<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 07:15:12 +0000</lastBuildDate>
    <item>
      <title>b65635e5-7e57-4fb5-ba5d-d7c2088ad507</title>
      <link>https://vulnerability.circl.lu/sighting/b65635e5-7e57-4fb5-ba5d-d7c2088ad507/export</link>
      <description>{"uuid": "b65635e5-7e57-4fb5-ba5d-d7c2088ad507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5247", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA small write-up with examples to understand CVE-2023-43115\nURL\uff1ahttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-02T19:55:45.000000Z"}</description>
      <content:encoded>{"uuid": "b65635e5-7e57-4fb5-ba5d-d7c2088ad507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5247", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA small write-up with examples to understand CVE-2023-43115\nURL\uff1ahttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-02T19:55:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b65635e5-7e57-4fb5-ba5d-d7c2088ad507/export</guid>
      <pubDate>Mon, 02 Oct 2023 19:55:45 +0000</pubDate>
    </item>
    <item>
      <title>0744d5e0-50ce-4649-b5d6-4e5e3f9223e4</title>
      <link>https://vulnerability.circl.lu/sighting/0744d5e0-50ce-4649-b5d6-4e5e3f9223e4/export</link>
      <description>{"uuid": "0744d5e0-50ce-4649-b5d6-4e5e3f9223e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9155", "content": "#exploit\n1. CVE-2023-43115:\nArtifex Ghostscript GhostPDL gdevijs.c Privilege Escalation\nhttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n2. iRacing Exploit allows attackers to take control of user's computer\nhttps://blog.ss23.geek.nz/2023/09/21/iracing-electron-rce-exploit.html", "creation_timestamp": "2023-10-07T12:20:43.000000Z"}</description>
      <content:encoded>{"uuid": "0744d5e0-50ce-4649-b5d6-4e5e3f9223e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9155", "content": "#exploit\n1. CVE-2023-43115:\nArtifex Ghostscript GhostPDL gdevijs.c Privilege Escalation\nhttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n2. iRacing Exploit allows attackers to take control of user's computer\nhttps://blog.ss23.geek.nz/2023/09/21/iracing-electron-rce-exploit.html", "creation_timestamp": "2023-10-07T12:20:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0744d5e0-50ce-4649-b5d6-4e5e3f9223e4/export</guid>
      <pubDate>Sat, 07 Oct 2023 12:20:43 +0000</pubDate>
    </item>
    <item>
      <title>59e00991-de85-4ffe-9a4f-42319a933964</title>
      <link>https://vulnerability.circl.lu/sighting/59e00991-de85-4ffe-9a4f-42319a933964/export</link>
      <description>{"uuid": "59e00991-de85-4ffe-9a4f-42319a933964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43119", "type": "seen", "source": "https://t.me/cibsecurity/72343", "content": "\u203c CVE-2023-43119 \u203c\n\nAn Access Control issue discovered in Extreme Networks Switch Engine (EXOS) before 32.5.1.5, also fixed in 22.7, 31.7.2 allows attackers to gain escalated privileges using crafted telnet commands via Redis server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T00:32:09.000000Z"}</description>
      <content:encoded>{"uuid": "59e00991-de85-4ffe-9a4f-42319a933964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43119", "type": "seen", "source": "https://t.me/cibsecurity/72343", "content": "\u203c CVE-2023-43119 \u203c\n\nAn Access Control issue discovered in Extreme Networks Switch Engine (EXOS) before 32.5.1.5, also fixed in 22.7, 31.7.2 allows attackers to gain escalated privileges using crafted telnet commands via Redis server.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T00:32:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/59e00991-de85-4ffe-9a4f-42319a933964/export</guid>
