<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 23:02:53 +0000</lastBuildDate>
    <item>
      <title>d2aa5aa8-c40e-4ae9-8e9a-bdf47b0cdd17</title>
      <link>https://vulnerability.circl.lu/sighting/d2aa5aa8-c40e-4ae9-8e9a-bdf47b0cdd17/export</link>
      <description>{"uuid": "d2aa5aa8-c40e-4ae9-8e9a-bdf47b0cdd17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26343", "type": "seen", "source": "https://t.me/cibsecurity/60939", "content": "\u203c CVE-2023-26343 \u203c\n\nAdobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:40:00.000000Z"}</description>
      <content:encoded>{"uuid": "d2aa5aa8-c40e-4ae9-8e9a-bdf47b0cdd17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26343", "type": "seen", "source": "https://t.me/cibsecurity/60939", "content": "\u203c CVE-2023-26343 \u203c\n\nAdobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:40:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d2aa5aa8-c40e-4ae9-8e9a-bdf47b0cdd17/export</guid>
      <pubDate>Wed, 29 Mar 2023 00:40:00 +0000</pubDate>
    </item>
    <item>
      <title>dd03dd45-be9b-4804-bd0e-802173a98f2d</title>
      <link>https://vulnerability.circl.lu/sighting/dd03dd45-be9b-4804-bd0e-802173a98f2d/export</link>
      <description>{"uuid": "dd03dd45-be9b-4804-bd0e-802173a98f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26344", "type": "seen", "source": "https://t.me/cibsecurity/60970", "content": "\u203c CVE-2023-26344 \u203c\n\nAdobe Dimension versions 3.4.7 (and earlier) is affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:49:51.000000Z"}</description>
      <content:encoded>{"uuid": "dd03dd45-be9b-4804-bd0e-802173a98f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26344", "type": "seen", "source": "https://t.me/cibsecurity/60970", "content": "\u203c CVE-2023-26344 \u203c\n\nAdobe Dimension versions 3.4.7 (and earlier) is affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:49:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dd03dd45-be9b-4804-bd0e-802173a98f2d/export</guid>
      <pubDate>Wed, 29 Mar 2023 00:49:51 +0000</pubDate>
    </item>
    <item>
      <title>ac987d3b-27ee-486a-b79d-61ff3ee8f035</title>
      <link>https://vulnerability.circl.lu/sighting/ac987d3b-27ee-486a-b79d-61ff3ee8f035/export</link>
      <description>{"uuid": "ac987d3b-27ee-486a-b79d-61ff3ee8f035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26346", "type": "seen", "source": "https://t.me/cibsecurity/60977", "content": "\u203c CVE-2023-26346 \u203c\n\nAdobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:55:58.000000Z"}</description>
      <content:encoded>{"uuid": "ac987d3b-27ee-486a-b79d-61ff3ee8f035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26346", "type": "seen", "source": "https://t.me/cibsecurity/60977", "content": "\u203c CVE-2023-26346 \u203c\n\nAdobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-29T00:55:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ac987d3b-27ee-486a-b79d-61ff3ee8f035/export</guid>
      <pubDate>Wed, 29 Mar 2023 00:55:58 +0000</pubDate>
    </item>
    <item>
      <title>11639145-ffd4-46bd-b1f5-45b4ca4dd808</title>
      <link>https://vulnerability.circl.lu/sighting/11639145-ffd4-46bd-b1f5-45b4ca4dd808/export</link>
      <description>{"uuid": "11639145-ffd4-46bd-b1f5-45b4ca4dd808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26347", "type": "seen", "source": "https://t.me/arpsyndicate/580", "content": "#ExploitObserverAlert\n\nCVE-2023-26347\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-26347. Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An unauthenticated attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.\n\nFIRST-EPSS: 0.006300000", "creation_timestamp": "2023-11-25T08:13:59.000000Z"}</description>
      <content:encoded>{"uuid": "11639145-ffd4-46bd-b1f5-45b4ca4dd808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26347", "type": "seen", "source": "https://t.me/arpsyndicate/580", "content": "#ExploitObserverAlert\n\nCVE-2023-26347\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-26347. Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An unauthenticated attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.\n\nFIRST-EPSS: 0.006300000", "creation_timestamp": "2023-11-25T08:13:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/11639145-ffd4-46bd-b1f5-45b4ca4dd808/export</guid>
      <pubDate>Sat, 25 Nov 2023 08:13:59 +0000</pubDate>
    </item>
    <item>
      <title>1ab22d97-be7f-4006-98ce-9c7708743e49</title>
      <link>https://vulnerability.circl.lu/sighting/1ab22d97-be7f-4006-98ce-9c7708743e49/export</link>
      <description>{"uuid": "1ab22d97-be7f-4006-98ce-9c7708743e49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2634", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/752", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-2634\n\ud83d\udd39 Description: The Get your number WordPress plugin through 1.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)\n\ud83d\udccf Published: 2023-06-05T13:39:00.960Z\n\ud83d\udccf Modified: 2025-01-08T16:37:50.335Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/1df111aa-6057-47a2-8e8b-9ef5ec3bb472", "creation_timestamp": "2025-01-08T17:20:37.000000Z"}</description>
      <content:encoded>{"uuid": "1ab22d97-be7f-4006-98ce-9c7708743e49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2634", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/752", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-2634\n\ud83d\udd39 Description: The Get your number WordPress plugin through 1.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)\n\ud83d\udccf Published: 2023-06-05T13:39:00.960Z\n\ud83d\udccf Modified: 2025-01-08T16:37:50.335Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/1df111aa-6057-47a2-8e8b-9ef5ec3bb472", "creation_timestamp": "2025-01-08T17:20:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1ab22d97-be7f-4006-98ce-9c7708743e49/export</guid>
      <pubDate>Wed, 08 Jan 2025 17:20:37 +0000</pubDate>
    </item>
  </channel>
</rss>
