<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 15:54:12 +0000</lastBuildDate>
    <item>
      <title>7c913b80-7380-42ae-9251-dbd53a9d1025</title>
      <link>https://vulnerability.circl.lu/sighting/7c913b80-7380-42ae-9251-dbd53a9d1025/export</link>
      <description>{"uuid": "7c913b80-7380-42ae-9251-dbd53a9d1025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36823", "type": "seen", "source": "https://t.me/cibsecurity/66143", "content": "\u203c CVE-2023-36823 \u203c\n\nSanitize is an allowlist-based HTML and CSS sanitizer. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML and CSS through Sanitize starting with version 3.0.0 and prior to version 6.0.2 when Sanitize is configured to use the built-in \"relaxed\" config or when using a custom config that allows `style` elements and one or more CSS at-rules. This could result in cross-site scripting or other undesired behavior when the malicious HTML and CSS are rendered in a browser. Sanitize 6.0.2 performs additional escaping of CSS in `style` element content, which fixes this issue. Users who are unable to upgrade can prevent this issue by using a Sanitize config that doesn't allow `style` elements, using a Sanitize config that doesn't allow CSS at-rules, or by manually escaping the character sequence `&amp;lt;/` as `&amp;lt;\\/` in `style` element content.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T20:20:32.000000Z"}</description>
      <content:encoded>{"uuid": "7c913b80-7380-42ae-9251-dbd53a9d1025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36823", "type": "seen", "source": "https://t.me/cibsecurity/66143", "content": "\u203c CVE-2023-36823 \u203c\n\nSanitize is an allowlist-based HTML and CSS sanitizer. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML and CSS through Sanitize starting with version 3.0.0 and prior to version 6.0.2 when Sanitize is configured to use the built-in \"relaxed\" config or when using a custom config that allows `style` elements and one or more CSS at-rules. This could result in cross-site scripting or other undesired behavior when the malicious HTML and CSS are rendered in a browser. Sanitize 6.0.2 performs additional escaping of CSS in `style` element content, which fixes this issue. Users who are unable to upgrade can prevent this issue by using a Sanitize config that doesn't allow `style` elements, using a Sanitize config that doesn't allow CSS at-rules, or by manually escaping the character sequence `&amp;lt;/` as `&amp;lt;\\/` in `style` element content.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T20:20:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c913b80-7380-42ae-9251-dbd53a9d1025/export</guid>
      <pubDate>Thu, 06 Jul 2023 20:20:32 +0000</pubDate>
    </item>
    <item>
      <title>b86b0e96-42ff-4d08-91a0-dc81d5cca67d</title>
      <link>https://vulnerability.circl.lu/sighting/b86b0e96-42ff-4d08-91a0-dc81d5cca67d/export</link>
      <description>{"uuid": "b86b0e96-42ff-4d08-91a0-dc81d5cca67d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36829", "type": "seen", "source": "https://t.me/cibsecurity/66168", "content": "\u203c CVE-2023-36829 \u203c\n\nSentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-07T02:25:41.000000Z"}</description>
      <content:encoded>{"uuid": "b86b0e96-42ff-4d08-91a0-dc81d5cca67d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36829", "type": "seen", "source": "https://t.me/cibsecurity/66168", "content": "\u203c CVE-2023-36829 \u203c\n\nSentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-07T02:25:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b86b0e96-42ff-4d08-91a0-dc81d5cca67d/export</guid>
      <pubDate>Fri, 07 Jul 2023 02:25:41 +0000</pubDate>
    </item>
    <item>
      <title>3b3cc6f0-ce0c-460b-870a-9ae944eb4d08</title>
      <link>https://vulnerability.circl.lu/sighting/3b3cc6f0-ce0c-460b-870a-9ae944eb4d08/export</link>
      <description>{"uuid": "3b3cc6f0-ce0c-460b-870a-9ae944eb4d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36824", "type": "seen", "source": "https://t.me/cibsecurity/66405", "content": "\u203c CVE-2023-36824 \u203c\n\nRedis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T20:29:41.000000Z"}</description>
