<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:24:54 +0000</lastBuildDate>
    <item>
      <title>e5d95d6e-96d3-4740-bfc8-0424873a11be</title>
      <link>https://vulnerability.circl.lu/sighting/e5d95d6e-96d3-4740-bfc8-0424873a11be/export</link>
      <description>{"uuid": "e5d95d6e-96d3-4740-bfc8-0424873a11be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36301", "type": "seen", "source": "https://t.me/cibsecurity/65511", "content": "\u203c CVE-2023-36301 \u203c\n\nTalend Data Catalog before 8.0-20230221 contain a directory traversal vulnerability in HeaderImageServlet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-26T18:41:04.000000Z"}</description>
      <content:encoded>{"uuid": "e5d95d6e-96d3-4740-bfc8-0424873a11be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36301", "type": "seen", "source": "https://t.me/cibsecurity/65511", "content": "\u203c CVE-2023-36301 \u203c\n\nTalend Data Catalog before 8.0-20230221 contain a directory traversal vulnerability in HeaderImageServlet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-26T18:41:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e5d95d6e-96d3-4740-bfc8-0424873a11be/export</guid>
      <pubDate>Mon, 26 Jun 2023 18:41:04 +0000</pubDate>
    </item>
    <item>
      <title>db43c04c-45c5-473a-851b-215fb5a4186c</title>
      <link>https://vulnerability.circl.lu/sighting/db43c04c-45c5-473a-851b-215fb5a4186c/export</link>
      <description>{"uuid": "db43c04c-45c5-473a-851b-215fb5a4186c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36306", "type": "seen", "source": "https://t.me/cibsecurity/67997", "content": "\u203c CVE-2023-36306 \u203c\n\nA Cross Site Scripting (XSS) vulnerability in Adiscon Aiscon LogAnalyzer through 4.1.13 allows a remote attacker to execute arbitrary code via the asktheoracle.php, details.php, index.php, search.php, export.php, reports.php, and statistics.php components.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-08T18:14:13.000000Z"}</description>
      <content:encoded>{"uuid": "db43c04c-45c5-473a-851b-215fb5a4186c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36306", "type": "seen", "source": "https://t.me/cibsecurity/67997", "content": "\u203c CVE-2023-36306 \u203c\n\nA Cross Site Scripting (XSS) vulnerability in Adiscon Aiscon LogAnalyzer through 4.1.13 allows a remote attacker to execute arbitrary code via the asktheoracle.php, details.php, index.php, search.php, export.php, reports.php, and statistics.php components.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-08T18:14:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/db43c04c-45c5-473a-851b-215fb5a4186c/export</guid>
      <pubDate>Tue, 08 Aug 2023 18:14:13 +0000</pubDate>
    </item>
    <item>
      <title>f48f44d5-4a18-4597-9bf4-de5c4c8a8ccc</title>
      <link>https://vulnerability.circl.lu/sighting/f48f44d5-4a18-4597-9bf4-de5c4c8a8ccc/export</link>
      <description>{"uuid": "f48f44d5-4a18-4597-9bf4-de5c4c8a8ccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36309", "type": "seen", "source": "https://t.me/cibsecurity/68232", "content": "\u203c CVE-2023-36309 \u203c\n\nThere is a Cross Site Scripting (XSS) vulnerability in the \"action\" parameter of index.php in PHPJabbers Document Creator v1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T20:15:52.000000Z"}</description>
      <content:encoded>{"uuid": "f48f44d5-4a18-4597-9bf4-de5c4c8a8ccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36309", "type": "seen", "source": "https://t.me/cibsecurity/68232", "content": "\u203c CVE-2023-36309 \u203c\n\nThere is a Cross Site Scripting (XSS) vulnerability in the \"action\" parameter of index.php in PHPJabbers Document Creator v1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T20:15:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f48f44d5-4a18-4597-9bf4-de5c4c8a8ccc/export</guid>
      <pubDate>Thu, 10 Aug 2023 20:15:52 +0000</pubDate>
    </item>
    <item>
      <title>a19a7a5f-177d-4cab-b6e6-d78aeaf85767</title>
      <link>https://vulnerability.circl.lu/sighting/a19a7a5f-177d-4cab-b6e6-d78aeaf85767/export</link>
      <description>{"uuid": "a19a7a5f-177d-4cab-b6e6-d78aeaf85767", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36308", "type": "seen", "source": "https://t.me/cibsecurity/69814", "content": "\u203c CVE-2023-36308 \u203c\n\n** DISPUTED ** disintegration Imaging 1.6.2 allows attackers to cause a panic (because of an integer index out of range during a Grayscale call) via a crafted TIFF file to the scan function of scanner.go. NOTE: it is unclear whether there are common use cases in which this panic could have any security consequence\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T07:16:44.000000Z"}</description>
      <content:encoded>{"uuid": "a19a7a5f-177d-4cab-b6e6-d78aeaf85767", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36308", "type": "seen", "source": "https://t.me/cibsecurity/69814", "content": "\u203c CVE-2023-36308 \u203c\n\n** DISPUTED ** disintegration Imaging 1.6.2 allows attackers to cause a panic (because of an integer index out of range during a Grayscale call) via a crafted TIFF file to the scan function of scanner.go. NOTE: it is unclear whether there are common use cases in which this panic could have any security consequence\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-05T07:16:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a19a7a5f-177d-4cab-b6e6-d78aeaf85767/export</guid>
      <pubDate>Tue, 05 Sep 2023 07:16:44 +0000</pubDate>
    </item>
    <item>
      <title>56e4d508-7116-47ab-b866-6c67c8283b05</title>
      <link>https://vulnerability.circl.lu/sighting/56e4d508-7116-47ab-b866-6c67c8283b05/export</link>
      <description>{"uuid": "56e4d508-7116-47ab-b866-6c67c8283b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3630", "type": "seen", "source": "https://gist.github.com/poespas/fc5f1bc78c4f58d6fc2aea0d777fb594", "content": "", "creation_timestamp": "2026-04-01T22:32:51.000000Z"}</description>
      <content:encoded>{"uuid": "56e4d508-7116-47ab-b866-6c67c8283b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3630", "type": "seen", "source": "https://gist.github.com/poespas/fc5f1bc78c4f58d6fc2aea0d777fb594", "content": "", "creation_timestamp": "2026-04-01T22:32:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/56e4d508-7116-47ab-b866-6c67c8283b05/export</guid>
      <pubDate>Wed, 01 Apr 2026 22:32:51 +0000</pubDate>
    </item>
  </channel>
</rss>
