<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T21:56:03.783150+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0e4bddad-0735-419f-b6d1-97b1347ecf32/export</id>
    <title>0e4bddad-0735-419f-b6d1-97b1347ecf32</title>
    <updated>2026-05-08T21:56:04.198366+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0e4bddad-0735-419f-b6d1-97b1347ecf32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40439", "type": "seen", "source": "https://t.me/ctinow/166224", "content": "https://ift.tt/H27yRXh\nCVE-2023-40439", "creation_timestamp": "2024-01-10T23:26:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0e4bddad-0735-419f-b6d1-97b1347ecf32/export"/>
    <published>2024-01-10T23:26:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3eeeb1e6-ddbc-4095-8adc-f82a508845ba/export</id>
    <title>3eeeb1e6-ddbc-4095-8adc-f82a508845ba</title>
    <updated>2026-05-08T21:56:04.198273+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3eeeb1e6-ddbc-4095-8adc-f82a508845ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40439", "type": "seen", "source": "https://t.me/ctinow/169757", "content": "https://ift.tt/T40Fpe1\nCVE-2023-40439 | Apple macOS Accounts Privilege Escalation", "creation_timestamp": "2024-01-18T14:46:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3eeeb1e6-ddbc-4095-8adc-f82a508845ba/export"/>
    <published>2024-01-18T14:46:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3dd19441-21c7-4c51-8d70-46009a737662/export</id>
    <title>3dd19441-21c7-4c51-8d70-46009a737662</title>
    <updated>2026-05-08T21:56:04.198130+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3dd19441-21c7-4c51-8d70-46009a737662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40439", "type": "seen", "source": "https://t.me/ctinow/175805", "content": "https://ift.tt/uyVS8NF\nCVE-2023-40439 | Apple iOS/iPadOS up to 16.5 information disclosure", "creation_timestamp": "2024-01-30T10:11:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3dd19441-21c7-4c51-8d70-46009a737662/export"/>
    <published>2024-01-30T10:11:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/427461b3-2571-463d-956f-6ca714389ef6/export</id>
    <title>427461b3-2571-463d-956f-6ca714389ef6</title>
    <updated>2026-05-08T21:56:04.193862+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "427461b3-2571-463d-956f-6ca714389ef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40439", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18101", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-40439\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to read sensitive location information.\n\ud83d\udccf Published: 2024-01-10T22:03:42.469Z\n\ud83d\udccf Modified: 2025-06-11T17:07:31.988Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT213841\n2. https://support.apple.com/en-us/HT213843", "creation_timestamp": "2025-06-11T17:34:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/427461b3-2571-463d-956f-6ca714389ef6/export"/>
    <published>2025-06-11T17:34:29+00:00</published>
  </entry>
</feed>
