<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 03:01:20 +0000</lastBuildDate>
    <item>
      <title>213d9e26-77f9-4c0a-94bc-92fcdfdc1e85</title>
      <link>https://vulnerability.circl.lu/sighting/213d9e26-77f9-4c0a-94bc-92fcdfdc1e85/export</link>
      <description>{"uuid": "213d9e26-77f9-4c0a-94bc-92fcdfdc1e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://t.me/information_security_channel/50117", "content": "MOVEit Customers Urged to Patch Third Critical Vulnerability\nhttps://www.securityweek.com/moveit-customers-urged-to-patch-third-critical-vulnerability/\n\nA critical vulnerability (CVE-2023-35708) in MOVEit software could allow unauthenticated attackers to access database content.\nThe post MOVEit Customers Urged to Patch Third Critical Vulnerability (https://www.securityweek.com/moveit-customers-urged-to-patch-third-critical-vulnerability/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2023-06-19T14:27:51.000000Z"}</description>
      <content:encoded>{"uuid": "213d9e26-77f9-4c0a-94bc-92fcdfdc1e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://t.me/information_security_channel/50117", "content": "MOVEit Customers Urged to Patch Third Critical Vulnerability\nhttps://www.securityweek.com/moveit-customers-urged-to-patch-third-critical-vulnerability/\n\nA critical vulnerability (CVE-2023-35708) in MOVEit software could allow unauthenticated attackers to access database content.\nThe post MOVEit Customers Urged to Patch Third Critical Vulnerability (https://www.securityweek.com/moveit-customers-urged-to-patch-third-critical-vulnerability/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2023-06-19T14:27:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/213d9e26-77f9-4c0a-94bc-92fcdfdc1e85/export</guid>
      <pubDate>Mon, 19 Jun 2023 14:27:51 +0000</pubDate>
    </item>
    <item>
      <title>760ce923-6296-42c7-8e53-bd9229fd0720</title>
      <link>https://vulnerability.circl.lu/sighting/760ce923-6296-42c7-8e53-bd9229fd0720/export</link>
      <description>{"uuid": "760ce923-6296-42c7-8e53-bd9229fd0720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://t.me/itsec_news/2919", "content": "\u200b\u26a1\ufe0f\u041f\u0430\u0434\u0435\u043d\u0438\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u043a\u0440\u0435\u043f\u043e\u0441\u0442\u0435\u0439: \u0438\u0441\u0442\u043e\u0440\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 MOVEit, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0442\u0440\u044f\u0441\u043b\u0430 \u043c\u0438\u0440.\n\n\ud83d\udcac \u0425\u0430\u043a\u0435\u0440\u0441\u043a\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 MOVEit Transfer \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u043d\u0430\u043d\u043e\u0441\u0438\u0442\u044c \u0443\u0449\u0435\u0440\u0431, \u0447\u0438\u0441\u043b\u043e \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u043f\u0440\u0438\u0431\u043b\u0438\u0436\u0430\u0435\u0442\u0441\u044f \u043a 400. \u0413\u0440\u0443\u043f\u043f\u0430 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 Clop \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Progress Software \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0442\u0435\u0439. \u0421\u0440\u0435\u0434\u0438 \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u0432\u0448\u0438\u0445 \u2013 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u0438 \u0438 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u0421\u0428\u0410, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0414\u0435\u043f\u0430\u0440\u0442\u0430\u043c\u0435\u043d\u0442 \u044d\u043d\u0435\u0440\u0433\u0435\u0442\u0438\u043a\u0438 \u0421\u0428\u0410 , Shell , Deutsche Bank \u0438 PwC .\n\n\u041f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 19 \u0438\u044e\u043b\u044f, \u0431\u044b\u043b\u043e \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043e 383 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0431\u043e\u043b\u0435\u0435 20 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u0447\u0435\u043b\u043e\u0432\u0435\u043a. \u0418\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0441 MOVEit \u0441\u0440\u0430\u0432\u043d\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0441 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c \u0441\u043b\u0443\u0447\u0430\u0435\u043c \u0432\u0437\u043b\u043e\u043c\u0430 SolarWinds , \u0445\u043e\u0442\u044f \u0438 \u043d\u0435 \u0442\u0430\u043a\u0438\u043c \u0440\u0430\u0437\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c. \u041e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0443\u0431\u044b\u0442\u043a\u0438 \u0431\u0443\u0434\u0443\u0442 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u043a\u0440\u0435\u0434\u0438\u0442\u043e\u0432 \u0434\u043b\u044f \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u043b\u044e\u0434\u0435\u0439 \u0438 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0441\u0443\u0434\u0435\u0431\u043d\u044b\u0445 \u0438\u0441\u043a\u043e\u0432.