<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 09:56:05 +0000</lastBuildDate>
    <item>
      <title>c4fd0b63-8353-4044-a39e-0a467abd86fd</title>
      <link>https://vulnerability.circl.lu/sighting/c4fd0b63-8353-4044-a39e-0a467abd86fd/export</link>
      <description>{"uuid": "c4fd0b63-8353-4044-a39e-0a467abd86fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31655", "type": "seen", "source": "https://t.me/cibsecurity/64433", "content": "\u203c CVE-2023-31655 \u203c\n\nredis-7.0.10 was discovered to contain a segmentation violation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-19T00:32:26.000000Z"}</description>
      <content:encoded>{"uuid": "c4fd0b63-8353-4044-a39e-0a467abd86fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31655", "type": "seen", "source": "https://t.me/cibsecurity/64433", "content": "\u203c CVE-2023-31655 \u203c\n\nredis-7.0.10 was discovered to contain a segmentation violation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-19T00:32:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c4fd0b63-8353-4044-a39e-0a467abd86fd/export</guid>
      <pubDate>Fri, 19 May 2023 00:32:26 +0000</pubDate>
    </item>
    <item>
      <title>a8c4f25c-cc67-479e-8ead-a8a273349a6f</title>
      <link>https://vulnerability.circl.lu/sighting/a8c4f25c-cc67-479e-8ead-a8a273349a6f/export</link>
      <description>{"uuid": "a8c4f25c-cc67-479e-8ead-a8a273349a6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3165", "type": "seen", "source": "https://t.me/cibsecurity/65075", "content": "\u203c CVE-2023-3165 \u203c\n\nA vulnerability was found in SourceCodester Life Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file insertNominee.php of the component POST Parameter Handler. The manipulation of the argument nominee_id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231109 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-08T20:27:07.000000Z"}</description>
      <content:encoded>{"uuid": "a8c4f25c-cc67-479e-8ead-a8a273349a6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3165", "type": "seen", "source": "https://t.me/cibsecurity/65075", "content": "\u203c CVE-2023-3165 \u203c\n\nA vulnerability was found in SourceCodester Life Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file insertNominee.php of the component POST Parameter Handler. The manipulation of the argument nominee_id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231109 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-08T20:27:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a8c4f25c-cc67-479e-8ead-a8a273349a6f/export</guid>
      <pubDate>Thu, 08 Jun 2023 20:27:07 +0000</pubDate>
    </item>
    <item>
      <title>3b3503a5-7cf3-4f31-9fb1-50b71d2517cd</title>
      <link>https://vulnerability.circl.lu/sighting/3b3503a5-7cf3-4f31-9fb1-50b71d2517cd/export</link>
      <description>{"uuid": "3b3503a5-7cf3-4f31-9fb1-50b71d2517cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31654", "type": "seen", "source": "https://t.me/ctinow/172396", "content": "https://ift.tt/rCjzT6k\nCVE-2023-31654", "creation_timestamp": "2024-01-23T23:27:00.000000Z"}</description>
      <content:encoded>{"uuid": "3b3503a5-7cf3-4f31-9fb1-50b71d2517cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31654", "type": "seen", "source": "https://t.me/ctinow/172396", "content": "https://ift.tt/rCjzT6k\nCVE-2023-31654", "creation_timestamp": "2024-01-23T23:27:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3b3503a5-7cf3-4f31-9fb1-50b71d2517cd/export</guid>
      <pubDate>Tue, 23 Jan 2024 23:27:00 +0000</pubDate>
    </item>
    <item>
      <title>02a2bb6d-ef4b-4194-8425-5e0961853a5e</title>
      <link>https://vulnerability.circl.lu/sighting/02a2bb6d-ef4b-4194-8425-5e0961853a5e/export</link>
      <description>{"uuid": "02a2bb6d-ef4b-4194-8425-5e0961853a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31654", "type": "seen", "source": "https://t.me/ctinow/177010", "content": "https://ift.tt/JNLwaF8\nCVE-2023-31654 Exploit", "creation_timestamp": "2024-01-31T19:17:55.000000Z"}</description>
      <content:encoded>{"uuid": "02a2bb6d-ef4b-4194-8425-5e0961853a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31654", "type": "seen", "source": "https://t.me/ctinow/177010", "content": "https://ift.tt/JNLwaF8\nCVE-2023-31654 Exploit", "creation_timestamp": "2024-01-31T19:17:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/02a2bb6d-ef4b-4194-8425-5e0961853a5e/export</guid>
      <pubDate>Wed, 31 Jan 2024 19:17:55 +0000</pubDate>
    </item>
    <item>
      <title>8170c3ba-f2a8-4036-9f37-38e2efb74e6b</title>
      <link>https://vulnerability.circl.lu/sighting/8170c3ba-f2a8-4036-9f37-38e2efb74e6b/export</link>
      <description>{"uuid": "8170c3ba-f2a8-4036-9f37-38e2efb74e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31654", "type": "seen", "source": "https://t.me/ctinow/186993", "content": "https://ift.tt/jTsiPnm\nCVE-2023-31654 | Redis Raft up to master-7b46079 alloc.c hiredisAllocFns Privilege Escalation (Issue 600)", "creation_timestamp": "2024-02-17T17:46:21.000000Z"}</description>
      <content:encoded>{"uuid": "8170c3ba-f2a8-4036-9f37-38e2efb74e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31654", "type": "seen", "source": "https://t.me/ctinow/186993", "content": "https://ift.tt/jTsiPnm\nCVE-2023-31654 | Redis Raft up to master-7b46079 alloc.c hiredisAllocFns Privilege Escalation (Issue 600)", "creation_timestamp": "2024-02-17T17:46:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8170c3ba-f2a8-4036-9f37-38e2efb74e6b/export</guid>
      <pubDate>Sat, 17 Feb 2024 17:46:21 +0000</pubDate>
    </item>
  </channel>
</rss>
