<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:26:44 +0000</lastBuildDate>
    <item>
      <title>e80821d9-0200-465e-9a28-5204082cb470</title>
      <link>https://vulnerability.circl.lu/sighting/e80821d9-0200-465e-9a28-5204082cb470/export</link>
      <description>{"uuid": "e80821d9-0200-465e-9a28-5204082cb470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29636", "type": "seen", "source": "https://t.me/cibsecurity/63128", "content": "\u203c CVE-2023-29636 \u203c\n\nCross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via the \"title\" field in the \"blog management\" page due to the the default configuration not using MyBlogUtils.cleanString.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:40.000000Z"}</description>
      <content:encoded>{"uuid": "e80821d9-0200-465e-9a28-5204082cb470", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29636", "type": "seen", "source": "https://t.me/cibsecurity/63128", "content": "\u203c CVE-2023-29636 \u203c\n\nCross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via the \"title\" field in the \"blog management\" page due to the the default configuration not using MyBlogUtils.cleanString.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e80821d9-0200-465e-9a28-5204082cb470/export</guid>
      <pubDate>Mon, 01 May 2023 20:29:40 +0000</pubDate>
    </item>
    <item>
      <title>8dce85fb-2c08-4429-895e-630f2f360a75</title>
      <link>https://vulnerability.circl.lu/sighting/8dce85fb-2c08-4429-895e-630f2f360a75/export</link>
      <description>{"uuid": "8dce85fb-2c08-4429-895e-630f2f360a75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29637", "type": "seen", "source": "https://t.me/cibsecurity/63130", "content": "\u203c CVE-2023-29637 \u203c\n\nCross Site Scripting (XSS) vulnerability in Qbian61 forum-java, allows attackers to inject arbitrary web script or HTML via editing the article content in the \"article editor\" page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:42.000000Z"}</description>
      <content:encoded>{"uuid": "8dce85fb-2c08-4429-895e-630f2f360a75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29637", "type": "seen", "source": "https://t.me/cibsecurity/63130", "content": "\u203c CVE-2023-29637 \u203c\n\nCross Site Scripting (XSS) vulnerability in Qbian61 forum-java, allows attackers to inject arbitrary web script or HTML via editing the article content in the \"article editor\" page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8dce85fb-2c08-4429-895e-630f2f360a75/export</guid>
      <pubDate>Mon, 01 May 2023 20:29:42 +0000</pubDate>
    </item>
    <item>
      <title>d44a38f4-9d18-4b26-b61d-936041e8cb9e</title>
      <link>https://vulnerability.circl.lu/sighting/d44a38f4-9d18-4b26-b61d-936041e8cb9e/export</link>
      <description>{"uuid": "d44a38f4-9d18-4b26-b61d-936041e8cb9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29638", "type": "seen", "source": "https://t.me/cibsecurity/63132", "content": "\u203c CVE-2023-29638 \u203c\n\nCross Site Scripting (XSS) vulnerability in WinterChenS my-site before commit 3f0423da6d5200c7a46e200da145c1f54ee18548, allows attackers to inject arbitrary web script or HTML via editing blog articles.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:45.000000Z"}</description>
      <content:encoded>{"uuid": "d44a38f4-9d18-4b26-b61d-936041e8cb9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29638", "type": "seen", "source": "https://t.me/cibsecurity/63132", "content": "\u203c CVE-2023-29638 \u203c\n\nCross Site Scripting (XSS) vulnerability in WinterChenS my-site before commit 3f0423da6d5200c7a46e200da145c1f54ee18548, allows attackers to inject arbitrary web script or HTML via editing blog articles.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d44a38f4-9d18-4b26-b61d-936041e8cb9e/export</guid>
      <pubDate>Mon, 01 May 2023 20:29:45 +0000</pubDate>
    </item>
    <item>
      <title>d407885f-9cee-4f4a-9414-42fbc2b2d7ec</title>
      <link>https://vulnerability.circl.lu/sighting/d407885f-9cee-4f4a-9414-42fbc2b2d7ec/export</link>
      <description>{"uuid": "d407885f-9cee-4f4a-9414-42fbc2b2d7ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29635", "type": "seen", "source": "https://t.me/cibsecurity/63134", "content": "\u203c CVE-2023-29635 \u203c\n\nFile upload vulnerability in Antabot White-Jotter v0.2.2, allows remote attackers to execute malicious code via the file parameter to function coversUpload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:47.000000Z"}</description>
      <content:encoded>{"uuid": "d407885f-9cee-4f4a-9414-42fbc2b2d7ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29635", "type": "seen", "source": "https://t.me/cibsecurity/63134", "content": "\u203c CVE-2023-29635 \u203c\n\nFile upload vulnerability in Antabot White-Jotter v0.2.2, allows remote attackers to execute malicious code via the file parameter to function coversUpload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d407885f-9cee-4f4a-9414-42fbc2b2d7ec/export</guid>
      <pubDate>Mon, 01 May 2023 20:29:47 +0000</pubDate>