\n\n\u0411\u0440\u0438\u0442\u0430\u043d\u0441\u043a\u0438\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0440\u0430\u0441\u0447\u0451\u0442\u0430 \u0437\u0430\u0440\u0430\u0431\u043e\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u044b \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u043e\u043c Zellis \u043e\u0434\u0438\u043d \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u043f\u0435\u0440\u0432\u044b\u0445 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b , \u0447\u0442\u043e \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0441\u044f \u0443\u0442\u0435\u0447\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0432\u043b\u0438\u044f\u043b\u0430 \u043d\u0430 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0435\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 BBC , British Airways \u0438 \u0430\u043f\u0442\u0435\u0447\u043d\u0443\u044e \u0441\u0435\u0442\u044c Boots .\n\n\u0421\u0442\u043e\u0438\u0442 \u043d\u0430\u043f\u043e\u043c\u043d\u0438\u0442\u044c, \u0447\u0442\u043e \u0432\u0437\u043b\u043e\u043c MFT-\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b MOVEit Transfer \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0451\u043b 27 \u043c\u0430\u044f \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f CVE-2023-34362 . \u0417\u0430 \u0432\u0440\u0435\u043c\u044f \u043d\u0430\u0445\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 MOVEit \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u043f\u043e\u0445\u0438\u0442\u0438\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0441\u043e\u0442\u0435\u043d \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439. \u0418 \u0434\u0430\u043b\u0435\u043a\u043e \u043d\u0435 \u0432\u0441\u0435 \u0438\u0437 \u043d\u0438\u0445 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e\u0431 \u0443\u0442\u0435\u0447\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b, \u043d\u0430\u043f\u0430\u0434\u0435\u043d\u0438\u0435 \u043d\u0430 \u0441\u0435\u0440\u0432\u0438\u0441 MOVEit Transfer \u0433\u043e\u0442\u043e\u0432\u0438\u043b\u043e\u0441\u044c \u0435\u0449\u0451 \u0432 2021 \u0433\u043e\u0434\u0443, \u043a\u043e\u0433\u0434\u0430 \u0445\u0430\u043a\u0435\u0440\u044b \u043f\u0440\u043e\u0449\u0443\u043f\u044b\u0432\u0430\u043b\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043f\u0443\u0442\u0438 \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438.\n\n\u041e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e \u0432\u043a\u043b\u044e\u0447\u0430\u043b\u0438 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438 ( CVE-2023-34362 ), \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439 \u0434\u0435\u043d\u044c \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f. \u0417\u0430\u0442\u0435\u043c \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b\u0438 \u0435\u0449\u0435 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 9 \u0438 15 \u0438\u044e\u043d\u044f ( CVE-2023-35036 \u0438 CVE-2023-35708 ). \u0412 \u043d\u0430\u0447\u0430\u043b\u0435 \u0438\u044e\u043b\u044f \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0435\u0449\u0435 \u0442\u0440\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 ( CVE-2023-36934 , CVE-2023-36932 , \u0438 CVE-2023-36933 ).\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Bitsight, \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043f\u043e\u0441\u0442\u0430\u0432\u043e\u043a \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u0432\u0441\u0435 \u0431\u043e\u043b\u0435\u0435 \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438\u0437-\u0437\u0430 \u0438\u0445 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u0430. \u041e\u0434\u043d\u0430\u043a\u043e \u0442\u0430\u043a\u043e\u0439 \u043f\u043e\u0434\u0445\u043e\u0434 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442 \u043e\u0434\u043d\u043e\u0440\u0430\u0437\u043e\u0432\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u0430\u0436\u0434\u043e\u0439 \u0430\u0442\u0430\u043a\u0438, \u043f\u043e\u0441\u043b\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0438\u0441\u043a\u0430\u0442\u044c \u043d\u043e\u0432\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-07-23T12:50:28.000000Z"}</description>
