<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 08:59:36 +0000</lastBuildDate>
    <item>
      <title>7ec661a9-f057-46b2-bf34-2a8df40a83b2</title>
      <link>https://vulnerability.circl.lu/sighting/7ec661a9-f057-46b2-bf34-2a8df40a83b2/export</link>
      <description>{"uuid": "7ec661a9-f057-46b2-bf34-2a8df40a83b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52112", "type": "seen", "source": "https://t.me/ctinow/178646", "content": "https://ift.tt/FoPC2Mm\nCVE-2023-52112 | Huawei HarmonyOS/EMUI Wallpaper Service Module access control", "creation_timestamp": "2024-02-03T21:26:52.000000Z"}</description>
      <content:encoded>{"uuid": "7ec661a9-f057-46b2-bf34-2a8df40a83b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52112", "type": "seen", "source": "https://t.me/ctinow/178646", "content": "https://ift.tt/FoPC2Mm\nCVE-2023-52112 | Huawei HarmonyOS/EMUI Wallpaper Service Module access control", "creation_timestamp": "2024-02-03T21:26:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7ec661a9-f057-46b2-bf34-2a8df40a83b2/export</guid>
      <pubDate>Sat, 03 Feb 2024 21:26:52 +0000</pubDate>
    </item>
    <item>
      <title>f2c83d1f-dd24-400e-bf0f-1b076074f8e5</title>
      <link>https://vulnerability.circl.lu/sighting/f2c83d1f-dd24-400e-bf0f-1b076074f8e5/export</link>
      <description>{"uuid": "f2c83d1f-dd24-400e-bf0f-1b076074f8e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52114", "type": "seen", "source": "https://t.me/ctinow/178647", "content": "https://ift.tt/1pQ4G5o\nCVE-2023-52114 | Huawei HarmonyOS/EMUI ScreenReader Module access control", "creation_timestamp": "2024-02-03T21:26:53.000000Z"}</description>
      <content:encoded>{"uuid": "f2c83d1f-dd24-400e-bf0f-1b076074f8e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52114", "type": "seen", "source": "https://t.me/ctinow/178647", "content": "https://ift.tt/1pQ4G5o\nCVE-2023-52114 | Huawei HarmonyOS/EMUI ScreenReader Module access control", "creation_timestamp": "2024-02-03T21:26:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2c83d1f-dd24-400e-bf0f-1b076074f8e5/export</guid>
      <pubDate>Sat, 03 Feb 2024 21:26:53 +0000</pubDate>
    </item>
    <item>
      <title>ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a</title>
      <link>https://vulnerability.circl.lu/sighting/ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a/export</link>
      <description>{"uuid": "ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52115", "type": "seen", "source": "https://t.me/ctinow/178649", "content": "https://ift.tt/7dE8tZa\nCVE-2023-52115 | Huawei HarmonyOS 4.0.0 iAware Module use after free", "creation_timestamp": "2024-02-03T21:56:30.000000Z"}</description>
      <content:encoded>{"uuid": "ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52115", "type": "seen", "source": "https://t.me/ctinow/178649", "content": "https://ift.tt/7dE8tZa\nCVE-2023-52115 | Huawei HarmonyOS 4.0.0 iAware Module use after free", "creation_timestamp": "2024-02-03T21:56:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ddfa2f75-b7e9-4e9f-b94a-3f08aa29240a/export</guid>
      <pubDate>Sat, 03 Feb 2024 21:56:30 +0000</pubDate>
    </item>
    <item>
      <title>d9497497-978f-4b37-b191-8c2d30f3d9da</title>
      <link>https://vulnerability.circl.lu/sighting/d9497497-978f-4b37-b191-8c2d30f3d9da/export</link>
      <description>{"uuid": "d9497497-978f-4b37-b191-8c2d30f3d9da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52116", "type": "seen", "source": "https://t.me/ctinow/178650", "content": "https://ift.tt/P1DVlgI\nCVE-2023-52116 | Huawei HarmonyOS/EMUI Multi-Screen Interaction Module privileges management", "creation_timestamp": "2024-02-03T21:56:31.000000Z"}</description>
      <content:encoded>{"uuid": "d9497497-978f-4b37-b191-8c2d30f3d9da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52116", "type": "seen", "source": "https://t.me/ctinow/178650", "content": "https://ift.tt/P1DVlgI\nCVE-2023-52116 | Huawei HarmonyOS/EMUI Multi-Screen Interaction Module privileges management", "creation_timestamp": "2024-02-03T21:56:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d9497497-978f-4b37-b191-8c2d30f3d9da/export</guid>
      <pubDate>Sat, 03 Feb 2024 21:56:31 +0000</pubDate>
    </item>
    <item>
      <title>c1f7f180-6712-4717-a832-c925e3a9e88e</title>
