<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 13:41:19 +0000</lastBuildDate>
    <item>
      <title>20430675-73c7-4217-a89b-fbe17b5e37ce</title>
      <link>https://vulnerability.circl.lu/sighting/20430675-73c7-4217-a89b-fbe17b5e37ce/export</link>
      <description>{"uuid": "20430675-73c7-4217-a89b-fbe17b5e37ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4496", "type": "seen", "source": "https://t.me/cibsecurity/71580", "content": "\u203c CVE-2023-4496 \u203c\n\nEasy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T16:12:15.000000Z"}</description>
      <content:encoded>{"uuid": "20430675-73c7-4217-a89b-fbe17b5e37ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4496", "type": "seen", "source": "https://t.me/cibsecurity/71580", "content": "\u203c CVE-2023-4496 \u203c\n\nEasy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T16:12:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/20430675-73c7-4217-a89b-fbe17b5e37ce/export</guid>
      <pubDate>Wed, 04 Oct 2023 16:12:15 +0000</pubDate>
    </item>
    <item>
      <title>ed88af03-22fe-4eb4-a965-d5c02020756b</title>
      <link>https://vulnerability.circl.lu/sighting/ed88af03-22fe-4eb4-a965-d5c02020756b/export</link>
      <description>{"uuid": "ed88af03-22fe-4eb4-a965-d5c02020756b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44961", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5287", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPoC for CVE-2023-44961\nURL\uff1ahttps://github.com/ggb0n/CVE-2023-44961\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-05T07:34:06.000000Z"}</description>
      <content:encoded>{"uuid": "ed88af03-22fe-4eb4-a965-d5c02020756b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44961", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5287", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPoC for CVE-2023-44961\nURL\uff1ahttps://github.com/ggb0n/CVE-2023-44961\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-05T07:34:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ed88af03-22fe-4eb4-a965-d5c02020756b/export</guid>
      <pubDate>Thu, 05 Oct 2023 07:34:06 +0000</pubDate>
    </item>
    <item>
      <title>d692fd41-3a17-4e59-8551-2f47c8c2d32d</title>
      <link>https://vulnerability.circl.lu/sighting/d692fd41-3a17-4e59-8551-2f47c8c2d32d/export</link>
      <description>{"uuid": "d692fd41-3a17-4e59-8551-2f47c8c2d32d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44962", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9151", "content": "#exploit\n1. CVE-2023-21275:\nGoogle Android AdminIntegFlowPrepareActivity*java LPE\nhttps://github.com/Trinadh465/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275\n\n2. CVE-2023-44962:\nUploading archive files containing symbolic links in\u00a0upload-cover-image*pl\u00a0can leak some of the content of the linked files\nhttps://github.com/ggb0n/CVE-2023-44962", "creation_timestamp": "2023-10-06T11:01:41.000000Z"}</description>
      <content:encoded>{"uuid": "d692fd41-3a17-4e59-8551-2f47c8c2d32d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44962", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9151", "content": "#exploit\n1. CVE-2023-21275:\nGoogle Android AdminIntegFlowPrepareActivity*java LPE\nhttps://github.com/Trinadh465/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275\n\n2. CVE-2023-44962:\nUploading archive files containing symbolic links in\u00a0upload-cover-image*pl\u00a0can leak some of the content of the linked files\nhttps://github.com/ggb0n/CVE-2023-44962", "creation_timestamp": "2023-10-06T11:01:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d692fd41-3a17-4e59-8551-2f47c8c2d32d/export</guid>
      <pubDate>Fri, 06 Oct 2023 11:01:41 +0000</pubDate>
    </item>
    <item>
      <title>77b623f8-922a-4394-a420-17e9c637ef08</title>
      <link>https://vulnerability.circl.lu/sighting/77b623f8-922a-4394-a420-17e9c637ef08/export</link>
      <description>{"uuid": "77b623f8-922a-4394-a420-17e9c637ef08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44962", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5363", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPoC for CVE-2023-44962\nURL\uff1ahttps://github.com/ggb0n/CVE-2023-44962\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-11T04:59:54.000000Z"}</description>
