<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 06:40:13 +0000</lastBuildDate>
    <item>
      <title>062bcb17-86d8-4d6f-98c0-a2d1451b99a3</title>
      <link>https://vulnerability.circl.lu/sighting/062bcb17-86d8-4d6f-98c0-a2d1451b99a3/export</link>
      <description>{"uuid": "062bcb17-86d8-4d6f-98c0-a2d1451b99a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45893", "type": "seen", "source": "https://t.me/ctinow/162053", "content": "https://ift.tt/nwFTehq\nCVE-2023-45893", "creation_timestamp": "2024-01-02T22:26:49.000000Z"}</description>
      <content:encoded>{"uuid": "062bcb17-86d8-4d6f-98c0-a2d1451b99a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45893", "type": "seen", "source": "https://t.me/ctinow/162053", "content": "https://ift.tt/nwFTehq\nCVE-2023-45893", "creation_timestamp": "2024-01-02T22:26:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/062bcb17-86d8-4d6f-98c0-a2d1451b99a3/export</guid>
      <pubDate>Tue, 02 Jan 2024 22:26:49 +0000</pubDate>
    </item>
    <item>
      <title>eaea431c-46dc-496b-97a5-e62ecb11633f</title>
      <link>https://vulnerability.circl.lu/sighting/eaea431c-46dc-496b-97a5-e62ecb11633f/export</link>
      <description>{"uuid": "eaea431c-46dc-496b-97a5-e62ecb11633f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45893", "type": "seen", "source": "https://t.me/cibsecurity/74199", "content": "\u203c\ufe0fCVE-2023-45893\u203c\ufe0f\n\nAn indirect Object Reference IDOR in the Order and Invoice pages in Floorsight Customer Portal Q3 2023 allows an unauthenticated remote attacker to view sensitive customer information.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:37:08.000000Z"}</description>
      <content:encoded>{"uuid": "eaea431c-46dc-496b-97a5-e62ecb11633f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45893", "type": "seen", "source": "https://t.me/cibsecurity/74199", "content": "\u203c\ufe0fCVE-2023-45893\u203c\ufe0f\n\nAn indirect Object Reference IDOR in the Order and Invoice pages in Floorsight Customer Portal Q3 2023 allows an unauthenticated remote attacker to view sensitive customer information.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:37:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eaea431c-46dc-496b-97a5-e62ecb11633f/export</guid>
      <pubDate>Wed, 03 Jan 2024 01:37:08 +0000</pubDate>
    </item>
    <item>
      <title>888b22b0-ecfb-4620-b506-7d935ddc0af8</title>
      <link>https://vulnerability.circl.lu/sighting/888b22b0-ecfb-4620-b506-7d935ddc0af8/export</link>
      <description>{"uuid": "888b22b0-ecfb-4620-b506-7d935ddc0af8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45893", "type": "seen", "source": "https://t.me/ctinow/171788", "content": "https://ift.tt/eWdgI6k\nCVE-2023-45893 | Floorsight Customer Portal Q3 2023 Order/Invoice Pages resource injection", "creation_timestamp": "2024-01-23T09:21:34.000000Z"}</description>
      <content:encoded>{"uuid": "888b22b0-ecfb-4620-b506-7d935ddc0af8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45893", "type": "seen", "source": "https://t.me/ctinow/171788", "content": "https://ift.tt/eWdgI6k\nCVE-2023-45893 | Floorsight Customer Portal Q3 2023 Order/Invoice Pages resource injection", "creation_timestamp": "2024-01-23T09:21:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/888b22b0-ecfb-4620-b506-7d935ddc0af8/export</guid>
      <pubDate>Tue, 23 Jan 2024 09:21:34 +0000</pubDate>
    </item>
  </channel>
</rss>