      <link>https://vulnerability.circl.lu/sighting/c1f7f180-6712-4717-a832-c925e3a9e88e/export</link>
      <description>{"uuid": "c1f7f180-6712-4717-a832-c925e3a9e88e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52118", "type": "seen", "source": "https://t.me/ctinow/192464", "content": "https://ift.tt/BvFUC6A\nCVE-2023-52118 | WP Event Manager WP User Profile Avatar Plugin up to 1.0 on WordPress cross site scripting", "creation_timestamp": "2024-02-24T08:11:10.000000Z"}</description>
      <content:encoded>{"uuid": "c1f7f180-6712-4717-a832-c925e3a9e88e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52118", "type": "seen", "source": "https://t.me/ctinow/192464", "content": "https://ift.tt/BvFUC6A\nCVE-2023-52118 | WP Event Manager WP User Profile Avatar Plugin up to 1.0 on WordPress cross site scripting", "creation_timestamp": "2024-02-24T08:11:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c1f7f180-6712-4717-a832-c925e3a9e88e/export</guid>
      <pubDate>Sat, 24 Feb 2024 08:11:10 +0000</pubDate>
    </item>
    <item>
      <title>d023180e-97a0-43cf-b464-4b0327ace53f</title>
      <link>https://vulnerability.circl.lu/sighting/d023180e-97a0-43cf-b464-4b0327ace53f/export</link>
      <description>{"uuid": "d023180e-97a0-43cf-b464-4b0327ace53f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52119", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17418", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52119\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Icegram Icegram Engage \u2013 WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building.This issue affects Icegram Engage \u2013 WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building: from n/a through 3.1.18.\n\n\n\ud83d\udccf Published: 2024-01-05T09:28:10.115Z\n\ud83d\udccf Modified: 2025-05-23T16:03:25.681Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/icegram/wordpress-icegram-engage-plugin-3-1-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-23T16:46:01.000000Z"}</description>
      <content:encoded>{"uuid": "d023180e-97a0-43cf-b464-4b0327ace53f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52119", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17418", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52119\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Icegram Icegram Engage \u2013 WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building.This issue affects Icegram Engage \u2013 WordPress Lead Generation, Popup Builder, CTA, Optins and Email List Building: from n/a through 3.1.18.\n\n\n\ud83d\udccf Published: 2024-01-05T09:28:10.115Z\n\ud83d\udccf Modified: 2025-05-23T16:03:25.681Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/vulnerability/icegram/wordpress-icegram-engage-plugin-3-1-18-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-23T16:46:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d023180e-97a0-43cf-b464-4b0327ace53f/export</guid>
      <pubDate>Fri, 23 May 2025 16:46:01 +0000</pubDate>
    </item>
    <item>
      <title>12126801-9432-47e4-a4fb-6ee452551eed</title>
      <link>https://vulnerability.circl.lu/sighting/12126801-9432-47e4-a4fb-6ee452551eed/export</link>
      <description>{"uuid": "12126801-9432-47e4-a4fb-6ee452551eed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52115", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18304", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52115\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The iaware module has a Use-After-Free (UAF) vulnerability. Successful exploitation of this vulnerability may affect the system functions.\n\ud83d\udccf Published: 2024-01-16T08:22:31.324Z\n\ud83d\udccf Modified: 2025-06-13T16:10:42.713Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-13T16:37:06.000000Z"}</description>
      <content:encoded>{"uuid": "12126801-9432-47e4-a4fb-6ee452551eed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52115", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18304", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52115\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The iaware module has a Use-After-Free (UAF) vulnerability. Successful exploitation of this vulnerability may affect the system functions.\n\ud83d\udccf Published: 2024-01-16T08:22:31.324Z\n\ud83d\udccf Modified: 2025-06-13T16:10:42.713Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-13T16:37:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/12126801-9432-47e4-a4fb-6ee452551eed/export</guid>
