<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T04:36:43.152277+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7309e026-9030-48a1-b57c-00cbb307be7f/export</id>
    <title>7309e026-9030-48a1-b57c-00cbb307be7f</title>
    <updated>2026-05-09T04:36:43.638906+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7309e026-9030-48a1-b57c-00cbb307be7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43271", "type": "seen", "source": "https://t.me/cibsecurity/71873", "content": "\u203c CVE-2023-43271 \u203c\n\nIncorrect access control in 70mai a500s v1.2.119 allows attackers to directly access and delete the video files of the driving recorder through ftp and other protocols.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T00:16:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7309e026-9030-48a1-b57c-00cbb307be7f/export"/>
    <published>2023-10-10T00:16:17+00:00</published>
  </entry>
</feed>