      <content:encoded>{"uuid": "760ce923-6296-42c7-8e53-bd9229fd0720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://t.me/itsec_news/2919", "content": "\u200b\u26a1\ufe0f\u041f\u0430\u0434\u0435\u043d\u0438\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u043a\u0440\u0435\u043f\u043e\u0441\u0442\u0435\u0439: \u0438\u0441\u0442\u043e\u0440\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 MOVEit, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0442\u0440\u044f\u0441\u043b\u0430 \u043c\u0438\u0440.\n\n\ud83d\udcac \u0425\u0430\u043a\u0435\u0440\u0441\u043a\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 MOVEit Transfer \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u043d\u0430\u043d\u043e\u0441\u0438\u0442\u044c \u0443\u0449\u0435\u0440\u0431, \u0447\u0438\u0441\u043b\u043e \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u043f\u0440\u0438\u0431\u043b\u0438\u0436\u0430\u0435\u0442\u0441\u044f \u043a 400. \u0413\u0440\u0443\u043f\u043f\u0430 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 Clop \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Progress Software \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0442\u0435\u0439. \u0421\u0440\u0435\u0434\u0438 \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u0432\u0448\u0438\u0445 \u2013 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u0438 \u0438 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u0421\u0428\u0410, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0414\u0435\u043f\u0430\u0440\u0442\u0430\u043c\u0435\u043d\u0442 \u044d\u043d\u0435\u0440\u0433\u0435\u0442\u0438\u043a\u0438 \u0421\u0428\u0410 , Shell , Deutsche Bank \u0438 PwC .\n\n\u041f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 19 \u0438\u044e\u043b\u044f, \u0431\u044b\u043b\u043e \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043e 383 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0431\u043e\u043b\u0435\u0435 20 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u0447\u0435\u043b\u043e\u0432\u0435\u043a. \u0418\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0441 MOVEit \u0441\u0440\u0430\u0432\u043d\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0441 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c \u0441\u043b\u0443\u0447\u0430\u0435\u043c \u0432\u0437\u043b\u043e\u043c\u0430 SolarWinds , \u0445\u043e\u0442\u044f \u0438 \u043d\u0435 \u0442\u0430\u043a\u0438\u043c \u0440\u0430\u0437\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c. \u041e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0443\u0431\u044b\u0442\u043a\u0438 \u0431\u0443\u0434\u0443\u0442 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u043a\u0440\u0435\u0434\u0438\u0442\u043e\u0432 \u0434\u043b\u044f \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u043b\u044e\u0434\u0435\u0439 \u0438 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0441\u0443\u0434\u0435\u0431\u043d\u044b\u0445 \u0438\u0441\u043a\u043e\u0432.\n\n\u0411\u0440\u0438\u0442\u0430\u043d\u0441\u043a\u0438\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0440\u0430\u0441\u0447\u0451\u0442\u0430 \u0437\u0430\u0440\u0430\u0431\u043e\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u044b \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u043e\u043c Zellis \u043e\u0434\u0438\u043d \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u043f\u0435\u0440\u0432\u044b\u0445 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b , \u0447\u0442\u043e \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0441\u044f \u0443\u0442\u0435\u0447\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0432\u043b\u0438\u044f\u043b\u0430 \u043d\u0430 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0435\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 BBC , British Airways \u0438 \u0430\u043f\u0442\u0435\u0447\u043d\u0443\u044e \u0441\u0435\u0442\u044c Boots .\n\n\u0421\u0442\u043e\u0438\u0442 \u043d\u0430\u043f\u043e\u043c\u043d\u0438\u0442\u044c, \u0447\u0442\u043e \u0432\u0437\u043b\u043e\u043c MFT-\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b MOVEit Transfer \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0451\u043b 27 \u043c\u0430\u044f \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f CVE-2023-34362 . \u0417\u0430 \u0432\u0440\u0435\u043c\u044f \u043d\u0430\u0445\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 MOVEit \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u043f\u043e\u0445\u0438\u0442\u0438\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0441\u043e\u0442\u0435\u043d \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439. \u0418 \u0434\u0430\u043b\u0435\u043a\u043e \u043d\u0435 \u0432\u0441\u0435 \u0438\u0437 \u043d\u0438\u0445 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e\u0431 \u0443\u0442\u0435\u0447\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b, \u043d\u0430\u043f\u0430\u0434\u0435\u043d\u0438\u0435 \u043d\u0430 \u0441\u0435\u0440\u0432\u0438\u0441 MOVEit Transfer \u0433\u043e\u0442\u043e\u0432\u0438\u043b\u043e\u0441\u044c \u0435\u0449\u0451 \u0432 2021 \u0433\u043e\u0434\u0443, \u043a\u043e\u0433\u0434\u0430 \u0445\u0430\u043a\u0435\u0440\u044b \u043f\u0440\u043e\u0449\u0443\u043f\u044b\u0432\u0430\u043b\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043f\u0443\u0442\u0438 \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438.