    </item>
    <item>
      <title>b7c9463d-a2c0-4f9e-81b1-abb1331366e0</title>
      <link>https://vulnerability.circl.lu/sighting/b7c9463d-a2c0-4f9e-81b1-abb1331366e0/export</link>
      <description>{"uuid": "b7c9463d-a2c0-4f9e-81b1-abb1331366e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29639", "type": "seen", "source": "https://t.me/cibsecurity/63135", "content": "\u203c CVE-2023-29639 \u203c\n\nCross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via editing an article in the \"blog article\" page due to the default configuration not utilizing MyBlogUtils.cleanString.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:48.000000Z"}</description>
      <content:encoded>{"uuid": "b7c9463d-a2c0-4f9e-81b1-abb1331366e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29639", "type": "seen", "source": "https://t.me/cibsecurity/63135", "content": "\u203c CVE-2023-29639 \u203c\n\nCross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via editing an article in the \"blog article\" page due to the default configuration not utilizing MyBlogUtils.cleanString.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T20:29:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b7c9463d-a2c0-4f9e-81b1-abb1331366e0/export</guid>
      <pubDate>Mon, 01 May 2023 20:29:48 +0000</pubDate>
    </item>
    <item>
      <title>d6117e04-56e3-4e92-bf28-dcf79832df63</title>
      <link>https://vulnerability.circl.lu/sighting/d6117e04-56e3-4e92-bf28-dcf79832df63/export</link>
      <description>{"uuid": "d6117e04-56e3-4e92-bf28-dcf79832df63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29632", "type": "seen", "source": "https://t.me/cibsecurity/65022", "content": "\u203c CVE-2023-29632 \u203c\n\nPrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-07T00:29:34.000000Z"}</description>
      <content:encoded>{"uuid": "d6117e04-56e3-4e92-bf28-dcf79832df63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29632", "type": "seen", "source": "https://t.me/cibsecurity/65022", "content": "\u203c CVE-2023-29632 \u203c\n\nPrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-07T00:29:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d6117e04-56e3-4e92-bf28-dcf79832df63/export</guid>
      <pubDate>Wed, 07 Jun 2023 00:29:34 +0000</pubDate>
    </item>
    <item>
      <title>76c24dcd-143e-4b45-8fbe-6e5ebb1ecefd</title>
      <link>https://vulnerability.circl.lu/sighting/76c24dcd-143e-4b45-8fbe-6e5ebb1ecefd/export</link>
      <description>{"uuid": "76c24dcd-143e-4b45-8fbe-6e5ebb1ecefd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2963", "type": "seen", "source": "https://t.me/cibsecurity/66829", "content": "\u203c CVE-2023-2963 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oliva Expertise Oliva Expertise EKS allows SQL Injection.This issue affects Oliva Expertise EKS: before 1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T18:40:27.000000Z"}</description>
      <content:encoded>{"uuid": "76c24dcd-143e-4b45-8fbe-6e5ebb1ecefd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2963", "type": "seen", "source": "https://t.me/cibsecurity/66829", "content": "\u203c CVE-2023-2963 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oliva Expertise Oliva Expertise EKS allows SQL Injection.This issue affects Oliva Expertise EKS: before 1.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-17T18:40:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/76c24dcd-143e-4b45-8fbe-6e5ebb1ecefd/export</guid>
      <pubDate>Mon, 17 Jul 2023 18:40:27 +0000</pubDate>
    </item>
    <item>
      <title>38b3016f-b744-4e26-a7b7-4fd0e038bb24</title>
      <link>https://vulnerability.circl.lu/sighting/38b3016f-b744-4e26-a7b7-4fd0e038bb24/export</link>
      <description>{"uuid": "38b3016f-b744-4e26-a7b7-4fd0e038bb24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29632", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/728", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29632\n\ud83d\udd39 Description: PrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php.\n\ud83d\udccf Published: 2023-06-06T00:00:00\n\ud83d\udccf Modified: 2025-01-08T15:45:09.714Z\n\ud83d\udd17 References:\n1. https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmspagebuilder.html", "creation_timestamp": "2025-01-08T16:21:07.000000Z"}</description>
      <content:encoded>{"uuid": "38b3016f-b744-4e26-a7b7-4fd0e038bb24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29632", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/728", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29632\n\ud83d\udd39 Description: PrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php.\n\ud83d\udccf Published: 2023-06-06T00:00:00\n\ud83d\udccf Modified: 2025-01-08T15:45:09.714Z\n\ud83d\udd17 References:\n1. https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmspagebuilder.html", "creation_timestamp": "2025-01-08T16:21:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/38b3016f-b744-4e26-a7b7-4fd0e038bb24/export</guid>
      <pubDate>Wed, 08 Jan 2025 16:21:07 +0000</pubDate>
    </item>
  </channel>
</rss>
