<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 06:55:14 +0000</lastBuildDate>
    <item>
      <title>fb1d46ce-bf17-4c59-b65b-dfbe42b50e3d</title>
      <link>https://vulnerability.circl.lu/sighting/fb1d46ce-bf17-4c59-b65b-dfbe42b50e3d/export</link>
      <description>{"uuid": "fb1d46ce-bf17-4c59-b65b-dfbe42b50e3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3133", "type": "seen", "source": "https://t.me/cibsecurity/65920", "content": "\u203c CVE-2023-3133 \u203c\n\nThe Tutor LMS WordPress plugin before 2.2.1 does not implement adequate permission checks for REST API endpoints, allowing unauthenticated attackers to access information from Lessons that should not be publicly available.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:09.000000Z"}</description>
      <content:encoded>{"uuid": "fb1d46ce-bf17-4c59-b65b-dfbe42b50e3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3133", "type": "seen", "source": "https://t.me/cibsecurity/65920", "content": "\u203c CVE-2023-3133 \u203c\n\nThe Tutor LMS WordPress plugin before 2.2.1 does not implement adequate permission checks for REST API endpoints, allowing unauthenticated attackers to access information from Lessons that should not be publicly available.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T12:28:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fb1d46ce-bf17-4c59-b65b-dfbe42b50e3d/export</guid>
      <pubDate>Tue, 04 Jul 2023 12:28:09 +0000</pubDate>
    </item>
    <item>
      <title>4eba7a4c-3e98-4fe4-b51d-298c4fcd4a5b</title>
      <link>https://vulnerability.circl.lu/sighting/4eba7a4c-3e98-4fe4-b51d-298c4fcd4a5b/export</link>
      <description>{"uuid": "4eba7a4c-3e98-4fe4-b51d-298c4fcd4a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31339", "type": "seen", "source": "https://t.me/cvedetector/3051", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31339 - AMD Zynq UltraScale+ MPSoC/RFSoC Out-of-Bound Read\", \n  \"Content\": \"CVE ID : CVE-2023-31339 \nPublished : Aug. 13, 2024, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Improper input validation in ARM\u00ae Trusted Firmware used in AMD\u2019s Zynq\u2122 UltraScale+\u2122) MPSoC/RFSoC may allow a privileged attacker to perform out of bound reads, potentially resulting in data leakage and denial of service. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T20:28:11.000000Z"}</description>
      <content:encoded>{"uuid": "4eba7a4c-3e98-4fe4-b51d-298c4fcd4a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31339", "type": "seen", "source": "https://t.me/cvedetector/3051", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31339 - AMD Zynq UltraScale+ MPSoC/RFSoC Out-of-Bound Read\", \n  \"Content\": \"CVE ID : CVE-2023-31339 \nPublished : Aug. 13, 2024, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Improper input validation in ARM\u00ae Trusted Firmware used in AMD\u2019s Zynq\u2122 UltraScale+\u2122) MPSoC/RFSoC may allow a privileged attacker to perform out of bound reads, potentially resulting in data leakage and denial of service. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T20:28:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4eba7a4c-3e98-4fe4-b51d-298c4fcd4a5b/export</guid>
      <pubDate>Tue, 13 Aug 2024 20:28:11 +0000</pubDate>
    </item>
    <item>
      <title>a5d16ee0-fdd2-4501-8719-8b6e6a93afc4</title>
      <link>https://vulnerability.circl.lu/sighting/a5d16ee0-fdd2-4501-8719-8b6e6a93afc4/export</link>
      <description>{"uuid": "a5d16ee0-fdd2-4501-8719-8b6e6a93afc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113987443302136316", "content": "", "creation_timestamp": "2025-02-11T21:45:53.657727Z"}</description>
      <content:encoded>{"uuid": "a5d16ee0-fdd2-4501-8719-8b6e6a93afc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113987443302136316", "content": "", "creation_timestamp": "2025-02-11T21:45:53.657727Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a5d16ee0-fdd2-4501-8719-8b6e6a93afc4/export</guid>
      <pubDate>Tue, 11 Feb 2025 21:45:53 +0000</pubDate>
    </item>
    <item>
      <title>076dca1b-070e-41f4-b961-a5626d128711</title>
      <link>https://vulnerability.circl.lu/sighting/076dca1b-070e-41f4-b961-a5626d128711/export</link>
      <description>{"uuid": "076dca1b-070e-41f4-b961-a5626d128711", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwophqzgx2s", "content": "", "creation_timestamp": "2025-02-11T22:15:50.915083Z"}</description>
      <content:encoded>{"uuid": "076dca1b-070e-41f4-b961-a5626d128711", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwophqzgx2s", "content": "", "creation_timestamp": "2025-02-11T22:15:50.915083Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/076dca1b-070e-41f4-b961-a5626d128711/export</guid>
      <pubDate>Tue, 11 Feb 2025 22:15:50 +0000</pubDate>
    </item>
    <item>
      <title>05c1ebb4-24d9-4fa6-9542-748ca19580b6</title>
      <link>https://vulnerability.circl.lu/sighting/05c1ebb4-24d9-4fa6-9542-748ca19580b6/export</link>
      <description>{"uuid": "05c1ebb4-24d9-4fa6-9542-748ca19580b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://t.me/cvedetector/17791", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31331 - Intel DRTM Privilege Escalation Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-31331 \nPublished : Feb. 11, 2025, 10:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Improper access control in the DRTM firmware could allow a privileged attacker to perform multiple driver initializations, resulting in stack memory corruption that could potentially lead to loss of integrity or availability. \nSeverity: 3.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T01:48:44.000000Z"}</description>
      <content:encoded>{"uuid": "05c1ebb4-24d9-4fa6-9542-748ca19580b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://t.me/cvedetector/17791", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-31331 - Intel DRTM Privilege Escalation Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-31331 \nPublished : Feb. 11, 2025, 10:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Improper access control in the DRTM firmware could allow a privileged attacker to perform multiple driver initializations, resulting in stack memory corruption that could potentially lead to loss of integrity or availability. \nSeverity: 3.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T01:48:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/05c1ebb4-24d9-4fa6-9542-748ca19580b6/export</guid>
      <pubDate>Wed, 12 Feb 2025 01:48:44 +0000</pubDate>
    </item>
    <item>
      <title>d5330123-3751-432e-bb89-71dc23259cad</title>
      <link>https://vulnerability.circl.lu/sighting/d5330123-3751-432e-bb89-71dc23259cad/export</link>
      <description>{"uuid": "d5330123-3751-432e-bb89-71dc23259cad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhx4mj55iq2u", "content": "", "creation_timestamp": "2025-02-12T02:24:48.960540Z"}</description>
      <content:encoded>{"uuid": "d5330123-3751-432e-bb89-71dc23259cad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31331", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhx4mj55iq2u", "content": "", "creation_timestamp": "2025-02-12T02:24:48.960540Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d5330123-3751-432e-bb89-71dc23259cad/export</guid>
      <pubDate>Wed, 12 Feb 2025 02:24:48 +0000</pubDate>
    </item>
  </channel>
</rss>
