<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 14:48:01 +0000</lastBuildDate>
    <item>
      <title>aed08d15-c6cc-4f72-b597-8ed2ed15e3e9</title>
      <link>https://vulnerability.circl.lu/sighting/aed08d15-c6cc-4f72-b597-8ed2ed15e3e9/export</link>
      <description>{"uuid": "aed08d15-c6cc-4f72-b597-8ed2ed15e3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7166", "type": "seen", "source": "https://t.me/ctinow/160405", "content": "https://ift.tt/8zVpw2s\nCVE-2023-7166", "creation_timestamp": "2023-12-29T10:26:41.000000Z"}</description>
      <content:encoded>{"uuid": "aed08d15-c6cc-4f72-b597-8ed2ed15e3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7166", "type": "seen", "source": "https://t.me/ctinow/160405", "content": "https://ift.tt/8zVpw2s\nCVE-2023-7166", "creation_timestamp": "2023-12-29T10:26:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aed08d15-c6cc-4f72-b597-8ed2ed15e3e9/export</guid>
      <pubDate>Fri, 29 Dec 2023 10:26:41 +0000</pubDate>
    </item>
    <item>
      <title>36599015-2ea6-479f-aa28-bbf273926a4b</title>
      <link>https://vulnerability.circl.lu/sighting/36599015-2ea6-479f-aa28-bbf273926a4b/export</link>
      <description>{"uuid": "36599015-2ea6-479f-aa28-bbf273926a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7166", "type": "seen", "source": "https://t.me/cibsecurity/73920", "content": "\u203c\ufe0fCVE-2023-7166\u203c\ufe0f\n\nA vulnerability classified as problematic has been found in NovelPlus up to 4.2.0. This affects an unknown part of the file userupdateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c62da9bb3a9b3603014d0edb436146512631100d. It is recommended to apply a patch to fix this issue. The identifier VDB249201 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:36:15.000000Z"}</description>
      <content:encoded>{"uuid": "36599015-2ea6-479f-aa28-bbf273926a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7166", "type": "seen", "source": "https://t.me/cibsecurity/73920", "content": "\u203c\ufe0fCVE-2023-7166\u203c\ufe0f\n\nA vulnerability classified as problematic has been found in NovelPlus up to 4.2.0. This affects an unknown part of the file userupdateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c62da9bb3a9b3603014d0edb436146512631100d. It is recommended to apply a patch to fix this issue. The identifier VDB249201 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2023-12-30T01:36:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/36599015-2ea6-479f-aa28-bbf273926a4b/export</guid>
      <pubDate>Sat, 30 Dec 2023 01:36:15 +0000</pubDate>
    </item>
    <item>
      <title>6c2a0ea6-3bfb-4150-b53c-d19e44b948b7</title>
      <link>https://vulnerability.circl.lu/sighting/6c2a0ea6-3bfb-4150-b53c-d19e44b948b7/export</link>
      <description>{"uuid": "6c2a0ea6-3bfb-4150-b53c-d19e44b948b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7166", "type": "seen", "source": "https://t.me/ctinow/163659", "content": "https://ift.tt/ftGIpmg\nCVE-2023-7166 Exploit", "creation_timestamp": "2024-01-05T19:17:12.000000Z"}</description>
      <content:encoded>{"uuid": "6c2a0ea6-3bfb-4150-b53c-d19e44b948b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7166", "type": "seen", "source": "https://t.me/ctinow/163659", "content": "https://ift.tt/ftGIpmg\nCVE-2023-7166 Exploit", "creation_timestamp": "2024-01-05T19:17:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6c2a0ea6-3bfb-4150-b53c-d19e44b948b7/export</guid>
      <pubDate>Fri, 05 Jan 2024 19:17:12 +0000</pubDate>
    </item>
    <item>
      <title>34a128ba-824d-404f-ac1c-a7699a8f18ba</title>
      <link>https://vulnerability.circl.lu/sighting/34a128ba-824d-404f-ac1c-a7699a8f18ba/export</link>
      <description>{"uuid": "34a128ba-824d-404f-ac1c-a7699a8f18ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7166", "type": "seen", "source": "https://t.me/ctinow/170643", "content": "https://ift.tt/NnOzf5P\nCVE-2023-7166 | Novel-Plus up to 4.2.0 HTTP POST Request /user/updateUserInfo nickName cross site scripting", "creation_timestamp": "2024-01-20T15:17:06.000000Z"}</description>
      <content:encoded>{"uuid": "34a128ba-824d-404f-ac1c-a7699a8f18ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-7166", "type": "seen", "source": "https://t.me/ctinow/170643", "content": "https://ift.tt/NnOzf5P\nCVE-2023-7166 | Novel-Plus up to 4.2.0 HTTP POST Request /user/updateUserInfo nickName cross site scripting", "creation_timestamp": "2024-01-20T15:17:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/34a128ba-824d-404f-ac1c-a7699a8f18ba/export</guid>
      <pubDate>Sat, 20 Jan 2024 15:17:06 +0000</pubDate>
    </item>
  </channel>
</rss>
