<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:44:20 +0000</lastBuildDate>
    <item>
      <title>13dac1b6-134f-48da-8233-4258bacdcc5a</title>
      <link>https://vulnerability.circl.lu/sighting/13dac1b6-134f-48da-8233-4258bacdcc5a/export</link>
      <description>{"uuid": "13dac1b6-134f-48da-8233-4258bacdcc5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27730", "type": "seen", "source": "https://t.me/cibsecurity/61728", "content": "\u203c CVE-2023-27730 \u203c\n\nNginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-10T00:34:53.000000Z"}</description>
      <content:encoded>{"uuid": "13dac1b6-134f-48da-8233-4258bacdcc5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27730", "type": "seen", "source": "https://t.me/cibsecurity/61728", "content": "\u203c CVE-2023-27730 \u203c\n\nNginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-10T00:34:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/13dac1b6-134f-48da-8233-4258bacdcc5a/export</guid>
      <pubDate>Mon, 10 Apr 2023 00:34:53 +0000</pubDate>
    </item>
    <item>
      <title>d9b75209-5e67-4424-825e-2fd5e52b7b7c</title>
      <link>https://vulnerability.circl.lu/sighting/d9b75209-5e67-4424-825e-2fd5e52b7b7c/export</link>
      <description>{"uuid": "d9b75209-5e67-4424-825e-2fd5e52b7b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27733", "type": "seen", "source": "https://t.me/cibsecurity/62289", "content": "\u203c CVE-2023-27733 \u203c\n\nDedeCMS v5.7.106 was discovered to contain a SQL injection vulnerability via the component /dede/sys_sql_query.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-17T16:42:06.000000Z"}</description>
      <content:encoded>{"uuid": "d9b75209-5e67-4424-825e-2fd5e52b7b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27733", "type": "seen", "source": "https://t.me/cibsecurity/62289", "content": "\u203c CVE-2023-27733 \u203c\n\nDedeCMS v5.7.106 was discovered to contain a SQL injection vulnerability via the component /dede/sys_sql_query.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-17T16:42:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d9b75209-5e67-4424-825e-2fd5e52b7b7c/export</guid>
      <pubDate>Mon, 17 Apr 2023 16:42:06 +0000</pubDate>
    </item>
    <item>
      <title>c5df28e5-01c6-43b5-9b02-4e51726d4a8c</title>
      <link>https://vulnerability.circl.lu/sighting/c5df28e5-01c6-43b5-9b02-4e51726d4a8c/export</link>
      <description>{"uuid": "c5df28e5-01c6-43b5-9b02-4e51726d4a8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2773", "type": "seen", "source": "https://t.me/cibsecurity/64342", "content": "\u203c CVE-2023-2773 \u203c\n\nA vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T22:32:59.000000Z"}</description>
      <content:encoded>{"uuid": "c5df28e5-01c6-43b5-9b02-4e51726d4a8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2773", "type": "seen", "source": "https://t.me/cibsecurity/64342", "content": "\u203c CVE-2023-2773 \u203c\n\nA vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T22:32:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c5df28e5-01c6-43b5-9b02-4e51726d4a8c/export</guid>
      <pubDate>Wed, 17 May 2023 22:32:59 +0000</pubDate>
    </item>
    <item>
      <title>63eb8e97-2d2b-4ffe-9868-5893e29f397e</title>
      <link>https://vulnerability.circl.lu/sighting/63eb8e97-2d2b-4ffe-9868-5893e29f397e/export</link>
      <description>{"uuid": "63eb8e97-2d2b-4ffe-9868-5893e29f397e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2773", "type": "seen", "source": "https://t.me/arpsyndicate/534", "content": "#ExploitObserverAlert\n\nCVE-2023-2773\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2773. A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.\n\nFIRST-EPSS: 0.000640000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-24T14:59:25.000000Z"}</description>
      <content:encoded>{"uuid": "63eb8e97-2d2b-4ffe-9868-5893e29f397e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2773", "type": "seen", "source": "https://t.me/arpsyndicate/534", "content": "#ExploitObserverAlert\n\nCVE-2023-2773\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2773. A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.\n\nFIRST-EPSS: 0.000640000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-24T14:59:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/63eb8e97-2d2b-4ffe-9868-5893e29f397e/export</guid>
      <pubDate>Fri, 24 Nov 2023 14:59:25 +0000</pubDate>
    </item>
    <item>
      <title>1b669c99-3304-436c-81c4-2d7e41a54369</title>
      <link>https://vulnerability.circl.lu/sighting/1b669c99-3304-436c-81c4-2d7e41a54369/export</link>
      <description>{"uuid": "1b669c99-3304-436c-81c4-2d7e41a54369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2773", "type": "seen", "source": "https://t.me/arpsyndicate/1667", "content": "#ExploitObserverAlert\n\nCVE-2023-2773\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2773. A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.\n\nFIRST-EPSS: 0.000640000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-10T17:50:05.000000Z"}</description>