\n\n\u041e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e \u0432\u043a\u043b\u044e\u0447\u0430\u043b\u0438 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438 ( CVE-2023-34362 ), \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439 \u0434\u0435\u043d\u044c \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f. \u0417\u0430\u0442\u0435\u043c \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b\u0438 \u0435\u0449\u0435 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 9 \u0438 15 \u0438\u044e\u043d\u044f ( CVE-2023-35036 \u0438 CVE-2023-35708 ). \u0412 \u043d\u0430\u0447\u0430\u043b\u0435 \u0438\u044e\u043b\u044f \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0435\u0449\u0435 \u0442\u0440\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 ( CVE-2023-36934 , CVE-2023-36932 , \u0438 CVE-2023-36933 ).\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Bitsight, \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043f\u043e\u0441\u0442\u0430\u0432\u043e\u043a \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u0432\u0441\u0435 \u0431\u043e\u043b\u0435\u0435 \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438\u0437-\u0437\u0430 \u0438\u0445 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u0430. \u041e\u0434\u043d\u0430\u043a\u043e \u0442\u0430\u043a\u043e\u0439 \u043f\u043e\u0434\u0445\u043e\u0434 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442 \u043e\u0434\u043d\u043e\u0440\u0430\u0437\u043e\u0432\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u0430\u0436\u0434\u043e\u0439 \u0430\u0442\u0430\u043a\u0438, \u043f\u043e\u0441\u043b\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0438\u0441\u043a\u0430\u0442\u044c \u043d\u043e\u0432\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-07-23T12:50:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/760ce923-6296-42c7-8e53-bd9229fd0720/export</guid>
      <pubDate>Sun, 23 Jul 2023 12:50:28 +0000</pubDate>
    </item>
    <item>
      <title>35b95149-ab1a-4dfc-8140-c527cc2ae62b</title>
      <link>https://vulnerability.circl.lu/sighting/35b95149-ab1a-4dfc-8140-c527cc2ae62b/export</link>
      <description>{"uuid": "35b95149-ab1a-4dfc-8140-c527cc2ae62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35702", "type": "seen", "source": "https://t.me/ctinow/169000", "content": "https://ift.tt/uacwhoP\nCVE-2023-35702 Exploit", "creation_timestamp": "2024-01-16T21:16:30.000000Z"}</description>
      <content:encoded>{"uuid": "35b95149-ab1a-4dfc-8140-c527cc2ae62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35702", "type": "seen", "source": "https://t.me/ctinow/169000", "content": "https://ift.tt/uacwhoP\nCVE-2023-35702 Exploit", "creation_timestamp": "2024-01-16T21:16:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/35b95149-ab1a-4dfc-8140-c527cc2ae62b/export</guid>
      <pubDate>Tue, 16 Jan 2024 21:16:30 +0000</pubDate>
    </item>
    <item>
      <title>71c57a6a-0842-4c6d-8990-2df8d3f84543</title>
      <link>https://vulnerability.circl.lu/sighting/71c57a6a-0842-4c6d-8990-2df8d3f84543/export</link>
      <description>{"uuid": "71c57a6a-0842-4c6d-8990-2df8d3f84543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35704", "type": "seen", "source": "https://t.me/ctinow/169004", "content": "https://ift.tt/R6rWvzY\nCVE-2023-35704 Exploit", "creation_timestamp": "2024-01-16T21:16:41.000000Z"}</description>
      <content:encoded>{"uuid": "71c57a6a-0842-4c6d-8990-2df8d3f84543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35704", "type": "seen", "source": "https://t.me/ctinow/169004", "content": "https://ift.tt/R6rWvzY\nCVE-2023-35704 Exploit", "creation_timestamp": "2024-01-16T21:16:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/71c57a6a-0842-4c6d-8990-2df8d3f84543/export</guid>
      <pubDate>Tue, 16 Jan 2024 21:16:41 +0000</pubDate>
    </item>
    <item>
      <title>7f1dc6e9-ecbf-4038-ba4c-957c49f72164</title>
      <link>https://vulnerability.circl.lu/sighting/7f1dc6e9-ecbf-4038-ba4c-957c49f72164/export</link>
