<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 02:06:54 +0000</lastBuildDate>
    <item>
      <title>f22da396-40fb-4011-b961-5b4b7f1184cc</title>
      <link>https://vulnerability.circl.lu/sighting/f22da396-40fb-4011-b961-5b4b7f1184cc/export</link>
      <description>{"uuid": "f22da396-40fb-4011-b961-5b4b7f1184cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/ctinow/156786", "content": "https://ift.tt/7HduGLe\nCVE-2023-48121 | EZVIZ CS-C6N-xxx/CS-CV310-xxx/CS-C6CN-xxx/CS-C3N-xxx prior 5.3.x Build 20230401 Direct Connection Module access control", "creation_timestamp": "2023-12-20T07:32:33.000000Z"}</description>
      <content:encoded>{"uuid": "f22da396-40fb-4011-b961-5b4b7f1184cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/ctinow/156786", "content": "https://ift.tt/7HduGLe\nCVE-2023-48121 | EZVIZ CS-C6N-xxx/CS-CV310-xxx/CS-C6CN-xxx/CS-C3N-xxx prior 5.3.x Build 20230401 Direct Connection Module access control", "creation_timestamp": "2023-12-20T07:32:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f22da396-40fb-4011-b961-5b4b7f1184cc/export</guid>
      <pubDate>Wed, 20 Dec 2023 07:32:33 +0000</pubDate>
    </item>
    <item>
      <title>d7134c37-513e-4a2f-a2d1-0291ea01877a</title>
      <link>https://vulnerability.circl.lu/sighting/d7134c37-513e-4a2f-a2d1-0291ea01877a/export</link>
      <description>{"uuid": "d7134c37-513e-4a2f-a2d1-0291ea01877a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "Telegram/mz79O5Gczbro2H5WMb_3Vzckk-IuccpYC_5S1BWnVwGy", "content": "", "creation_timestamp": "2024-02-25T07:31:14.000000Z"}</description>
      <content:encoded>{"uuid": "d7134c37-513e-4a2f-a2d1-0291ea01877a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "Telegram/mz79O5Gczbro2H5WMb_3Vzckk-IuccpYC_5S1BWnVwGy", "content": "", "creation_timestamp": "2024-02-25T07:31:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d7134c37-513e-4a2f-a2d1-0291ea01877a/export</guid>
      <pubDate>Sun, 25 Feb 2024 07:31:14 +0000</pubDate>
    </item>
    <item>
      <title>7d47ff5c-584d-48f9-bb83-2125566b25a6</title>
      <link>https://vulnerability.circl.lu/sighting/7d47ff5c-584d-48f9-bb83-2125566b25a6/export</link>
      <description>{"uuid": "7d47ff5c-584d-48f9-bb83-2125566b25a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/2058", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:11:53.000000Z"}</description>
      <content:encoded>{"uuid": "7d47ff5c-584d-48f9-bb83-2125566b25a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/2058", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:11:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7d47ff5c-584d-48f9-bb83-2125566b25a6/export</guid>
      <pubDate>Mon, 03 Jun 2024 23:11:53 +0000</pubDate>
    </item>
    <item>
      <title>99bd8e19-fc16-49ba-9940-eca3c449e452</title>
      <link>https://vulnerability.circl.lu/sighting/99bd8e19-fc16-49ba-9940-eca3c449e452/export</link>
      <description>{"uuid": "99bd8e19-fc16-49ba-9940-eca3c449e452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/10407", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:11:53.000000Z"}</description>
      <content:encoded>{"uuid": "99bd8e19-fc16-49ba-9940-eca3c449e452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/10407", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:11:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/99bd8e19-fc16-49ba-9940-eca3c449e452/export</guid>
      <pubDate>Mon, 03 Jun 2024 23:11:53 +0000</pubDate>
    </item>
    <item>
      <title>55ec2f0e-b0c0-4fd5-9524-a9ae6b300e21</title>
      <link>https://vulnerability.circl.lu/sighting/55ec2f0e-b0c0-4fd5-9524-a9ae6b300e21/export</link>
      <description>{"uuid": "55ec2f0e-b0c0-4fd5-9524-a9ae6b300e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrew/10453", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:12:35.000000Z"}</description>
      <content:encoded>{"uuid": "55ec2f0e-b0c0-4fd5-9524-a9ae6b300e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrew/10453", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:12:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/55ec2f0e-b0c0-4fd5-9524-a9ae6b300e21/export</guid>
      <pubDate>Mon, 03 Jun 2024 23:12:35 +0000</pubDate>
    </item>
    <item>
      <title>826b8f6d-6983-4784-a164-e37f54e8f228</title>
      <link>https://vulnerability.circl.lu/sighting/826b8f6d-6983-4784-a164-e37f54e8f228/export</link>
      <description>{"uuid": "826b8f6d-6983-4784-a164-e37f54e8f228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "Telegram/KrysAMKV_ssHMzBssA4jddAyNcHHHx4Ilu6xfvvFEjTJZhI", "content": "", "creation_timestamp": "2024-06-04T09:06:13.000000Z"}</description>
      <content:encoded>{"uuid": "826b8f6d-6983-4784-a164-e37f54e8f228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "Telegram/KrysAMKV_ssHMzBssA4jddAyNcHHHx4Ilu6xfvvFEjTJZhI", "content": "", "creation_timestamp": "2024-06-04T09:06:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/826b8f6d-6983-4784-a164-e37f54e8f228/export</guid>
      <pubDate>Tue, 04 Jun 2024 09:06:13 +0000</pubDate>
    </item>
    <item>
      <title>e64f6fde-265c-4fd1-b6fa-83a8419f7e47</title>
      <link>https://vulnerability.circl.lu/sighting/e64f6fde-265c-4fd1-b6fa-83a8419f7e47/export</link>
      <description>{"uuid": "e64f6fde-265c-4fd1-b6fa-83a8419f7e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "Telegram/dDLIHBtJ9_N-emYlw0K4JD4hXTAaTtCLuazFpz7C1Io4dA", "content": "", "creation_timestamp": "2024-08-01T22:20:23.000000Z"}</description>
      <content:encoded>{"uuid": "e64f6fde-265c-4fd1-b6fa-83a8419f7e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "Telegram/dDLIHBtJ9_N-emYlw0K4JD4hXTAaTtCLuazFpz7C1Io4dA", "content": "", "creation_timestamp": "2024-08-01T22:20:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e64f6fde-265c-4fd1-b6fa-83a8419f7e47/export</guid>
      <pubDate>Thu, 01 Aug 2024 22:20:23 +0000</pubDate>
    </item>
  </channel>
</rss>