      <pubDate>Tue, 17 Oct 2023 00:32:09 +0000</pubDate>
    </item>
    <item>
      <title>5d1b3ced-f9c0-44f5-8c94-9c5ffae604d7</title>
      <link>https://vulnerability.circl.lu/sighting/5d1b3ced-f9c0-44f5-8c94-9c5ffae604d7/export</link>
      <description>{"uuid": "5d1b3ced-f9c0-44f5-8c94-9c5ffae604d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4311", "type": "seen", "source": "https://t.me/ctinow/158031", "content": "https://ift.tt/v6o2qan\nCVE-2023-4311 Exploit", "creation_timestamp": "2023-12-21T23:16:40.000000Z"}</description>
      <content:encoded>{"uuid": "5d1b3ced-f9c0-44f5-8c94-9c5ffae604d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4311", "type": "seen", "source": "https://t.me/ctinow/158031", "content": "https://ift.tt/v6o2qan\nCVE-2023-4311 Exploit", "creation_timestamp": "2023-12-21T23:16:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5d1b3ced-f9c0-44f5-8c94-9c5ffae604d7/export</guid>
      <pubDate>Thu, 21 Dec 2023 23:16:40 +0000</pubDate>
    </item>
    <item>
      <title>2c56ad1e-c2c1-49b9-b2b1-8f8c48a0267b</title>
      <link>https://vulnerability.circl.lu/sighting/2c56ad1e-c2c1-49b9-b2b1-8f8c48a0267b/export</link>
      <description>{"uuid": "2c56ad1e-c2c1-49b9-b2b1-8f8c48a0267b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43116", "type": "seen", "source": "https://t.me/ctinow/158315", "content": "https://ift.tt/07EMP3x\nCVE-2023-43116", "creation_timestamp": "2023-12-22T11:22:11.000000Z"}</description>
      <content:encoded>{"uuid": "2c56ad1e-c2c1-49b9-b2b1-8f8c48a0267b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43116", "type": "seen", "source": "https://t.me/ctinow/158315", "content": "https://ift.tt/07EMP3x\nCVE-2023-43116", "creation_timestamp": "2023-12-22T11:22:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2c56ad1e-c2c1-49b9-b2b1-8f8c48a0267b/export</guid>
      <pubDate>Fri, 22 Dec 2023 11:22:11 +0000</pubDate>
    </item>
    <item>
      <title>2936f44f-ac83-403b-b5a8-395f4b04734a</title>
      <link>https://vulnerability.circl.lu/sighting/2936f44f-ac83-403b-b5a8-395f4b04734a/export</link>
      <description>{"uuid": "2936f44f-ac83-403b-b5a8-395f4b04734a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43116", "type": "seen", "source": "https://t.me/ctinow/162238", "content": "https://ift.tt/Ovk5d2s\nCVE-2023-43116 Exploit", "creation_timestamp": "2024-01-03T08:16:44.000000Z"}</description>
      <content:encoded>{"uuid": "2936f44f-ac83-403b-b5a8-395f4b04734a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43116", "type": "seen", "source": "https://t.me/ctinow/162238", "content": "https://ift.tt/Ovk5d2s\nCVE-2023-43116 Exploit", "creation_timestamp": "2024-01-03T08:16:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2936f44f-ac83-403b-b5a8-395f4b04734a/export</guid>
      <pubDate>Wed, 03 Jan 2024 08:16:44 +0000</pubDate>
    </item>
    <item>
      <title>3a0c5207-9e2a-4485-a588-abfead301320</title>
      <link>https://vulnerability.circl.lu/sighting/3a0c5207-9e2a-4485-a588-abfead301320/export</link>
      <description>{"uuid": "3a0c5207-9e2a-4485-a588-abfead301320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4311", "type": "seen", "source": "https://t.me/ctinow/167201", "content": "https://ift.tt/N0uZaWR\nCVE-2023-4311 | Vrm 360 3D Model Viewer Plugin up to 1.2.1 on WordPress Shortcode unrestricted upload", "creation_timestamp": "2024-01-12T11:36:30.000000Z"}</description>
      <content:encoded>{"uuid": "3a0c5207-9e2a-4485-a588-abfead301320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4311", "type": "seen", "source": "https://t.me/ctinow/167201", "content": "https://ift.tt/N0uZaWR\nCVE-2023-4311 | Vrm 360 3D Model Viewer Plugin up to 1.2.1 on WordPress Shortcode unrestricted upload", "creation_timestamp": "2024-01-12T11:36:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3a0c5207-9e2a-4485-a588-abfead301320/export</guid>
