<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T16:47:05.878026+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ad6904d6-ac3e-4b3a-8717-509e241f18ca/export</id>
    <title>ad6904d6-ac3e-4b3a-8717-509e241f18ca</title>
    <updated>2026-05-09T16:47:06.183946+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ad6904d6-ac3e-4b3a-8717-509e241f18ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48265", "type": "seen", "source": "https://t.me/ctinow/174904", "content": "https://ift.tt/C2EXdpv\nCVE-2023-48265 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T11:26:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ad6904d6-ac3e-4b3a-8717-509e241f18ca/export"/>
    <published>2024-01-28T11:26:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3/export</id>
    <title>8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3</title>
    <updated>2026-05-09T16:47:06.183868+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48266", "type": "seen", "source": "https://t.me/ctinow/174905", "content": "https://ift.tt/2j5nAm8\nCVE-2023-48266 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T11:26:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3/export"/>
    <published>2024-01-28T11:26:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/91a8999c-3824-415f-b6cc-b5319d9ced22/export</id>
    <title>91a8999c-3824-415f-b6cc-b5319d9ced22</title>
    <updated>2026-05-09T16:47:06.183771+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "91a8999c-3824-415f-b6cc-b5319d9ced22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48260", "type": "seen", "source": "https://t.me/ctinow/174925", "content": "https://ift.tt/CXOrc2h\nCVE-2023-48260 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 HTTP Request sql injection", "creation_timestamp": "2024-01-28T12:56:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/91a8999c-3824-415f-b6cc-b5319d9ced22/export"/>
    <published>2024-01-28T12:56:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/feaa14a4-10b7-41b1-9abd-e8285c745c08/export</id>
    <title>feaa14a4-10b7-41b1-9abd-e8285c745c08</title>
    <updated>2026-05-09T16:47:06.183690+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "feaa14a4-10b7-41b1-9abd-e8285c745c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48261", "type": "seen", "source": "https://t.me/ctinow/174926", "content": "https://ift.tt/k52VF4A\nCVE-2023-48261 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 HTTP Request sql injection", "creation_timestamp": "2024-01-28T12:56:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/feaa14a4-10b7-41b1-9abd-e8285c745c08/export"/>
    <published>2024-01-28T12:56:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a9118e30-800f-4150-adb0-ac1956d453bf/export</id>
    <title>a9118e30-800f-4150-adb0-ac1956d453bf</title>
    <updated>2026-05-09T16:47:06.183606+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a9118e30-800f-4150-adb0-ac1956d453bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4826", "type": "seen", "source": "https://t.me/ctinow/191651", "content": "https://ift.tt/0NGjbCV\nCVE-2023-4826", "creation_timestamp": "2024-02-23T11:26:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a9118e30-800f-4150-adb0-ac1956d453bf/export"/>
    <published>2024-02-23T11:26:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1530041f-310e-448f-99a7-73627e62874f/export</id>
    <title>1530041f-310e-448f-99a7-73627e62874f</title>
    <updated>2026-05-09T16:47:06.183503+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1530041f-310e-448f-99a7-73627e62874f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4826", "type": "seen", "source": "https://t.me/ctinow/191654", "content": "https://ift.tt/0NGjbCV\nCVE-2023-4826", "creation_timestamp": "2024-02-23T11:26:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1530041f-310e-448f-99a7-73627e62874f/export"/>
    <published>2024-02-23T11:26:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ad41397-b14d-4811-8479-2cdfac41cbee/export</id>
    <title>4ad41397-b14d-4811-8479-2cdfac41cbee</title>
    <updated>2026-05-09T16:47:06.183417+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ad41397-b14d-4811-8479-2cdfac41cbee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993094686929174", "content": "", "creation_timestamp": "2025-02-12T21:43:06.935104Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ad41397-b14d-4811-8479-2cdfac41cbee/export"/>
    <published>2025-02-12T21:43:06.935104+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a449a3c1-b56e-4b5c-bb28-2632326367e8/export</id>
    <title>a449a3c1-b56e-4b5c-bb28-2632326367e8</title>
    <updated>2026-05-09T16:47:06.183327+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a449a3c1-b56e-4b5c-bb28-2632326367e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz774ush72i", "content": "", "creation_timestamp": "2025-02-12T22:16:15.622922Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a449a3c1-b56e-4b5c-bb28-2632326367e8/export"/>
    <published>2025-02-12T22:16:15.622922+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bbbeefd0-479f-4eba-be2c-3b82643a1d15/export</id>
    <title>bbbeefd0-479f-4eba-be2c-3b82643a1d15</title>
    <updated>2026-05-09T16:47:06.183202+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bbbeefd0-479f-4eba-be2c-3b82643a1d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48267\n\ud83d\udd25 CVSS Score: 8.6 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-02-12T21:20:14.271Z\n\ud83d\udccf Modified: 2025-02-19T04:55:14.788Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", "creation_timestamp": "2025-02-19T08:39:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bbbeefd0-479f-4eba-be2c-3b82643a1d15/export"/>
    <published>2025-02-19T08:39:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6a236e38-fe2f-4502-ab25-83353f7d3f36/export</id>
    <title>6a236e38-fe2f-4502-ab25-83353f7d3f36</title>
    <updated>2026-05-09T16:47:06.181511+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6a236e38-fe2f-4502-ab25-83353f7d3f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48264", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48264\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.\n\ud83d\udccf Published: 2024-01-10T13:09:10.347Z\n\ud83d\udccf Modified: 2025-04-17T15:48:37.330Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html", "creation_timestamp": "2025-04-17T15:57:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6a236e38-fe2f-4502-ab25-83353f7d3f36/export"/>
    <published>2025-04-17T15:57:53+00:00</published>
  </entry>
</feed>
