<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 19:39:11 +0000</lastBuildDate>
    <item>
      <title>10c57d6e-4146-417b-a9f2-3b86484f6811</title>
      <link>https://vulnerability.circl.lu/sighting/10c57d6e-4146-417b-a9f2-3b86484f6811/export</link>
      <description>{"uuid": "10c57d6e-4146-417b-a9f2-3b86484f6811", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40582", "type": "seen", "source": "https://t.me/cibsecurity/69483", "content": "\u203c CVE-2023-40582 \u203c\n\nfind-exec is a utility to discover available shell commands. Versions prior to 1.0.3 did not properly escape user input and are vulnerable to Command Injection via an attacker controlled parameter. As a result, attackers may run malicious shell commands in the context of the running process. This issue has been addressed in version 1.0.3. users are advised to upgrade. Users unable to upgrade should ensure that all input passed to find-exec comes from a trusted source.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T22:12:21.000000Z"}</description>
      <content:encoded>{"uuid": "10c57d6e-4146-417b-a9f2-3b86484f6811", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40582", "type": "seen", "source": "https://t.me/cibsecurity/69483", "content": "\u203c CVE-2023-40582 \u203c\n\nfind-exec is a utility to discover available shell commands. Versions prior to 1.0.3 did not properly escape user input and are vulnerable to Command Injection via an attacker controlled parameter. As a result, attackers may run malicious shell commands in the context of the running process. This issue has been addressed in version 1.0.3. users are advised to upgrade. Users unable to upgrade should ensure that all input passed to find-exec comes from a trusted source.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T22:12:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/10c57d6e-4146-417b-a9f2-3b86484f6811/export</guid>
      <pubDate>Wed, 30 Aug 2023 22:12:21 +0000</pubDate>
    </item>
  </channel>
</rss>
