<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 06:49:49 +0000</lastBuildDate>
    <item>
      <title>80444164-ac12-4a70-943a-7588790a2305</title>
      <link>https://vulnerability.circl.lu/sighting/80444164-ac12-4a70-943a-7588790a2305/export</link>
      <description>{"uuid": "80444164-ac12-4a70-943a-7588790a2305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1109", "type": "seen", "source": "https://t.me/cibsecurity/62263", "content": "\u203c CVE-2023-1109 \u203c\n\nIn Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-17T12:28:11.000000Z"}</description>
      <content:encoded>{"uuid": "80444164-ac12-4a70-943a-7588790a2305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1109", "type": "seen", "source": "https://t.me/cibsecurity/62263", "content": "\u203c CVE-2023-1109 \u203c\n\nIn Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-17T12:28:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/80444164-ac12-4a70-943a-7588790a2305/export</guid>
      <pubDate>Mon, 17 Apr 2023 12:28:11 +0000</pubDate>
    </item>
    <item>
      <title>ac57ee37-7312-4bdc-8e2f-8dd85ecea51b</title>
      <link>https://vulnerability.circl.lu/sighting/ac57ee37-7312-4bdc-8e2f-8dd85ecea51b/export</link>
      <description>{"uuid": "ac57ee37-7312-4bdc-8e2f-8dd85ecea51b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1109", "type": "seen", "source": "https://t.me/arpsyndicate/2437", "content": "#ExploitObserverAlert\n\nCVE-2023-1109\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-1109. In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.\n\nFIRST-EPSS: 0.000490000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-04T05:39:16.000000Z"}</description>
      <content:encoded>{"uuid": "ac57ee37-7312-4bdc-8e2f-8dd85ecea51b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1109", "type": "seen", "source": "https://t.me/arpsyndicate/2437", "content": "#ExploitObserverAlert\n\nCVE-2023-1109\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-1109. In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.\n\nFIRST-EPSS: 0.000490000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-04T05:39:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ac57ee37-7312-4bdc-8e2f-8dd85ecea51b/export</guid>
      <pubDate>Thu, 04 Jan 2024 05:39:16 +0000</pubDate>
    </item>
  </channel>
</rss>