      <content:encoded>{"uuid": "77b623f8-922a-4394-a420-17e9c637ef08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44962", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5363", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPoC for CVE-2023-44962\nURL\uff1ahttps://github.com/ggb0n/CVE-2023-44962\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-11T04:59:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/77b623f8-922a-4394-a420-17e9c637ef08/export</guid>
      <pubDate>Wed, 11 Oct 2023 04:59:54 +0000</pubDate>
    </item>
    <item>
      <title>30c534cc-9b01-40e1-9502-c91c0db8f71b</title>
      <link>https://vulnerability.circl.lu/sighting/30c534cc-9b01-40e1-9502-c91c0db8f71b/export</link>
      <description>{"uuid": "30c534cc-9b01-40e1-9502-c91c0db8f71b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44961", "type": "seen", "source": "https://t.me/cibsecurity/72134", "content": "\u203c CVE-2023-44961 \u203c\n\nSQL Injection vulnerability in Koha Library Software 23.0.5.04 and before allows a remote attacker to obtain sensitive information via the intranet/cgi bin/cataloging/ysearch.pl. component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T22:17:33.000000Z"}</description>
      <content:encoded>{"uuid": "30c534cc-9b01-40e1-9502-c91c0db8f71b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44961", "type": "seen", "source": "https://t.me/cibsecurity/72134", "content": "\u203c CVE-2023-44961 \u203c\n\nSQL Injection vulnerability in Koha Library Software 23.0.5.04 and before allows a remote attacker to obtain sensitive information via the intranet/cgi bin/cataloging/ysearch.pl. component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T22:17:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/30c534cc-9b01-40e1-9502-c91c0db8f71b/export</guid>
      <pubDate>Wed, 11 Oct 2023 22:17:33 +0000</pubDate>
    </item>
    <item>
      <title>173bed3e-91f5-4660-8adb-d35e5989e8eb</title>
      <link>https://vulnerability.circl.lu/sighting/173bed3e-91f5-4660-8adb-d35e5989e8eb/export</link>
      <description>{"uuid": "173bed3e-91f5-4660-8adb-d35e5989e8eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44962", "type": "seen", "source": "https://t.me/cibsecurity/72136", "content": "\u203c CVE-2023-44962 \u203c\n\nFile Upload vulnerability in Koha Library Software 23.05.04 and before allows a remote attacker to read arbitrary files via the upload-cover-image.pl component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T22:17:35.000000Z"}</description>
      <content:encoded>{"uuid": "173bed3e-91f5-4660-8adb-d35e5989e8eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44962", "type": "seen", "source": "https://t.me/cibsecurity/72136", "content": "\u203c CVE-2023-44962 \u203c\n\nFile Upload vulnerability in Koha Library Software 23.05.04 and before allows a remote attacker to read arbitrary files via the upload-cover-image.pl component.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-11T22:17:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/173bed3e-91f5-4660-8adb-d35e5989e8eb/export</guid>
      <pubDate>Wed, 11 Oct 2023 22:17:35 +0000</pubDate>
    </item>
    <item>
      <title>c5409299-6b96-458c-97eb-b7bfed8f5c67</title>
      <link>https://vulnerability.circl.lu/sighting/c5409299-6b96-458c-97eb-b7bfed8f5c67/export</link>
      <description>{"uuid": "c5409299-6b96-458c-97eb-b7bfed8f5c67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44962", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1280", "content": "#exploit\n1. CVE-2023-21275:\nGoogle Android AdminIntegFlowPrepareActivity*java LPE\nhttps://github.com/Trinadh465/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275\n\n2. CVE-2023-44962:\nUploading archive files containing symbolic links in\u00a0upload-cover-image*pl\u00a0can leak some of the content of the linked files\nhttps://github.com/ggb0n/CVE-2023-44962", "creation_timestamp": "2024-08-16T08:32:29.000000Z"}</description>
      <content:encoded>{"uuid": "c5409299-6b96-458c-97eb-b7bfed8f5c67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-44962", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1280", "content": "#exploit\n1. CVE-2023-21275:\nGoogle Android AdminIntegFlowPrepareActivity*java LPE\nhttps://github.com/Trinadh465/packages_apps_ManagedProvisioning_AOSP10_r33_CVE-2023-21275\n\n2. CVE-2023-44962:\nUploading archive files containing symbolic links in\u00a0upload-cover-image*pl\u00a0can leak some of the content of the linked files\nhttps://github.com/ggb0n/CVE-2023-44962", "creation_timestamp": "2024-08-16T08:32:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c5409299-6b96-458c-97eb-b7bfed8f5c67/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:32:29 +0000</pubDate>
    </item>
  </channel>
</rss>
