<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 16:29:07 +0000</lastBuildDate>
    <item>
      <title>4f409d80-4fb5-4787-9c2b-2d7c0ec5040a</title>
      <link>https://vulnerability.circl.lu/sighting/4f409d80-4fb5-4787-9c2b-2d7c0ec5040a/export</link>
      <description>{"uuid": "4f409d80-4fb5-4787-9c2b-2d7c0ec5040a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3438", "type": "seen", "source": "https://t.me/cibsecurity/65856", "content": "\u203c CVE-2023-3438 \u203c\n\nAn unquoted Windows search path vulnerability existed in the install the MOVE 4.10.x and earlier Windows install service (mvagtsce.exe). The misconfiguration allowed an unauthorized local user to insert arbitrary code into the unquoted service path to obtain privilege escalation and stop antimalware services.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T12:09:02.000000Z"}</description>
      <content:encoded>{"uuid": "4f409d80-4fb5-4787-9c2b-2d7c0ec5040a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3438", "type": "seen", "source": "https://t.me/cibsecurity/65856", "content": "\u203c CVE-2023-3438 \u203c\n\nAn unquoted Windows search path vulnerability existed in the install the MOVE 4.10.x and earlier Windows install service (mvagtsce.exe). The misconfiguration allowed an unauthorized local user to insert arbitrary code into the unquoted service path to obtain privilege escalation and stop antimalware services.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T12:09:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4f409d80-4fb5-4787-9c2b-2d7c0ec5040a/export</guid>
      <pubDate>Thu, 13 Jul 2023 12:09:02 +0000</pubDate>
    </item>
    <item>
      <title>86114542-100c-44b9-8698-21855eaee81c</title>
      <link>https://vulnerability.circl.lu/sighting/86114542-100c-44b9-8698-21855eaee81c/export</link>
      <description>{"uuid": "86114542-100c-44b9-8698-21855eaee81c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34383", "type": "seen", "source": "https://t.me/cibsecurity/73520", "content": "\u203c CVE-2023-34383 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP Project Manager wedevs-project-manager allows SQL Injection.This issue affects WP Project Manager: from n/a through 2.6.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-03T15:23:25.000000Z"}</description>
      <content:encoded>{"uuid": "86114542-100c-44b9-8698-21855eaee81c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34383", "type": "seen", "source": "https://t.me/cibsecurity/73520", "content": "\u203c CVE-2023-34383 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP Project Manager wedevs-project-manager allows SQL Injection.This issue affects WP Project Manager: from n/a through 2.6.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-03T15:23:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/86114542-100c-44b9-8698-21855eaee81c/export</guid>
      <pubDate>Fri, 03 Nov 2023 15:23:25 +0000</pubDate>
    </item>
    <item>
      <title>67ab46f2-54e1-4f0d-8249-dd8676bb5746</title>
      <link>https://vulnerability.circl.lu/sighting/67ab46f2-54e1-4f0d-8249-dd8676bb5746/export</link>
      <description>{"uuid": "67ab46f2-54e1-4f0d-8249-dd8676bb5746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34385", "type": "seen", "source": "https://t.me/ctinow/157283", "content": "https://ift.tt/6yORM3U\nCVE-2023-34385", "creation_timestamp": "2023-12-20T20:29:18.000000Z"}</description>
      <content:encoded>{"uuid": "67ab46f2-54e1-4f0d-8249-dd8676bb5746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34385", "type": "seen", "source": "https://t.me/ctinow/157283", "content": "https://ift.tt/6yORM3U\nCVE-2023-34385", "creation_timestamp": "2023-12-20T20:29:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/67ab46f2-54e1-4f0d-8249-dd8676bb5746/export</guid>
      <pubDate>Wed, 20 Dec 2023 20:29:18 +0000</pubDate>
    </item>
    <item>
      <title>297a1ff9-d45a-4001-a850-9b6aeb165931</title>
      <link>https://vulnerability.circl.lu/sighting/297a1ff9-d45a-4001-a850-9b6aeb165931/export</link>
      <description>{"uuid": "297a1ff9-d45a-4001-a850-9b6aeb165931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34389", "type": "seen", "source": "https://t.me/ctinow/157572", "content": "https://ift.tt/vSnYXC7\nCVE-2023-34389 | Schweitzer Engineering Laboratories SEL-451 20230830 allocation of resources", "creation_timestamp": "2023-12-21T10:12:47.000000Z"}</description>
      <content:encoded>{"uuid": "297a1ff9-d45a-4001-a850-9b6aeb165931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34389", "type": "seen", "source": "https://t.me/ctinow/157572", "content": "https://ift.tt/vSnYXC7\nCVE-2023-34389 | Schweitzer Engineering Laboratories SEL-451 20230830 allocation of resources", "creation_timestamp": "2023-12-21T10:12:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/297a1ff9-d45a-4001-a850-9b6aeb165931/export</guid>
      <pubDate>Thu, 21 Dec 2023 10:12:47 +0000</pubDate>
    </item>
    <item>
