<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 12:42:13 +0000</lastBuildDate>
    <item>
      <title>5a2a54b6-0006-4a0d-bf27-9a064ee71061</title>
      <link>https://vulnerability.circl.lu/sighting/5a2a54b6-0006-4a0d-bf27-9a064ee71061/export</link>
      <description>{"uuid": "5a2a54b6-0006-4a0d-bf27-9a064ee71061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3056", "type": "seen", "source": "https://t.me/cibsecurity/64883", "content": "\u203c CVE-2023-3056 \u203c\n\nA vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-02T16:26:06.000000Z"}</description>
      <content:encoded>{"uuid": "5a2a54b6-0006-4a0d-bf27-9a064ee71061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3056", "type": "seen", "source": "https://t.me/cibsecurity/64883", "content": "\u203c CVE-2023-3056 \u203c\n\nA vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-02T16:26:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5a2a54b6-0006-4a0d-bf27-9a064ee71061/export</guid>
      <pubDate>Fri, 02 Jun 2023 16:26:06 +0000</pubDate>
    </item>
    <item>
      <title>ef160b03-46ec-4114-8c04-b47ff8be432f</title>
      <link>https://vulnerability.circl.lu/sighting/ef160b03-46ec-4114-8c04-b47ff8be432f/export</link>
      <description>{"uuid": "ef160b03-46ec-4114-8c04-b47ff8be432f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30560", "type": "seen", "source": "https://t.me/cibsecurity/66690", "content": "\u203c CVE-2023-30560 \u203c\n\nThe configuration from the PCU can be modified without authentication using physical connection to the PCU.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T22:11:43.000000Z"}</description>
      <content:encoded>{"uuid": "ef160b03-46ec-4114-8c04-b47ff8be432f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30560", "type": "seen", "source": "https://t.me/cibsecurity/66690", "content": "\u203c CVE-2023-30560 \u203c\n\nThe configuration from the PCU can be modified without authentication using physical connection to the PCU.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T22:11:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ef160b03-46ec-4114-8c04-b47ff8be432f/export</guid>
      <pubDate>Thu, 13 Jul 2023 22:11:43 +0000</pubDate>
    </item>
    <item>
      <title>ac414bb9-cb4e-4edf-8b47-6cfa3c4ef586</title>
      <link>https://vulnerability.circl.lu/sighting/ac414bb9-cb4e-4edf-8b47-6cfa3c4ef586/export</link>
      <description>{"uuid": "ac414bb9-cb4e-4edf-8b47-6cfa3c4ef586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30563", "type": "seen", "source": "https://t.me/cibsecurity/66706", "content": "\u203c CVE-2023-30563 \u203c\n\nA malicious file could be uploaded into a System Manager User Import Function resulting in a hijacked session.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:49.000000Z"}</description>
      <content:encoded>{"uuid": "ac414bb9-cb4e-4edf-8b47-6cfa3c4ef586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30563", "type": "seen", "source": "https://t.me/cibsecurity/66706", "content": "\u203c CVE-2023-30563 \u203c\n\nA malicious file could be uploaded into a System Manager User Import Function resulting in a hijacked session.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ac414bb9-cb4e-4edf-8b47-6cfa3c4ef586/export</guid>
      <pubDate>Fri, 14 Jul 2023 00:11:49 +0000</pubDate>
    </item>
    <item>
      <title>370a0932-0b17-4dbf-8a33-d7ce41dca4a1</title>
      <link>https://vulnerability.circl.lu/sighting/370a0932-0b17-4dbf-8a33-d7ce41dca4a1/export</link>
      <description>{"uuid": "370a0932-0b17-4dbf-8a33-d7ce41dca4a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30565", "type": "seen", "source": "https://t.me/cibsecurity/66707", "content": "\u203c CVE-2023-30565 \u203c\n\nAn insecure connection between Systems Manager and CQI Reporter application could expose infusion data to an attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:50.000000Z"}</description>
      <content:encoded>{"uuid": "370a0932-0b17-4dbf-8a33-d7ce41dca4a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30565", "type": "seen", "source": "https://t.me/cibsecurity/66707", "content": "\u203c CVE-2023-30565 \u203c\n\nAn insecure connection between Systems Manager and CQI Reporter application could expose infusion data to an attacker.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/370a0932-0b17-4dbf-8a33-d7ce41dca4a1/export</guid>
      <pubDate>Fri, 14 Jul 2023 00:11:50 +0000</pubDate>
    </item>
    <item>
      <title>33e652c1-b84a-4d9b-88bd-659a8d3246c6</title>
      <link>https://vulnerability.circl.lu/sighting/33e652c1-b84a-4d9b-88bd-659a8d3246c6/export</link>