      <pubDate>Fri, 12 Jan 2024 11:36:30 +0000</pubDate>
    </item>
    <item>
      <title>2f39302d-9a93-4da9-8d5e-5532ee8ef05a</title>
      <link>https://vulnerability.circl.lu/sighting/2f39302d-9a93-4da9-8d5e-5532ee8ef05a/export</link>
      <description>{"uuid": "2f39302d-9a93-4da9-8d5e-5532ee8ef05a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43116", "type": "seen", "source": "https://t.me/ctinow/169619", "content": "https://ift.tt/zJ7ajKe\nCVE-2023-43116 | Buildkite Elastic CI for AWS up to 5.22.4/6.7.0 PIPELINE_PATH symlink (ATREDIS-2023-0003)", "creation_timestamp": "2024-01-18T09:11:22.000000Z"}</description>
      <content:encoded>{"uuid": "2f39302d-9a93-4da9-8d5e-5532ee8ef05a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43116", "type": "seen", "source": "https://t.me/ctinow/169619", "content": "https://ift.tt/zJ7ajKe\nCVE-2023-43116 | Buildkite Elastic CI for AWS up to 5.22.4/6.7.0 PIPELINE_PATH symlink (ATREDIS-2023-0003)", "creation_timestamp": "2024-01-18T09:11:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2f39302d-9a93-4da9-8d5e-5532ee8ef05a/export</guid>
      <pubDate>Thu, 18 Jan 2024 09:11:22 +0000</pubDate>
    </item>
    <item>
      <title>0d791f2f-0555-47a0-8447-87562f9eff10</title>
      <link>https://vulnerability.circl.lu/sighting/0d791f2f-0555-47a0-8447-87562f9eff10/export</link>
      <description>{"uuid": "0d791f2f-0555-47a0-8447-87562f9eff10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1288", "content": "#exploit\n1. CVE-2023-43115:\nArtifex Ghostscript GhostPDL gdevijs.c Privilege Escalation\nhttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n2. iRacing Exploit allows attackers to take control of user's computer\nhttps://blog.ss23.geek.nz/2023/09/21/iracing-electron-rce-exploit.html", "creation_timestamp": "2024-08-16T08:32:29.000000Z"}</description>
      <content:encoded>{"uuid": "0d791f2f-0555-47a0-8447-87562f9eff10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43115", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1288", "content": "#exploit\n1. CVE-2023-43115:\nArtifex Ghostscript GhostPDL gdevijs.c Privilege Escalation\nhttps://github.com/jostaub/ghostscript-CVE-2023-43115\n\n2. iRacing Exploit allows attackers to take control of user's computer\nhttps://blog.ss23.geek.nz/2023/09/21/iracing-electron-rce-exploit.html", "creation_timestamp": "2024-08-16T08:32:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0d791f2f-0555-47a0-8447-87562f9eff10/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:32:29 +0000</pubDate>
    </item>
    <item>
      <title>833c666e-e97d-42df-9da0-0725dbecf085</title>
      <link>https://vulnerability.circl.lu/sighting/833c666e-e97d-42df-9da0-0725dbecf085/export</link>
      <description>{"uuid": "833c666e-e97d-42df-9da0-0725dbecf085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43114", "type": "seen", "source": "https://gist.github.com/jakirkham/b16b96bb6b20b7a5405e686931fd28cd", "content": "", "creation_timestamp": "2026-01-14T19:38:38.000000Z"}</description>
      <content:encoded>{"uuid": "833c666e-e97d-42df-9da0-0725dbecf085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43114", "type": "seen", "source": "https://gist.github.com/jakirkham/b16b96bb6b20b7a5405e686931fd28cd", "content": "", "creation_timestamp": "2026-01-14T19:38:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/833c666e-e97d-42df-9da0-0725dbecf085/export</guid>
      <pubDate>Wed, 14 Jan 2026 19:38:38 +0000</pubDate>
    </item>
  </channel>
</rss>