      <content:encoded>{"uuid": "1b669c99-3304-436c-81c4-2d7e41a54369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2773", "type": "seen", "source": "https://t.me/arpsyndicate/1667", "content": "#ExploitObserverAlert\n\nCVE-2023-2773\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2773. A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.\n\nFIRST-EPSS: 0.000640000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-10T17:50:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1b669c99-3304-436c-81c4-2d7e41a54369/export</guid>
      <pubDate>Sun, 10 Dec 2023 17:50:05 +0000</pubDate>
    </item>
    <item>
      <title>ea91c73b-47a7-40fc-82e7-6da24afa5449</title>
      <link>https://vulnerability.circl.lu/sighting/ea91c73b-47a7-40fc-82e7-6da24afa5449/export</link>
      <description>{"uuid": "ea91c73b-47a7-40fc-82e7-6da24afa5449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27739", "type": "seen", "source": "https://t.me/ctinow/164670", "content": "https://ift.tt/U5YZCB7\nCVE-2023-27739", "creation_timestamp": "2024-01-08T22:26:42.000000Z"}</description>
      <content:encoded>{"uuid": "ea91c73b-47a7-40fc-82e7-6da24afa5449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27739", "type": "seen", "source": "https://t.me/ctinow/164670", "content": "https://ift.tt/U5YZCB7\nCVE-2023-27739", "creation_timestamp": "2024-01-08T22:26:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ea91c73b-47a7-40fc-82e7-6da24afa5449/export</guid>
      <pubDate>Mon, 08 Jan 2024 22:26:42 +0000</pubDate>
    </item>
    <item>
      <title>9fbb7c8c-5331-48fb-8ec9-d88eb5fd3042</title>
      <link>https://vulnerability.circl.lu/sighting/9fbb7c8c-5331-48fb-8ec9-d88eb5fd3042/export</link>
      <description>{"uuid": "9fbb7c8c-5331-48fb-8ec9-d88eb5fd3042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27739", "type": "seen", "source": "https://t.me/ctinow/173687", "content": "https://ift.tt/YyMwGDs\nCVE-2023-27739 | easyXDM 2.5 xdm_e cross site scripting", "creation_timestamp": "2024-01-25T18:51:56.000000Z"}</description>
      <content:encoded>{"uuid": "9fbb7c8c-5331-48fb-8ec9-d88eb5fd3042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27739", "type": "seen", "source": "https://t.me/ctinow/173687", "content": "https://ift.tt/YyMwGDs\nCVE-2023-27739 | easyXDM 2.5 xdm_e cross site scripting", "creation_timestamp": "2024-01-25T18:51:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9fbb7c8c-5331-48fb-8ec9-d88eb5fd3042/export</guid>
      <pubDate>Thu, 25 Jan 2024 18:51:56 +0000</pubDate>
    </item>
    <item>
      <title>c815940e-7b03-4a7d-83dc-eaa23a5a7ce0</title>
      <link>https://vulnerability.circl.lu/sighting/c815940e-7b03-4a7d-83dc-eaa23a5a7ce0/export</link>
      <description>{"uuid": "c815940e-7b03-4a7d-83dc-eaa23a5a7ce0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27734", "type": "seen", "source": "Telegram/w5Ik5Cw0vgMkEm06bmuObQGvOnw4PSeycmSxKauOOPaKgIyX", "content": "", "creation_timestamp": "2025-02-14T21:09:17.000000Z"}</description>
      <content:encoded>{"uuid": "c815940e-7b03-4a7d-83dc-eaa23a5a7ce0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27734", "type": "seen", "source": "Telegram/w5Ik5Cw0vgMkEm06bmuObQGvOnw4PSeycmSxKauOOPaKgIyX", "content": "", "creation_timestamp": "2025-02-14T21:09:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c815940e-7b03-4a7d-83dc-eaa23a5a7ce0/export</guid>
      <pubDate>Fri, 14 Feb 2025 21:09:17 +0000</pubDate>
    </item>
    <item>
      <title>4da1af5a-4954-471a-bed3-910aa36b973b</title>
      <link>https://vulnerability.circl.lu/sighting/4da1af5a-4954-471a-bed3-910aa36b973b/export</link>
      <description>{"uuid": "4da1af5a-4954-471a-bed3-910aa36b973b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27739", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18795", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27739\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: easyXDM 2.5 allows XSS via the xdm_e parameter.\n\ud83d\udccf Published: 2024-01-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T16:01:59.667Z\n\ud83d\udd17 References:\n1. https://threeshield.ca/easyxdm-2.5.20.html", "creation_timestamp": "2025-06-18T16:43:45.000000Z"}</description>
      <content:encoded>{"uuid": "4da1af5a-4954-471a-bed3-910aa36b973b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27739", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18795", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-27739\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: easyXDM 2.5 allows XSS via the xdm_e parameter.\n\ud83d\udccf Published: 2024-01-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T16:01:59.667Z\n\ud83d\udd17 References:\n1. https://threeshield.ca/easyxdm-2.5.20.html", "creation_timestamp": "2025-06-18T16:43:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4da1af5a-4954-471a-bed3-910aa36b973b/export</guid>
      <pubDate>Wed, 18 Jun 2025 16:43:45 +0000</pubDate>
    </item>
  </channel>
</rss>