      <description>{"uuid": "33e652c1-b84a-4d9b-88bd-659a8d3246c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30564", "type": "seen", "source": "https://t.me/cibsecurity/66708", "content": "\u203c CVE-2023-30564 \u203c\n\nAlaris Systems Manager does not perform input validation during the Device Import Function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:51.000000Z"}</description>
      <content:encoded>{"uuid": "33e652c1-b84a-4d9b-88bd-659a8d3246c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30564", "type": "seen", "source": "https://t.me/cibsecurity/66708", "content": "\u203c CVE-2023-30564 \u203c\n\nAlaris Systems Manager does not perform input validation during the Device Import Function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/33e652c1-b84a-4d9b-88bd-659a8d3246c6/export</guid>
      <pubDate>Fri, 14 Jul 2023 00:11:51 +0000</pubDate>
    </item>
    <item>
      <title>3ffb0921-b605-4853-8abf-104c8ebb4129</title>
      <link>https://vulnerability.circl.lu/sighting/3ffb0921-b605-4853-8abf-104c8ebb4129/export</link>
      <description>{"uuid": "3ffb0921-b605-4853-8abf-104c8ebb4129", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30562", "type": "seen", "source": "https://t.me/cibsecurity/66709", "content": "\u203c CVE-2023-30562 \u203c\n\nA GRE dataset file within Systems Manager can be tampered with and distributed to PCUs.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:52.000000Z"}</description>
      <content:encoded>{"uuid": "3ffb0921-b605-4853-8abf-104c8ebb4129", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30562", "type": "seen", "source": "https://t.me/cibsecurity/66709", "content": "\u203c CVE-2023-30562 \u203c\n\nA GRE dataset file within Systems Manager can be tampered with and distributed to PCUs.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3ffb0921-b605-4853-8abf-104c8ebb4129/export</guid>
      <pubDate>Fri, 14 Jul 2023 00:11:52 +0000</pubDate>
    </item>
    <item>
      <title>d4695cda-7df9-4d8d-9d9e-8ad1fd6100d3</title>
      <link>https://vulnerability.circl.lu/sighting/d4695cda-7df9-4d8d-9d9e-8ad1fd6100d3/export</link>
      <description>{"uuid": "d4695cda-7df9-4d8d-9d9e-8ad1fd6100d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30561", "type": "seen", "source": "https://t.me/cibsecurity/66710", "content": "\u203c CVE-2023-30561 \u203c\n\nThe data flowing between the PCU and its modules is insecure. A threat actor with physical access could potentially read or modify data by attaching a specially crafted device while an infusion is running.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:53.000000Z"}</description>
      <content:encoded>{"uuid": "d4695cda-7df9-4d8d-9d9e-8ad1fd6100d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30561", "type": "seen", "source": "https://t.me/cibsecurity/66710", "content": "\u203c CVE-2023-30561 \u203c\n\nThe data flowing between the PCU and its modules is insecure. A threat actor with physical access could potentially read or modify data by attaching a specially crafted device while an infusion is running.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-14T00:11:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d4695cda-7df9-4d8d-9d9e-8ad1fd6100d3/export</guid>
      <pubDate>Fri, 14 Jul 2023 00:11:53 +0000</pubDate>
    </item>
    <item>
      <title>4bec40f5-b299-4345-a86b-d47c5d11a657</title>
      <link>https://vulnerability.circl.lu/sighting/4bec40f5-b299-4345-a86b-d47c5d11a657/export</link>
      <description>{"uuid": "4bec40f5-b299-4345-a86b-d47c5d11a657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3056", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/753", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-3056\n\ud83d\udd39 Description: A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.\n\ud83d\udccf Published: 2023-06-02T12:00:04.473Z\n\ud83d\udccf Modified: 2025-01-08T18:05:31.705Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.230542\n2. https://vuldb.com/?ctiid.230542\n3. https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%201.md", "creation_timestamp": "2025-01-08T18:13:05.000000Z"}</description>
      <content:encoded>{"uuid": "4bec40f5-b299-4345-a86b-d47c5d11a657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3056", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/753", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-3056\n\ud83d\udd39 Description: A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.\n\ud83d\udccf Published: 2023-06-02T12:00:04.473Z\n\ud83d\udccf Modified: 2025-01-08T18:05:31.705Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.230542\n2. https://vuldb.com/?ctiid.230542\n3. https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%201.md", "creation_timestamp": "2025-01-08T18:13:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4bec40f5-b299-4345-a86b-d47c5d11a657/export</guid>
      <pubDate>Wed, 08 Jan 2025 18:13:05 +0000</pubDate>
    </item>
  </channel>
</rss>