      <content:encoded>{"uuid": "3b3cc6f0-ce0c-460b-870a-9ae944eb4d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36824", "type": "seen", "source": "https://t.me/cibsecurity/66405", "content": "\u203c CVE-2023-36824 \u203c\n\nRedis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T20:29:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3b3cc6f0-ce0c-460b-870a-9ae944eb4d08/export</guid>
      <pubDate>Tue, 11 Jul 2023 20:29:41 +0000</pubDate>
    </item>
    <item>
      <title>5cca9c32-bee8-4083-9e95-ca32bc0d2cce</title>
      <link>https://vulnerability.circl.lu/sighting/5cca9c32-bee8-4083-9e95-ca32bc0d2cce/export</link>
      <description>{"uuid": "5cca9c32-bee8-4083-9e95-ca32bc0d2cce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3682", "type": "seen", "source": "https://t.me/cibsecurity/66773", "content": "\u203c CVE-2023-3682 \u203c\n\nA vulnerability, which was classified as critical, was found in Nesote Inout Blockchain EasyPayments 1.0. Affected is an unknown function of the file /index.php/payment/getcoinaddress of the component POST Parameter Handler. The manipulation of the argument coinid leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234228. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-15T20:33:19.000000Z"}</description>
      <content:encoded>{"uuid": "5cca9c32-bee8-4083-9e95-ca32bc0d2cce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3682", "type": "seen", "source": "https://t.me/cibsecurity/66773", "content": "\u203c CVE-2023-3682 \u203c\n\nA vulnerability, which was classified as critical, was found in Nesote Inout Blockchain EasyPayments 1.0. Affected is an unknown function of the file /index.php/payment/getcoinaddress of the component POST Parameter Handler. The manipulation of the argument coinid leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234228. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-15T20:33:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5cca9c32-bee8-4083-9e95-ca32bc0d2cce/export</guid>
      <pubDate>Sat, 15 Jul 2023 20:33:19 +0000</pubDate>
    </item>
    <item>
      <title>03702f1c-d4d5-45d6-b6a1-2f7f3a2f45df</title>
      <link>https://vulnerability.circl.lu/sighting/03702f1c-d4d5-45d6-b6a1-2f7f3a2f45df/export</link>
      <description>{"uuid": "03702f1c-d4d5-45d6-b6a1-2f7f3a2f45df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36820", "type": "seen", "source": "https://t.me/cibsecurity/71841", "content": "\u203c CVE-2023-36820 \u203c\n\nMicronaut Security is a security solution for applications. Prior to versions 3.1.2, 3.2.4, 3.3.2, 3.4.3, 3.5.3, 3.6.6, 3.7.4, 3.8.4, 3.9.6, 3.10.2, and 3.11.1, IdTokenClaimsValidator skips `aud` claim validation if token is issued by same identity issuer/provider. Any OIDC setup using Micronaut where multiple OIDC applications exists for the same issuer but token auth are not meant to be shared. This issue has been patched in versions 3.1.2, 3.2.4, 3.3.2, 3.4.3, 3.5.3, 3.6.6, 3.7.4, 3.8.4, 3.9.6, 3.10.2, and 3.11.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T18:15:55.000000Z"}</description>
      <content:encoded>{"uuid": "03702f1c-d4d5-45d6-b6a1-2f7f3a2f45df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36820", "type": "seen", "source": "https://t.me/cibsecurity/71841", "content": "\u203c CVE-2023-36820 \u203c\n\nMicronaut Security is a security solution for applications. Prior to versions 3.1.2, 3.2.4, 3.3.2, 3.4.3, 3.5.3, 3.6.6, 3.7.4, 3.8.4, 3.9.6, 3.10.2, and 3.11.1, IdTokenClaimsValidator skips `aud` claim validation if token is issued by same identity issuer/provider. Any OIDC setup using Micronaut where multiple OIDC applications exists for the same issuer but token auth are not meant to be shared. This issue has been patched in versions 3.1.2, 3.2.4, 3.3.2, 3.4.3, 3.5.3, 3.6.6, 3.7.4, 3.8.4, 3.9.6, 3.10.2, and 3.11.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-09T18:15:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/03702f1c-d4d5-45d6-b6a1-2f7f3a2f45df/export</guid>
      <pubDate>Mon, 09 Oct 2023 18:15:55 +0000</pubDate>
    </item>
  </channel>
</rss>
