<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 18:25:10 +0000</lastBuildDate>
    <item>
      <title>bc79e3f3-92ed-445c-9abc-823a04f1ff84</title>
      <link>https://vulnerability.circl.lu/sighting/bc79e3f3-92ed-445c-9abc-823a04f1ff84/export</link>
      <description>{"uuid": "bc79e3f3-92ed-445c-9abc-823a04f1ff84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "seen", "source": "https://t.me/ctinow/166571", "content": "https://ift.tt/1isDCkL\nCVE-2023-50159", "creation_timestamp": "2024-01-11T15:52:04.000000Z"}</description>
      <content:encoded>{"uuid": "bc79e3f3-92ed-445c-9abc-823a04f1ff84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "seen", "source": "https://t.me/ctinow/166571", "content": "https://ift.tt/1isDCkL\nCVE-2023-50159", "creation_timestamp": "2024-01-11T15:52:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bc79e3f3-92ed-445c-9abc-823a04f1ff84/export</guid>
      <pubDate>Thu, 11 Jan 2024 15:52:04 +0000</pubDate>
    </item>
    <item>
      <title>0903e36a-c348-4a26-b312-3de6ddb1106e</title>
      <link>https://vulnerability.circl.lu/sighting/0903e36a-c348-4a26-b312-3de6ddb1106e/export</link>
      <description>{"uuid": "0903e36a-c348-4a26-b312-3de6ddb1106e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "seen", "source": "https://t.me/ctinow/169934", "content": "https://ift.tt/qKDtVWv\nCVE-2023-50159 Exploit", "creation_timestamp": "2024-01-18T21:16:46.000000Z"}</description>
      <content:encoded>{"uuid": "0903e36a-c348-4a26-b312-3de6ddb1106e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "seen", "source": "https://t.me/ctinow/169934", "content": "https://ift.tt/qKDtVWv\nCVE-2023-50159 Exploit", "creation_timestamp": "2024-01-18T21:16:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0903e36a-c348-4a26-b312-3de6ddb1106e/export</guid>
      <pubDate>Thu, 18 Jan 2024 21:16:46 +0000</pubDate>
    </item>
    <item>
      <title>a16cb9cf-868b-4bdb-9fa2-badde183670d</title>
      <link>https://vulnerability.circl.lu/sighting/a16cb9cf-868b-4bdb-9fa2-badde183670d/export</link>
      <description>{"uuid": "a16cb9cf-868b-4bdb-9fa2-badde183670d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "seen", "source": "https://t.me/ctinow/175967", "content": "https://ift.tt/XKhI1vH\nCVE-2023-50159 | ScaleFusion 10.5.2 Kiosk Mode access control", "creation_timestamp": "2024-01-30T15:22:18.000000Z"}</description>
      <content:encoded>{"uuid": "a16cb9cf-868b-4bdb-9fa2-badde183670d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "seen", "source": "https://t.me/ctinow/175967", "content": "https://ift.tt/XKhI1vH\nCVE-2023-50159 | ScaleFusion 10.5.2 Kiosk Mode access control", "creation_timestamp": "2024-01-30T15:22:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a16cb9cf-868b-4bdb-9fa2-badde183670d/export</guid>
      <pubDate>Tue, 30 Jan 2024 15:22:18 +0000</pubDate>
    </item>
    <item>
      <title>73e91fc2-d4a6-45bf-bd35-9a93d6529580</title>
      <link>https://vulnerability.circl.lu/sighting/73e91fc2-d4a6-45bf-bd35-9a93d6529580/export</link>
      <description>{"uuid": "73e91fc2-d4a6-45bf-bd35-9a93d6529580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18625", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-50159\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ScaleFusion (Windows Desktop App) agent 10.5.2, Kiosk mode application restrictions can be bypassed allowing arbitrary code to be executed. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.\n\ud83d\udccf Published: 2024-01-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-17T16:03:06.166Z\n\ud83d\udd17 References:\n1. https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59\n2. https://medium.com/nestedif/vulnerability-disclosure-browser-mode-kiosk-bypass-scalefusion-832f5a18ebb6\n3. https://help.scalefusion.com/docs/security-advisory-for-windows-mdm-agent", "creation_timestamp": "2025-06-17T16:41:22.000000Z"}</description>
      <content:encoded>{"uuid": "73e91fc2-d4a6-45bf-bd35-9a93d6529580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50159", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18625", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-50159\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In ScaleFusion (Windows Desktop App) agent 10.5.2, Kiosk mode application restrictions can be bypassed allowing arbitrary code to be executed. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.\n\ud83d\udccf Published: 2024-01-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-17T16:03:06.166Z\n\ud83d\udd17 References:\n1. https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59\n2. https://medium.com/nestedif/vulnerability-disclosure-browser-mode-kiosk-bypass-scalefusion-832f5a18ebb6\n3. https://help.scalefusion.com/docs/security-advisory-for-windows-mdm-agent", "creation_timestamp": "2025-06-17T16:41:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/73e91fc2-d4a6-45bf-bd35-9a93d6529580/export</guid>
      <pubDate>Tue, 17 Jun 2025 16:41:22 +0000</pubDate>
    </item>
  </channel>
</rss>
