<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T17:59:48.633033+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/197200da-1663-49cd-9c3d-8b3b1116f2b0/export</id>
    <title>197200da-1663-49cd-9c3d-8b3b1116f2b0</title>
    <updated>2026-05-10T17:59:48.907852+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "197200da-1663-49cd-9c3d-8b3b1116f2b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28748", "type": "seen", "source": "https://t.me/cibsecurity/73579", "content": "\u203c CVE-2023-28748 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in biztechc Copy or Move Comments allows SQL Injection.This issue affects Copy or Move Comments: from n/a through 5.0.4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T12:25:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/197200da-1663-49cd-9c3d-8b3b1116f2b0/export"/>
    <published>2023-11-06T12:25:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d58e0173-4227-4c42-8ec0-10ff8c80e9d0/export</id>
    <title>d58e0173-4227-4c42-8ec0-10ff8c80e9d0</title>
    <updated>2026-05-10T17:59:48.907739+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d58e0173-4227-4c42-8ec0-10ff8c80e9d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28744", "type": "seen", "source": "https://t.me/arpsyndicate/2439", "content": "#ExploitObserverAlert\n\nCVE-2023-28744\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-28744. A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.1.1.15289. A specially crafted PDF document can trigger the reuse of previously freed memory by manipulating form fields of a specific type. This can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.\n\nFIRST-EPSS: 0.002380000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-04T05:57:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d58e0173-4227-4c42-8ec0-10ff8c80e9d0/export"/>
    <published>2024-01-04T05:57:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e378a548-a2b6-45ec-9ae1-30c9c1c608f6/export</id>
    <title>e378a548-a2b6-45ec-9ae1-30c9c1c608f6</title>
    <updated>2026-05-10T17:59:48.907619+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e378a548-a2b6-45ec-9ae1-30c9c1c608f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28743", "type": "seen", "source": "https://t.me/ctinow/170406", "content": "https://ift.tt/kbfWzlc\nCVE-2023-28743", "creation_timestamp": "2024-01-19T21:27:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e378a548-a2b6-45ec-9ae1-30c9c1c608f6/export"/>
    <published>2024-01-19T21:27:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5a693c53-b74a-48f0-aa2b-fd349d26c61e/export</id>
    <title>5a693c53-b74a-48f0-aa2b-fd349d26c61e</title>
    <updated>2026-05-10T17:59:48.907509+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5a693c53-b74a-48f0-aa2b-fd349d26c61e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28743", "type": "seen", "source": "https://t.me/ctinow/185721", "content": "https://ift.tt/1sxfzTC\nCVE-2023-28743 | Intel NUC BIOS prior QN0073 input validation (intel-sa-01009)", "creation_timestamp": "2024-02-15T17:51:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5a693c53-b74a-48f0-aa2b-fd349d26c61e/export"/>
    <published>2024-02-15T17:51:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2082e577-bc89-4c6a-bc83-8dde6d6086d5/export</id>
    <title>2082e577-bc89-4c6a-bc83-8dde6d6086d5</title>
    <updated>2026-05-10T17:59:48.907391+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2082e577-bc89-4c6a-bc83-8dde6d6086d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28745", "type": "seen", "source": "https://t.me/ctinow/201255", "content": "https://ift.tt/wIazXCK\nCVE-2023-28745 | Intel QSFP+ Configuration Utility Software uncontrolled search path (intel-sa-00974)", "creation_timestamp": "2024-03-06T12:11:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2082e577-bc89-4c6a-bc83-8dde6d6086d5/export"/>
    <published>2024-03-06T12:11:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0a0c27ad-e320-4fff-b8c4-cbc432d741bc/export</id>
    <title>0a0c27ad-e320-4fff-b8c4-cbc432d741bc</title>
    <updated>2026-05-10T17:59:48.907278+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0a0c27ad-e320-4fff-b8c4-cbc432d741bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208004", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:22:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0a0c27ad-e320-4fff-b8c4-cbc432d741bc/export"/>
    <published>2024-03-14T18:22:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8e1b0fa1-346d-42ee-900a-ccdbdf998062/export</id>
    <title>8e1b0fa1-346d-42ee-900a-ccdbdf998062</title>
    <updated>2026-05-10T17:59:48.907168+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8e1b0fa1-346d-42ee-900a-ccdbdf998062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208021", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:26:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8e1b0fa1-346d-42ee-900a-ccdbdf998062/export"/>
    <published>2024-03-14T18:26:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/54e5459f-9c66-417f-a5be-5ec119d28fce/export</id>
    <title>54e5459f-9c66-417f-a5be-5ec119d28fce</title>
    <updated>2026-05-10T17:59:48.907045+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "54e5459f-9c66-417f-a5be-5ec119d28fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/arpsyndicate/4260", "content": "#ExploitObserverAlert\n\nCVE-2023-28746\n\nDESCRIPTION: Exploit Observer has 67 entries in 7 file formats related to CVE-2023-28746. Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-03-16T21:27:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/54e5459f-9c66-417f-a5be-5ec119d28fce/export"/>
    <published>2024-03-16T21:27:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2bce2f7c-8690-46be-b9fc-0adf123e717e/export</id>
    <title>2bce2f7c-8690-46be-b9fc-0adf123e717e</title>
    <updated>2026-05-10T17:59:48.906881+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2bce2f7c-8690-46be-b9fc-0adf123e717e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13584", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28746\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\ud83d\udccf Published: 2024-03-14T16:45:50.370Z\n\ud83d\udccf Modified: 2025-04-26T20:03:13.216Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html\n2. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/\n3. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/\n4. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/\n5. http://www.openwall.com/lists/oss-security/2024/03/12/13\n6. https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html\n7. https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "creation_timestamp": "2025-04-26T20:08:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2bce2f7c-8690-46be-b9fc-0adf123e717e/export"/>
    <published>2025-04-26T20:08:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b2511e4a-4d84-46cf-a44c-c3847e4944cf/export</id>
    <title>b2511e4a-4d84-46cf-a44c-c3847e4944cf</title>
    <updated>2026-05-10T17:59:48.904893+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b2511e4a-4d84-46cf-a44c-c3847e4944cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://gist.github.com/alanc/ae834f8047eb234c68cf9b4db4a96958", "content": "", "creation_timestamp": "2025-08-19T21:03:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b2511e4a-4d84-46cf-a44c-c3847e4944cf/export"/>
    <published>2025-08-19T21:03:01+00:00</published>
  </entry>
</feed>
