<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T03:43:33.603365+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/213d9e26-77f9-4c0a-94bc-92fcdfdc1e85/export</id>
    <title>213d9e26-77f9-4c0a-94bc-92fcdfdc1e85</title>
    <updated>2026-05-10T03:43:33.909586+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "213d9e26-77f9-4c0a-94bc-92fcdfdc1e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://t.me/information_security_channel/50117", "content": "MOVEit Customers Urged to Patch Third Critical Vulnerability\nhttps://www.securityweek.com/moveit-customers-urged-to-patch-third-critical-vulnerability/\n\nA critical vulnerability (CVE-2023-35708) in MOVEit software could allow unauthenticated attackers to access database content.\nThe post MOVEit Customers Urged to Patch Third Critical Vulnerability (https://www.securityweek.com/moveit-customers-urged-to-patch-third-critical-vulnerability/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2023-06-19T14:27:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/213d9e26-77f9-4c0a-94bc-92fcdfdc1e85/export"/>
    <published>2023-06-19T14:27:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/760ce923-6296-42c7-8e53-bd9229fd0720/export</id>
    <title>760ce923-6296-42c7-8e53-bd9229fd0720</title>
    <updated>2026-05-10T03:43:33.909430+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "760ce923-6296-42c7-8e53-bd9229fd0720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://t.me/itsec_news/2919", "content": "\u200b\u26a1\ufe0f\u041f\u0430\u0434\u0435\u043d\u0438\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u043a\u0440\u0435\u043f\u043e\u0441\u0442\u0435\u0439: \u0438\u0441\u0442\u043e\u0440\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 MOVEit, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0442\u0440\u044f\u0441\u043b\u0430 \u043c\u0438\u0440.\n\n\ud83d\udcac \u0425\u0430\u043a\u0435\u0440\u0441\u043a\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 MOVEit Transfer \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u043d\u0430\u043d\u043e\u0441\u0438\u0442\u044c \u0443\u0449\u0435\u0440\u0431, \u0447\u0438\u0441\u043b\u043e \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u043f\u0440\u0438\u0431\u043b\u0438\u0436\u0430\u0435\u0442\u0441\u044f \u043a 400. \u0413\u0440\u0443\u043f\u043f\u0430 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 Clop \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Progress Software \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0442\u0435\u0439. \u0421\u0440\u0435\u0434\u0438 \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u0432\u0448\u0438\u0445 \u2013 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u0438 \u0438 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u0421\u0428\u0410, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0414\u0435\u043f\u0430\u0440\u0442\u0430\u043c\u0435\u043d\u0442 \u044d\u043d\u0435\u0440\u0433\u0435\u0442\u0438\u043a\u0438 \u0421\u0428\u0410 , Shell , Deutsche Bank \u0438 PwC .\n\n\u041f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 19 \u0438\u044e\u043b\u044f, \u0431\u044b\u043b\u043e \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043e 383 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0431\u043e\u043b\u0435\u0435 20 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u0447\u0435\u043b\u043e\u0432\u0435\u043a. \u0418\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0441 MOVEit \u0441\u0440\u0430\u0432\u043d\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0441 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c \u0441\u043b\u0443\u0447\u0430\u0435\u043c \u0432\u0437\u043b\u043e\u043c\u0430 SolarWinds , \u0445\u043e\u0442\u044f \u0438 \u043d\u0435 \u0442\u0430\u043a\u0438\u043c \u0440\u0430\u0437\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c. \u041e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0443\u0431\u044b\u0442\u043a\u0438 \u0431\u0443\u0434\u0443\u0442 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u043a\u0440\u0435\u0434\u0438\u0442\u043e\u0432 \u0434\u043b\u044f \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u043b\u044e\u0434\u0435\u0439 \u0438 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0441\u0443\u0434\u0435\u0431\u043d\u044b\u0445 \u0438\u0441\u043a\u043e\u0432.