<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T06:44:36.398597+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5af4f204-71b2-45b7-9625-09373a8312b1/export</id>
    <title>5af4f204-71b2-45b7-9625-09373a8312b1</title>
    <updated>2026-05-11T06:44:36.707385+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5af4f204-71b2-45b7-9625-09373a8312b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3069", "type": "seen", "source": "https://t.me/cibsecurity/64928", "content": "\u203c CVE-2023-3069 \u203c\n\nUnverified Password Change in GitHub repository tsolucio/corebos prior to 8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-02T20:39:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5af4f204-71b2-45b7-9625-09373a8312b1/export"/>
    <published>2023-06-02T20:39:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7a699cee-bb69-4bca-bad7-3fc3b22105a8/export</id>
    <title>7a699cee-bb69-4bca-bad7-3fc3b22105a8</title>
    <updated>2026-05-11T06:44:36.707305+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7a699cee-bb69-4bca-bad7-3fc3b22105a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30698", "type": "seen", "source": "https://t.me/cibsecurity/68147", "content": "\u203c CVE-2023-30698 \u203c\n\nImproper access control vulnerability in TelephonyUI prior to SMR Aug-2023 Release 1 allows local attacker to connect BLE without privilege.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T07:25:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7a699cee-bb69-4bca-bad7-3fc3b22105a8/export"/>
    <published>2023-08-10T07:25:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9906436e-c83f-4dad-8649-84b713743730/export</id>
    <title>9906436e-c83f-4dad-8649-84b713743730</title>
    <updated>2026-05-11T06:44:36.707228+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9906436e-c83f-4dad-8649-84b713743730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30695", "type": "seen", "source": "https://t.me/cibsecurity/68149", "content": "\u203c CVE-2023-30695 \u203c\n\nOut-of-bounds Write vulnerability in SSHDCPAPP TA prior to &amp;quot;SAMSUNG ELECTONICS, CO, LTD. - System Hardware Update - 7/13/2023&amp;quot; in Windows Update for Galaxy book Go, Galaxy book Go 5G, Galaxy book2 Go and Galaxy book2 Pro 360 allows local attacker to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T07:25:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9906436e-c83f-4dad-8649-84b713743730/export"/>
    <published>2023-08-10T07:25:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/288d6935-634b-4006-9a14-6d252314a0ab/export</id>
    <title>288d6935-634b-4006-9a14-6d252314a0ab</title>
    <updated>2026-05-11T06:44:36.707144+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "288d6935-634b-4006-9a14-6d252314a0ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30694", "type": "seen", "source": "https://t.me/cibsecurity/68151", "content": "\u203c CVE-2023-30694 \u203c\n\nOut-of-bounds Write in IpcTxPcscTransmitApdu of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T07:25:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/288d6935-634b-4006-9a14-6d252314a0ab/export"/>
    <published>2023-08-10T07:25:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/741256f7-fa92-44e7-9f7b-035bb1894733/export</id>
    <title>741256f7-fa92-44e7-9f7b-035bb1894733</title>
    <updated>2026-05-11T06:44:36.707030+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "741256f7-fa92-44e7-9f7b-035bb1894733", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30697", "type": "seen", "source": "https://t.me/cibsecurity/68152", "content": "\u203c CVE-2023-30697 \u203c\n\nAn improper input validation in IpcTxCfgSetSimlockPayload in libsec-ril prior to SMR Aug-2023 Release 1 allows attacker to cause out-of-bounds write.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T07:28:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/741256f7-fa92-44e7-9f7b-035bb1894733/export"/>
    <published>2023-08-10T07:28:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8388b0d3-3183-48dc-8f0d-6efb88591d88/export</id>
    <title>8388b0d3-3183-48dc-8f0d-6efb88591d88</title>
    <updated>2026-05-11T06:44:36.706944+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8388b0d3-3183-48dc-8f0d-6efb88591d88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30699", "type": "seen", "source": "https://t.me/cibsecurity/68156", "content": "\u203c CVE-2023-30699 \u203c\n\nOut-of-bounds write vulnerability in parser_hvcC function of libsimba library prior to SMR Aug-2023 Release 1 allows code execution by remote attackers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T07:28:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8388b0d3-3183-48dc-8f0d-6efb88591d88/export"/>
    <published>2023-08-10T07:28:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/415238b4-4e63-4eb6-93b3-6d46257a5114/export</id>
    <title>415238b4-4e63-4eb6-93b3-6d46257a5114</title>
    <updated>2026-05-11T06:44:36.706866+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "415238b4-4e63-4eb6-93b3-6d46257a5114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30693", "type": "seen", "source": "https://t.me/cibsecurity/68160", "content": "\u203c CVE-2023-30693 \u203c\n\nOut-of-bounds Write in DoOemFactorySendFactoryBypassCommand of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T07:28:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/415238b4-4e63-4eb6-93b3-6d46257a5114/export"/>
    <published>2023-08-10T07:28:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a9b2516d-542b-4766-8943-3c9443aa83da/export</id>
    <title>a9b2516d-542b-4766-8943-3c9443aa83da</title>
    <updated>2026-05-11T06:44:36.706782+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a9b2516d-542b-4766-8943-3c9443aa83da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30696", "type": "seen", "source": "https://t.me/cibsecurity/68163", "content": "\u203c CVE-2023-30696 \u203c\n\nAn improper input validation in IpcTxGetVerifyAkey in libsec-ril prior to SMR Aug-2023 Release 1 allows attacker to cause out-of-bounds write.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T07:28:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a9b2516d-542b-4766-8943-3c9443aa83da/export"/>
    <published>2023-08-10T07:28:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/143ead22-1f7a-4a4e-b1b2-96179cda2924/export</id>
    <title>143ead22-1f7a-4a4e-b1b2-96179cda2924</title>
    <updated>2026-05-11T06:44:36.706667+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "143ead22-1f7a-4a4e-b1b2-96179cda2924", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30691", "type": "seen", "source": "https://t.me/cibsecurity/68168", "content": "\u203c CVE-2023-30691 \u203c\n\nParcel mismatch in AuthenticationConfig prior to SMR Aug-2023 Release 1 allows local attacker to privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-10T07:31:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/143ead22-1f7a-4a4e-b1b2-96179cda2924/export"/>
    <published>2023-08-10T07:31:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d14a7430-689c-4728-8102-6e55a6795a4b/export</id>
    <title>d14a7430-689c-4728-8102-6e55a6795a4b</title>
    <updated>2026-05-11T06:44:36.704891+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d14a7430-689c-4728-8102-6e55a6795a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3069", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/822", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-3069\n\ud83d\udd39 Description: Unverified Password Change in GitHub repository tsolucio/corebos prior to 8.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-01-08T19:45:21.161Z\n\ud83d\udd17 References:\n1. https://huntr.dev/bounties/00544982-365a-476b-b5fe-42f02f11d367\n2. https://github.com/tsolucio/corebos/commit/e3dabd74c68646bb54538d66411fc1e633ec454b", "creation_timestamp": "2025-01-08T20:14:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d14a7430-689c-4728-8102-6e55a6795a4b/export"/>
    <published>2025-01-08T20:14:40+00:00</published>
  </entry>
</feed>
