<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 17:59:47 +0000</lastBuildDate>
    <item>
      <title>197200da-1663-49cd-9c3d-8b3b1116f2b0</title>
      <link>https://vulnerability.circl.lu/sighting/197200da-1663-49cd-9c3d-8b3b1116f2b0/export</link>
      <description>{"uuid": "197200da-1663-49cd-9c3d-8b3b1116f2b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28748", "type": "seen", "source": "https://t.me/cibsecurity/73579", "content": "\u203c CVE-2023-28748 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in biztechc Copy or Move Comments allows SQL Injection.This issue affects Copy or Move Comments: from n/a through 5.0.4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T12:25:42.000000Z"}</description>
      <content:encoded>{"uuid": "197200da-1663-49cd-9c3d-8b3b1116f2b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28748", "type": "seen", "source": "https://t.me/cibsecurity/73579", "content": "\u203c CVE-2023-28748 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in biztechc Copy or Move Comments allows SQL Injection.This issue affects Copy or Move Comments: from n/a through 5.0.4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T12:25:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/197200da-1663-49cd-9c3d-8b3b1116f2b0/export</guid>
      <pubDate>Mon, 06 Nov 2023 12:25:42 +0000</pubDate>
    </item>
    <item>
      <title>d58e0173-4227-4c42-8ec0-10ff8c80e9d0</title>
      <link>https://vulnerability.circl.lu/sighting/d58e0173-4227-4c42-8ec0-10ff8c80e9d0/export</link>
      <description>{"uuid": "d58e0173-4227-4c42-8ec0-10ff8c80e9d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28744", "type": "seen", "source": "https://t.me/arpsyndicate/2439", "content": "#ExploitObserverAlert\n\nCVE-2023-28744\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-28744. A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.1.1.15289. A specially crafted PDF document can trigger the reuse of previously freed memory by manipulating form fields of a specific type. This can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.\n\nFIRST-EPSS: 0.002380000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-04T05:57:58.000000Z"}</description>
      <content:encoded>{"uuid": "d58e0173-4227-4c42-8ec0-10ff8c80e9d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28744", "type": "seen", "source": "https://t.me/arpsyndicate/2439", "content": "#ExploitObserverAlert\n\nCVE-2023-28744\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-28744. A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.1.1.15289. A specially crafted PDF document can trigger the reuse of previously freed memory by manipulating form fields of a specific type. This can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.\n\nFIRST-EPSS: 0.002380000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-04T05:57:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d58e0173-4227-4c42-8ec0-10ff8c80e9d0/export</guid>
      <pubDate>Thu, 04 Jan 2024 05:57:58 +0000</pubDate>
    </item>
    <item>
      <title>e378a548-a2b6-45ec-9ae1-30c9c1c608f6</title>
      <link>https://vulnerability.circl.lu/sighting/e378a548-a2b6-45ec-9ae1-30c9c1c608f6/export</link>
      <description>{"uuid": "e378a548-a2b6-45ec-9ae1-30c9c1c608f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28743", "type": "seen", "source": "https://t.me/ctinow/170406", "content": "https://ift.tt/kbfWzlc\nCVE-2023-28743", "creation_timestamp": "2024-01-19T21:27:15.000000Z"}</description>
      <content:encoded>{"uuid": "e378a548-a2b6-45ec-9ae1-30c9c1c608f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28743", "type": "seen", "source": "https://t.me/ctinow/170406", "content": "https://ift.tt/kbfWzlc\nCVE-2023-28743", "creation_timestamp": "2024-01-19T21:27:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e378a548-a2b6-45ec-9ae1-30c9c1c608f6/export</guid>
      <pubDate>Fri, 19 Jan 2024 21:27:15 +0000</pubDate>
    </item>
    <item>
      <title>5a693c53-b74a-48f0-aa2b-fd349d26c61e</title>
      <link>https://vulnerability.circl.lu/sighting/5a693c53-b74a-48f0-aa2b-fd349d26c61e/export</link>
      <description>{"uuid": "5a693c53-b74a-48f0-aa2b-fd349d26c61e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28743", "type": "seen", "source": "https://t.me/ctinow/185721", "content": "https://ift.tt/1sxfzTC\nCVE-2023-28743 | Intel NUC BIOS prior QN0073 input validation (intel-sa-01009)", "creation_timestamp": "2024-02-15T17:51:37.000000Z"}</description>
      <content:encoded>{"uuid": "5a693c53-b74a-48f0-aa2b-fd349d26c61e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28743", "type": "seen", "source": "https://t.me/ctinow/185721", "content": "https://ift.tt/1sxfzTC\nCVE-2023-28743 | Intel NUC BIOS prior QN0073 input validation (intel-sa-01009)", "creation_timestamp": "2024-02-15T17:51:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5a693c53-b74a-48f0-aa2b-fd349d26c61e/export</guid>
      <pubDate>Thu, 15 Feb 2024 17:51:37 +0000</pubDate>
    </item>
    <item>
      <title>2082e577-bc89-4c6a-bc83-8dde6d6086d5</title>
      <link>https://vulnerability.circl.lu/sighting/2082e577-bc89-4c6a-bc83-8dde6d6086d5/export</link>
      <description>{"uuid": "2082e577-bc89-4c6a-bc83-8dde6d6086d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28745", "type": "seen", "source": "https://t.me/ctinow/201255", "content": "https://ift.tt/wIazXCK\nCVE-2023-28745 | Intel QSFP+ Configuration Utility Software uncontrolled search path (intel-sa-00974)", "creation_timestamp": "2024-03-06T12:11:32.000000Z"}</description>
