<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T02:58:36.110756+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/17db7533-f350-4e7e-9b19-4766806937de/export</id>
    <title>17db7533-f350-4e7e-9b19-4766806937de</title>
    <updated>2026-05-07T02:58:36.444740+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "17db7533-f350-4e7e-9b19-4766806937de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33070", "type": "seen", "source": "https://t.me/ctinow/158850", "content": "https://ift.tt/A1OnjKs\nCVE-2023-33070 | Qualcomm 210 Processor IO Call improper authentication", "creation_timestamp": "2023-12-23T15:51:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/17db7533-f350-4e7e-9b19-4766806937de/export"/>
    <published>2023-12-23T15:51:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ae458419-e807-41ad-a81b-24b686801fa3/export</id>
    <title>ae458419-e807-41ad-a81b-24b686801fa3</title>
    <updated>2026-05-07T02:58:36.444590+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ae458419-e807-41ad-a81b-24b686801fa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33071", "type": "seen", "source": "https://t.me/ctinow/158851", "content": "https://ift.tt/fjDk2FE\nCVE-2023-33071 | Qualcomm QCA6574 Graphics memory corruption", "creation_timestamp": "2023-12-23T15:51:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ae458419-e807-41ad-a81b-24b686801fa3/export"/>
    <published>2023-12-23T15:51:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/385b32c0-3aee-4409-8213-726fcebdedbf/export</id>
    <title>385b32c0-3aee-4409-8213-726fcebdedbf</title>
    <updated>2026-05-07T02:58:36.444420+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "385b32c0-3aee-4409-8213-726fcebdedbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33072", "type": "seen", "source": "https://t.me/ctinow/179793", "content": "https://ift.tt/sQALnut\nCVE-2023-33072", "creation_timestamp": "2024-02-06T07:26:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/385b32c0-3aee-4409-8213-726fcebdedbf/export"/>
    <published>2024-02-06T07:26:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/abb0cda3-0c32-415b-b1d0-3304d27ba8cb/export</id>
    <title>abb0cda3-0c32-415b-b1d0-3304d27ba8cb</title>
    <updated>2026-05-07T02:58:36.444276+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "abb0cda3-0c32-415b-b1d0-3304d27ba8cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33076", "type": "seen", "source": "https://t.me/ctinow/179794", "content": "https://ift.tt/a6Nw8Ls\nCVE-2023-33076", "creation_timestamp": "2024-02-06T07:26:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/abb0cda3-0c32-415b-b1d0-3304d27ba8cb/export"/>
    <published>2024-02-06T07:26:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0ce4a6df-d931-455a-8c43-4768ff36fca5/export</id>
    <title>0ce4a6df-d931-455a-8c43-4768ff36fca5</title>
    <updated>2026-05-07T02:58:36.444118+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0ce4a6df-d931-455a-8c43-4768ff36fca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33077", "type": "seen", "source": "https://t.me/ctinow/179795", "content": "https://ift.tt/LKkvfg9\nCVE-2023-33077", "creation_timestamp": "2024-02-06T07:26:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0ce4a6df-d931-455a-8c43-4768ff36fca5/export"/>
    <published>2024-02-06T07:26:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fb1c30a0-eb53-4ba8-9bb1-4b77325a3e71/export</id>
    <title>fb1c30a0-eb53-4ba8-9bb1-4b77325a3e71</title>
    <updated>2026-05-07T02:58:36.443955+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fb1c30a0-eb53-4ba8-9bb1-4b77325a3e71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33072", "type": "seen", "source": "https://t.me/ctinow/196839", "content": "https://ift.tt/Nx0k5Fq\nCVE-2023-33072 | Qualcomm 4 Gen 1 Mobile Platform memory corruption", "creation_timestamp": "2024-02-29T17:26:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fb1c30a0-eb53-4ba8-9bb1-4b77325a3e71/export"/>
    <published>2024-02-29T17:26:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/90bab0e8-328f-43fa-a68e-19c360dafe56/export</id>
    <title>90bab0e8-328f-43fa-a68e-19c360dafe56</title>
    <updated>2026-05-07T02:58:36.443793+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "90bab0e8-328f-43fa-a68e-19c360dafe56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33076", "type": "seen", "source": "https://t.me/ctinow/196870", "content": "https://ift.tt/JmQk8DW\nCVE-2023-33076 | Qualcomm 4 Gen 2 Mobile Platform memory corruption", "creation_timestamp": "2024-02-29T17:56:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/90bab0e8-328f-43fa-a68e-19c360dafe56/export"/>
    <published>2024-02-29T17:56:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/08216211-a409-45d9-aa3c-8ef499180da3/export</id>
    <title>08216211-a409-45d9-aa3c-8ef499180da3</title>
    <updated>2026-05-07T02:58:36.443531+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "08216211-a409-45d9-aa3c-8ef499180da3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33077", "type": "seen", "source": "https://t.me/ctinow/196871", "content": "https://ift.tt/SgR7nHA\nCVE-2023-33077 | Qualcomm 8 Gen 1 Mobile Platform HLOS memory corruption", "creation_timestamp": "2024-02-29T17:56:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/08216211-a409-45d9-aa3c-8ef499180da3/export"/>
    <published>2024-02-29T17:56:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/93b7b24d-d2af-44c6-ac47-57470f374dad/export</id>
    <title>93b7b24d-d2af-44c6-ac47-57470f374dad</title>
    <updated>2026-05-07T02:58:36.440525+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "93b7b24d-d2af-44c6-ac47-57470f374dad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33078", "type": "seen", "source": "https://t.me/ctinow/199194", "content": "https://ift.tt/4ftJmkc\nCVE-2023-33078", "creation_timestamp": "2024-03-04T12:32:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/93b7b24d-d2af-44c6-ac47-57470f374dad/export"/>
    <published>2024-03-04T12:32:03+00:00</published>
  </entry>
</feed>