      <title>e224cef6-d85d-4d01-97f9-05d5447a5d7c</title>
      <link>https://vulnerability.circl.lu/sighting/e224cef6-d85d-4d01-97f9-05d5447a5d7c/export</link>
      <description>{"uuid": "e224cef6-d85d-4d01-97f9-05d5447a5d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34388", "type": "seen", "source": "https://t.me/ctinow/157580", "content": "https://ift.tt/kr8RU59\nCVE-2023-34388 | Schweitzer Engineering Laboratories SEL-451 20230830 improper authentication", "creation_timestamp": "2023-12-21T10:37:48.000000Z"}</description>
      <content:encoded>{"uuid": "e224cef6-d85d-4d01-97f9-05d5447a5d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34388", "type": "seen", "source": "https://t.me/ctinow/157580", "content": "https://ift.tt/kr8RU59\nCVE-2023-34388 | Schweitzer Engineering Laboratories SEL-451 20230830 improper authentication", "creation_timestamp": "2023-12-21T10:37:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e224cef6-d85d-4d01-97f9-05d5447a5d7c/export</guid>
      <pubDate>Thu, 21 Dec 2023 10:37:48 +0000</pubDate>
    </item>
    <item>
      <title>e7d5c023-7807-4d82-8a1d-16c240a9e719</title>
      <link>https://vulnerability.circl.lu/sighting/e7d5c023-7807-4d82-8a1d-16c240a9e719/export</link>
      <description>{"uuid": "e7d5c023-7807-4d82-8a1d-16c240a9e719", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34382", "type": "seen", "source": "https://t.me/ctinow/167762", "content": "https://ift.tt/dVRwYZT\nCVE-2023-34382 | weDevs Dokan Plugin up to 3.7.19 on WordPress deserialization", "creation_timestamp": "2024-01-13T09:16:50.000000Z"}</description>
      <content:encoded>{"uuid": "e7d5c023-7807-4d82-8a1d-16c240a9e719", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34382", "type": "seen", "source": "https://t.me/ctinow/167762", "content": "https://ift.tt/dVRwYZT\nCVE-2023-34382 | weDevs Dokan Plugin up to 3.7.19 on WordPress deserialization", "creation_timestamp": "2024-01-13T09:16:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e7d5c023-7807-4d82-8a1d-16c240a9e719/export</guid>
      <pubDate>Sat, 13 Jan 2024 09:16:50 +0000</pubDate>
    </item>
    <item>
      <title>61aa7b18-a204-43ac-8455-ca8ce236ff6b</title>
      <link>https://vulnerability.circl.lu/sighting/61aa7b18-a204-43ac-8455-ca8ce236ff6b/export</link>
      <description>{"uuid": "61aa7b18-a204-43ac-8455-ca8ce236ff6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34385", "type": "seen", "source": "https://t.me/ctinow/167942", "content": "https://ift.tt/EfOgsxU\nCVE-2023-34385 | Akshay Menariya Export Import Menus Plugin up to 1.8.0 on WordPress unrestricted upload", "creation_timestamp": "2024-01-14T06:36:47.000000Z"}</description>
      <content:encoded>{"uuid": "61aa7b18-a204-43ac-8455-ca8ce236ff6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34385", "type": "seen", "source": "https://t.me/ctinow/167942", "content": "https://ift.tt/EfOgsxU\nCVE-2023-34385 | Akshay Menariya Export Import Menus Plugin up to 1.8.0 on WordPress unrestricted upload", "creation_timestamp": "2024-01-14T06:36:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/61aa7b18-a204-43ac-8455-ca8ce236ff6b/export</guid>
      <pubDate>Sun, 14 Jan 2024 06:36:47 +0000</pubDate>
    </item>
    <item>
      <title>ab124b14-8f05-42ef-9ae6-1549e66246a2</title>
      <link>https://vulnerability.circl.lu/sighting/ab124b14-8f05-42ef-9ae6-1549e66246a2/export</link>
      <description>{"uuid": "ab124b14-8f05-42ef-9ae6-1549e66246a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34381", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646696252877760", "content": "", "creation_timestamp": "2024-12-13T17:29:26.223044Z"}</description>
      <content:encoded>{"uuid": "ab124b14-8f05-42ef-9ae6-1549e66246a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34381", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646696252877760", "content": "", "creation_timestamp": "2024-12-13T17:29:26.223044Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ab124b14-8f05-42ef-9ae6-1549e66246a2/export</guid>
      <pubDate>Fri, 13 Dec 2024 17:29:26 +0000</pubDate>
    </item>
    <item>
      <title>523aa448-45b8-4323-b939-e372c1c3b266</title>
      <link>https://vulnerability.circl.lu/sighting/523aa448-45b8-4323-b939-e372c1c3b266/export</link>
      <description>{"uuid": "523aa448-45b8-4323-b939-e372c1c3b266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34387", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646696266743506", "content": "", "creation_timestamp": "2024-12-13T17:29:26.508215Z"}</description>
      <content:encoded>{"uuid": "523aa448-45b8-4323-b939-e372c1c3b266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34387", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646696266743506", "content": "", "creation_timestamp": "2024-12-13T17:29:26.508215Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/523aa448-45b8-4323-b939-e372c1c3b266/export</guid>
      <pubDate>Fri, 13 Dec 2024 17:29:26 +0000</pubDate>
    </item>
  </channel>
</rss>
