<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T23:17:37.921086+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7d53123d-1dd4-4fd9-ac1e-4ab5be65b9d3/export</id>
    <title>7d53123d-1dd4-4fd9-ac1e-4ab5be65b9d3</title>
    <updated>2026-05-08T23:17:38.348848+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7d53123d-1dd4-4fd9-ac1e-4ab5be65b9d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37286", "type": "seen", "source": "https://t.me/cibsecurity/66243", "content": "\u203c CVE-2023-37286 \u203c\n\nSmartSoft SmartBPM.NET has a vulnerability of using hard-coded machine key. An unauthenticated remote attacker can use the machine key to send serialized payload to the server to execute arbitrary code and disrupt service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-10T07:23:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7d53123d-1dd4-4fd9-ac1e-4ab5be65b9d3/export"/>
    <published>2023-07-10T07:23:27+00:00</published>
  </entry>
</feed>