\n\n\u0411\u0440\u0438\u0442\u0430\u043d\u0441\u043a\u0438\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0440\u0430\u0441\u0447\u0451\u0442\u0430 \u0437\u0430\u0440\u0430\u0431\u043e\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u044b \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u043e\u043c Zellis \u043e\u0434\u0438\u043d \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u043f\u0435\u0440\u0432\u044b\u0445 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b , \u0447\u0442\u043e \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0441\u044f \u0443\u0442\u0435\u0447\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0432\u043b\u0438\u044f\u043b\u0430 \u043d\u0430 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0435\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 BBC , British Airways \u0438 \u0430\u043f\u0442\u0435\u0447\u043d\u0443\u044e \u0441\u0435\u0442\u044c Boots .\n\n\u0421\u0442\u043e\u0438\u0442 \u043d\u0430\u043f\u043e\u043c\u043d\u0438\u0442\u044c, \u0447\u0442\u043e \u0432\u0437\u043b\u043e\u043c MFT-\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b MOVEit Transfer \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0451\u043b 27 \u043c\u0430\u044f \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f CVE-2023-34362 . \u0417\u0430 \u0432\u0440\u0435\u043c\u044f \u043d\u0430\u0445\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 MOVEit \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u043f\u043e\u0445\u0438\u0442\u0438\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0441\u043e\u0442\u0435\u043d \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439. \u0418 \u0434\u0430\u043b\u0435\u043a\u043e \u043d\u0435 \u0432\u0441\u0435 \u0438\u0437 \u043d\u0438\u0445 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e\u0431 \u0443\u0442\u0435\u0447\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b, \u043d\u0430\u043f\u0430\u0434\u0435\u043d\u0438\u0435 \u043d\u0430 \u0441\u0435\u0440\u0432\u0438\u0441 MOVEit Transfer \u0433\u043e\u0442\u043e\u0432\u0438\u043b\u043e\u0441\u044c \u0435\u0449\u0451 \u0432 2021 \u0433\u043e\u0434\u0443, \u043a\u043e\u0433\u0434\u0430 \u0445\u0430\u043a\u0435\u0440\u044b \u043f\u0440\u043e\u0449\u0443\u043f\u044b\u0432\u0430\u043b\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043f\u0443\u0442\u0438 \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438.\n\n\u041e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e \u0432\u043a\u043b\u044e\u0447\u0430\u043b\u0438 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438 ( CVE-2023-34362 ), \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439 \u0434\u0435\u043d\u044c \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f. \u0417\u0430\u0442\u0435\u043c \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b\u0438 \u0435\u0449\u0435 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 9 \u0438 15 \u0438\u044e\u043d\u044f ( CVE-2023-35036 \u0438 CVE-2023-35708 ). \u0412 \u043d\u0430\u0447\u0430\u043b\u0435 \u0438\u044e\u043b\u044f \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0435\u0449\u0435 \u0442\u0440\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 ( CVE-2023-36934 , CVE-2023-36932 , \u0438 CVE-2023-36933 ).\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Bitsight, \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043f\u043e\u0441\u0442\u0430\u0432\u043e\u043a \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u0432\u0441\u0435 \u0431\u043e\u043b\u0435\u0435 \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438\u0437-\u0437\u0430 \u0438\u0445 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u0430. \u041e\u0434\u043d\u0430\u043a\u043e \u0442\u0430\u043a\u043e\u0439 \u043f\u043e\u0434\u0445\u043e\u0434 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442 \u043e\u0434\u043d\u043e\u0440\u0430\u0437\u043e\u0432\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u0430\u0436\u0434\u043e\u0439 \u0430\u0442\u0430\u043a\u0438, \u043f\u043e\u0441\u043b\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0438\u0441\u043a\u0430\u0442\u044c \u043d\u043e\u0432\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-07-23T12:50:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/760ce923-6296-42c7-8e53-bd9229fd0720/export"/>
    <published>2023-07-23T12:50:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/35b95149-ab1a-4dfc-8140-c527cc2ae62b/export</id>
    <title>35b95149-ab1a-4dfc-8140-c527cc2ae62b</title>
    <updated>2026-05-10T03:43:33.909338+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "35b95149-ab1a-4dfc-8140-c527cc2ae62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35702", "type": "seen", "source": "https://t.me/ctinow/169000", "content": "https://ift.tt/uacwhoP\nCVE-2023-35702 Exploit", "creation_timestamp": "2024-01-16T21:16:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/35b95149-ab1a-4dfc-8140-c527cc2ae62b/export"/>
    <published>2024-01-16T21:16:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/71c57a6a-0842-4c6d-8990-2df8d3f84543/export</id>
