<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 23:52:40 +0000</lastBuildDate>
    <item>
      <title>fe9cd535-effd-426a-8775-e0f2c9d3606d</title>
      <link>https://vulnerability.circl.lu/sighting/fe9cd535-effd-426a-8775-e0f2c9d3606d/export</link>
      <description>{"uuid": "fe9cd535-effd-426a-8775-e0f2c9d3606d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43661", "type": "seen", "source": "https://t.me/cibsecurity/72144", "content": "\u203c CVE-2023-43661 \u203c\n\nCachet, the open-source status page system. Prior to the 2.4 branch, a template functionality which allows users to create templates allows them to execute any code on the server during the bad filtration and old twig version. Commit 6fb043e109d2a262ce3974e863c54e9e5f5e0587 of the 2.4 branch contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-12T00:17:39.000000Z"}</description>
      <content:encoded>{"uuid": "fe9cd535-effd-426a-8775-e0f2c9d3606d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43661", "type": "seen", "source": "https://t.me/cibsecurity/72144", "content": "\u203c CVE-2023-43661 \u203c\n\nCachet, the open-source status page system. Prior to the 2.4 branch, a template functionality which allows users to create templates allows them to execute any code on the server during the bad filtration and old twig version. Commit 6fb043e109d2a262ce3974e863c54e9e5f5e0587 of the 2.4 branch contains a patch for this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-12T00:17:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fe9cd535-effd-426a-8775-e0f2c9d3606d/export</guid>
      <pubDate>Thu, 12 Oct 2023 00:17:39 +0000</pubDate>
    </item>
  </channel>
</rss>
