489e-900a-e3691bce6663</title>
      <link>https://vulnerability.circl.lu/sighting/d309112c-df6c-489e-900a-e3691bce6663/export</link>
      <description>{"uuid": "d309112c-df6c-489e-900a-e3691bce6663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27015", "type": "seen", "source": "Telegram/TzZaJ2iW0TPTDsMBb3CPyz1zWYZ-mqEHTIQQ8jPi9uA4JXXE", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</description>
      <content:encoded>{"uuid": "d309112c-df6c-489e-900a-e3691bce6663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27015", "type": "seen", "source": "Telegram/TzZaJ2iW0TPTDsMBb3CPyz1zWYZ-mqEHTIQQ8jPi9uA4JXXE", "content": "", "creation_timestamp": "2025-02-14T10:05:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d309112c-df6c-489e-900a-e3691bce6663/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:05:58 +0000</pubDate>
    </item>
    <item>
      <title>482aabc9-4f85-4218-8ac1-d32ef49aee78</title>
      <link>https://vulnerability.circl.lu/sighting/482aabc9-4f85-4218-8ac1-d32ef49aee78/export</link>
      <description>{"uuid": "482aabc9-4f85-4218-8ac1-d32ef49aee78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27016", "type": "seen", "source": "Telegram/ib8gY-Q5HRQUW41-2rJMx_KFZDsIdvLiY1NF5C54imovq6U4", "content": "", "creation_timestamp": "2025-02-14T10:05:59.000000Z"}</description>
      <content:encoded>{"uuid": "482aabc9-4f85-4218-8ac1-d32ef49aee78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27016", "type": "seen", "source": "Telegram/ib8gY-Q5HRQUW41-2rJMx_KFZDsIdvLiY1NF5C54imovq6U4", "content": "", "creation_timestamp": "2025-02-14T10:05:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/482aabc9-4f85-4218-8ac1-d32ef49aee78/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:05:59 +0000</pubDate>
    </item>
  </channel>
</rss>