      <pubDate>Fri, 13 Jun 2025 16:37:06 +0000</pubDate>
    </item>
    <item>
      <title>b70554e5-cb59-4cf9-8efe-af4c4b64fafb</title>
      <link>https://vulnerability.circl.lu/sighting/b70554e5-cb59-4cf9-8efe-af4c4b64fafb/export</link>
      <description>{"uuid": "b70554e5-cb59-4cf9-8efe-af4c4b64fafb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52113", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19017", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52113\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability.\n\ud83d\udccf Published: 2024-01-16T07:58:43.439Z\n\ud83d\udccf Modified: 2025-06-20T17:20:27.978Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:37.000000Z"}</description>
      <content:encoded>{"uuid": "b70554e5-cb59-4cf9-8efe-af4c4b64fafb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52113", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19017", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52113\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability.\n\ud83d\udccf Published: 2024-01-16T07:58:43.439Z\n\ud83d\udccf Modified: 2025-06-20T17:20:27.978Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b70554e5-cb59-4cf9-8efe-af4c4b64fafb/export</guid>
      <pubDate>Fri, 20 Jun 2025 17:46:37 +0000</pubDate>
    </item>
    <item>
      <title>e81867e3-568e-4fb7-850d-11e429a2cefb</title>
      <link>https://vulnerability.circl.lu/sighting/e81867e3-568e-4fb7-850d-11e429a2cefb/export</link>
      <description>{"uuid": "e81867e3-568e-4fb7-850d-11e429a2cefb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52112", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19018", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52112\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2024-01-16T07:57:06.023Z\n\ud83d\udccf Modified: 2025-06-20T17:19:28.707Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:38.000000Z"}</description>
      <content:encoded>{"uuid": "e81867e3-568e-4fb7-850d-11e429a2cefb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52112", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19018", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52112\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2024-01-16T07:57:06.023Z\n\ud83d\udccf Modified: 2025-06-20T17:19:28.707Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e81867e3-568e-4fb7-850d-11e429a2cefb/export</guid>
      <pubDate>Fri, 20 Jun 2025 17:46:38 +0000</pubDate>
    </item>
    <item>
      <title>b0fac721-ef92-4135-96df-143ec5716047</title>
      <link>https://vulnerability.circl.lu/sighting/b0fac721-ef92-4135-96df-143ec5716047/export</link>
      <description>{"uuid": "b0fac721-ef92-4135-96df-143ec5716047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52110", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19019", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52110\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The sensor module has an out-of-bounds access vulnerability.Successful exploitation of this vulnerability may affect availability.\n\ud83d\udccf Published: 2024-01-16T07:54:39.422Z\n\ud83d\udccf Modified: 2025-06-20T17:18:42.847Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:39.000000Z"}</description>
      <content:encoded>{"uuid": "b0fac721-ef92-4135-96df-143ec5716047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52110", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19019", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-52110\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The sensor module has an out-of-bounds access vulnerability.Successful exploitation of this vulnerability may affect availability.\n\ud83d\udccf Published: 2024-01-16T07:54:39.422Z\n\ud83d\udccf Modified: 2025-06-20T17:18:42.847Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2024/1/\n2. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977", "creation_timestamp": "2025-06-20T17:46:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b0fac721-ef92-4135-96df-143ec5716047/export</guid>
      <pubDate>Fri, 20 Jun 2025 17:46:39 +0000</pubDate>
    </item>
  </channel>
</rss>