      <content:encoded>{"uuid": "2082e577-bc89-4c6a-bc83-8dde6d6086d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28745", "type": "seen", "source": "https://t.me/ctinow/201255", "content": "https://ift.tt/wIazXCK\nCVE-2023-28745 | Intel QSFP+ Configuration Utility Software uncontrolled search path (intel-sa-00974)", "creation_timestamp": "2024-03-06T12:11:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2082e577-bc89-4c6a-bc83-8dde6d6086d5/export</guid>
      <pubDate>Wed, 06 Mar 2024 12:11:32 +0000</pubDate>
    </item>
    <item>
      <title>0a0c27ad-e320-4fff-b8c4-cbc432d741bc</title>
      <link>https://vulnerability.circl.lu/sighting/0a0c27ad-e320-4fff-b8c4-cbc432d741bc/export</link>
      <description>{"uuid": "0a0c27ad-e320-4fff-b8c4-cbc432d741bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208004", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:22:38.000000Z"}</description>
      <content:encoded>{"uuid": "0a0c27ad-e320-4fff-b8c4-cbc432d741bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208004", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:22:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0a0c27ad-e320-4fff-b8c4-cbc432d741bc/export</guid>
      <pubDate>Thu, 14 Mar 2024 18:22:38 +0000</pubDate>
    </item>
    <item>
      <title>8e1b0fa1-346d-42ee-900a-ccdbdf998062</title>
      <link>https://vulnerability.circl.lu/sighting/8e1b0fa1-346d-42ee-900a-ccdbdf998062/export</link>
      <description>{"uuid": "8e1b0fa1-346d-42ee-900a-ccdbdf998062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208021", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:26:53.000000Z"}</description>
      <content:encoded>{"uuid": "8e1b0fa1-346d-42ee-900a-ccdbdf998062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208021", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:26:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8e1b0fa1-346d-42ee-900a-ccdbdf998062/export</guid>
      <pubDate>Thu, 14 Mar 2024 18:26:53 +0000</pubDate>
    </item>
    <item>
      <title>54e5459f-9c66-417f-a5be-5ec119d28fce</title>
      <link>https://vulnerability.circl.lu/sighting/54e5459f-9c66-417f-a5be-5ec119d28fce/export</link>
      <description>{"uuid": "54e5459f-9c66-417f-a5be-5ec119d28fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/arpsyndicate/4260", "content": "#ExploitObserverAlert\n\nCVE-2023-28746\n\nDESCRIPTION: Exploit Observer has 67 entries in 7 file formats related to CVE-2023-28746. Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-03-16T21:27:43.000000Z"}</description>
      <content:encoded>{"uuid": "54e5459f-9c66-417f-a5be-5ec119d28fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/arpsyndicate/4260", "content": "#ExploitObserverAlert\n\nCVE-2023-28746\n\nDESCRIPTION: Exploit Observer has 67 entries in 7 file formats related to CVE-2023-28746. Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-03-16T21:27:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/54e5459f-9c66-417f-a5be-5ec119d28fce/export</guid>
      <pubDate>Sat, 16 Mar 2024 21:27:43 +0000</pubDate>
    </item>
    <item>
      <title>2bce2f7c-8690-46be-b9fc-0adf123e717e</title>
      <link>https://vulnerability.circl.lu/sighting/2bce2f7c-8690-46be-b9fc-0adf123e717e/export</link>
      <description>{"uuid": "2bce2f7c-8690-46be-b9fc-0adf123e717e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13584", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28746\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\ud83d\udccf Published: 2024-03-14T16:45:50.370Z\n\ud83d\udccf Modified: 2025-04-26T20:03:13.216Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html\n2. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/\n3. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/\n4. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/\n5. http://www.openwall.com/lists/oss-security/2024/03/12/13\n6. https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html\n7. https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "creation_timestamp": "2025-04-26T20:08:34.000000Z"}</description>
      <content:encoded>{"uuid": "2bce2f7c-8690-46be-b9fc-0adf123e717e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13584", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28746\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\ud83d\udccf Published: 2024-03-14T16:45:50.370Z\n\ud83d\udccf Modified: 2025-04-26T20:03:13.216Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html\n2. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/\n3. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/\n4. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/\n5. http://www.openwall.com/lists/oss-security/2024/03/12/13\n6. https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html\n7. https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "creation_timestamp": "2025-04-26T20:08:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2bce2f7c-8690-46be-b9fc-0adf123e717e/export</guid>
      <pubDate>Sat, 26 Apr 2025 20:08:34 +0000</pubDate>
    </item>
    <item>
      <title>b2511e4a-4d84-46cf-a44c-c3847e4944cf</title>
      <link>https://vulnerability.circl.lu/sighting/b2511e4a-4d84-46cf-a44c-c3847e4944cf/export</link>
      <description>{"uuid": "b2511e4a-4d84-46cf-a44c-c3847e4944cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://gist.github.com/alanc/ae834f8047eb234c68cf9b4db4a96958", "content": "", "creation_timestamp": "2025-08-19T21:03:01.000000Z"}</description>
      <content:encoded>{"uuid": "b2511e4a-4d84-46cf-a44c-c3847e4944cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://gist.github.com/alanc/ae834f8047eb234c68cf9b4db4a96958", "content": "", "creation_timestamp": "2025-08-19T21:03:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b2511e4a-4d84-46cf-a44c-c3847e4944cf/export</guid>
      <pubDate>Tue, 19 Aug 2025 21:03:01 +0000</pubDate>
    </item>
  </channel>
</rss>