    <title>71c57a6a-0842-4c6d-8990-2df8d3f84543</title>
    <updated>2026-05-10T03:43:33.909245+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "71c57a6a-0842-4c6d-8990-2df8d3f84543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35704", "type": "seen", "source": "https://t.me/ctinow/169004", "content": "https://ift.tt/R6rWvzY\nCVE-2023-35704 Exploit", "creation_timestamp": "2024-01-16T21:16:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/71c57a6a-0842-4c6d-8990-2df8d3f84543/export"/>
    <published>2024-01-16T21:16:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7f1dc6e9-ecbf-4038-ba4c-957c49f72164/export</id>
    <title>7f1dc6e9-ecbf-4038-ba4c-957c49f72164</title>
    <updated>2026-05-10T03:43:33.909151+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7f1dc6e9-ecbf-4038-ba4c-957c49f72164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35703", "type": "seen", "source": "https://t.me/ctinow/169005", "content": "https://ift.tt/RhwGfBL\nCVE-2023-35703 Exploit", "creation_timestamp": "2024-01-16T21:16:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7f1dc6e9-ecbf-4038-ba4c-957c49f72164/export"/>
    <published>2024-01-16T21:16:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2a53f171-0edd-465e-bf45-14d2114bd531/export</id>
    <title>2a53f171-0edd-465e-bf45-14d2114bd531</title>
    <updated>2026-05-10T03:43:33.909030+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://cve.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "2a53f171-0edd-465e-bf45-14d2114bd531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/1dca9c72-3904-4b4f-b553-ba8d0b505998", "content": "", "creation_timestamp": "2024-11-12T17:22:11.893255Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2a53f171-0edd-465e-bf45-14d2114bd531/export"/>
    <published>2024-11-12T17:22:11.893255+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e3ea3a0d-1aab-48ed-8c81-fa4e779f2ecc/export</id>
    <title>e3ea3a0d-1aab-48ed-8c81-fa4e779f2ecc</title>
    <updated>2026-05-10T03:43:33.906906+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://cve.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "e3ea3a0d-1aab-48ed-8c81-fa4e779f2ecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-35708", "type": "exploited", "source": "", "content": "", "creation_timestamp": "2024-11-12T17:23:09.068084Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e3ea3a0d-1aab-48ed-8c81-fa4e779f2ecc/export"/>
    <published>2024-11-12T17:23:09.068084+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b17c51ee-0ed6-42f1-846d-a8d690816d2a/export</id>
    <title>b17c51ee-0ed6-42f1-846d-a8d690816d2a</title>
    <updated>2026-05-10T03:43:33.904762+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://cve.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "b17c51ee-0ed6-42f1-846d-a8d690816d2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2023-35708", "type": "exploited", "source": "", "content": "", "creation_timestamp": "2024-11-13T09:31:52.226161Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b17c51ee-0ed6-42f1-846d-a8d690816d2a/export"/>
    <published>2024-11-13T09:31:52.226161+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bff25a42-bed0-4527-8035-92912867c1fb/export</id>
    <title>bff25a42-bed0-4527-8035-92912867c1fb</title>
    <updated>2026-05-10T03:43:33.904598+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bff25a42-bed0-4527-8035-92912867c1fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35703", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18673", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35703\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint64 function.\n\ud83d\udccf Published: 2024-01-08T14:48:01.249Z\n\ud83d\udccf Modified: 2025-06-17T20:29:16.400Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783\n2. https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html", "creation_timestamp": "2025-06-17T20:40:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bff25a42-bed0-4527-8035-92912867c1fb/export"/>
    <published>2025-06-17T20:40:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1366401d-4684-4ebe-9301-d1a5c22b385d/export</id>
    <title>1366401d-4684-4ebe-9301-d1a5c22b385d</title>
    <updated>2026-05-10T03:43:33.900802+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1366401d-4684-4ebe-9301-d1a5c22b385d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3me5bzf7xr724", "content": "", "creation_timestamp": "2026-02-05T21:02:50.927398Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1366401d-4684-4ebe-9301-d1a5c22b385d/export"/>
    <published>2026-02-05T21:02:50.927398+00:00</published>
  </entry>
</feed>