      <description>{"uuid": "7f1dc6e9-ecbf-4038-ba4c-957c49f72164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35703", "type": "seen", "source": "https://t.me/ctinow/169005", "content": "https://ift.tt/RhwGfBL\nCVE-2023-35703 Exploit", "creation_timestamp": "2024-01-16T21:16:44.000000Z"}</description>
      <content:encoded>{"uuid": "7f1dc6e9-ecbf-4038-ba4c-957c49f72164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35703", "type": "seen", "source": "https://t.me/ctinow/169005", "content": "https://ift.tt/RhwGfBL\nCVE-2023-35703 Exploit", "creation_timestamp": "2024-01-16T21:16:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7f1dc6e9-ecbf-4038-ba4c-957c49f72164/export</guid>
      <pubDate>Tue, 16 Jan 2024 21:16:44 +0000</pubDate>
    </item>
    <item>
      <title>2a53f171-0edd-465e-bf45-14d2114bd531</title>
      <link>https://vulnerability.circl.lu/sighting/2a53f171-0edd-465e-bf45-14d2114bd531/export</link>
      <description>{"uuid": "2a53f171-0edd-465e-bf45-14d2114bd531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/1dca9c72-3904-4b4f-b553-ba8d0b505998", "content": "", "creation_timestamp": "2024-11-12T17:22:11.893255Z"}</description>
      <content:encoded>{"uuid": "2a53f171-0edd-465e-bf45-14d2114bd531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/1dca9c72-3904-4b4f-b553-ba8d0b505998", "content": "", "creation_timestamp": "2024-11-12T17:22:11.893255Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2a53f171-0edd-465e-bf45-14d2114bd531/export</guid>
      <pubDate>Tue, 12 Nov 2024 17:22:11 +0000</pubDate>
    </item>
    <item>
      <title>e3ea3a0d-1aab-48ed-8c81-fa4e779f2ecc</title>
      <link>https://vulnerability.circl.lu/sighting/e3ea3a0d-1aab-48ed-8c81-fa4e779f2ecc/export</link>
      <description>{"uuid": "e3ea3a0d-1aab-48ed-8c81-fa4e779f2ecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-35708", "type": "exploited", "source": "", "content": "", "creation_timestamp": "2024-11-12T17:23:09.068084Z"}</description>
      <content:encoded>{"uuid": "e3ea3a0d-1aab-48ed-8c81-fa4e779f2ecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2023-35708", "type": "exploited", "source": "", "content": "", "creation_timestamp": "2024-11-12T17:23:09.068084Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e3ea3a0d-1aab-48ed-8c81-fa4e779f2ecc/export</guid>
      <pubDate>Tue, 12 Nov 2024 17:23:09 +0000</pubDate>
    </item>
    <item>
      <title>b17c51ee-0ed6-42f1-846d-a8d690816d2a</title>
      <link>https://vulnerability.circl.lu/sighting/b17c51ee-0ed6-42f1-846d-a8d690816d2a/export</link>
      <description>{"uuid": "b17c51ee-0ed6-42f1-846d-a8d690816d2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2023-35708", "type": "exploited", "source": "", "content": "", "creation_timestamp": "2024-11-13T09:31:52.226161Z"}</description>
      <content:encoded>{"uuid": "b17c51ee-0ed6-42f1-846d-a8d690816d2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2023-35708", "type": "exploited", "source": "", "content": "", "creation_timestamp": "2024-11-13T09:31:52.226161Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b17c51ee-0ed6-42f1-846d-a8d690816d2a/export</guid>
      <pubDate>Wed, 13 Nov 2024 09:31:52 +0000</pubDate>
    </item>
    <item>
      <title>bff25a42-bed0-4527-8035-92912867c1fb</title>
      <link>https://vulnerability.circl.lu/sighting/bff25a42-bed0-4527-8035-92912867c1fb/export</link>
      <description>{"uuid": "bff25a42-bed0-4527-8035-92912867c1fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35703", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18673", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35703\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint64 function.\n\ud83d\udccf Published: 2024-01-08T14:48:01.249Z\n\ud83d\udccf Modified: 2025-06-17T20:29:16.400Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783\n2. https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html", "creation_timestamp": "2025-06-17T20:40:06.000000Z"}</description>
      <content:encoded>{"uuid": "bff25a42-bed0-4527-8035-92912867c1fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35703", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18673", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35703\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint64 function.\n\ud83d\udccf Published: 2024-01-08T14:48:01.249Z\n\ud83d\udccf Modified: 2025-06-17T20:29:16.400Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783\n2. https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html", "creation_timestamp": "2025-06-17T20:40:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bff25a42-bed0-4527-8035-92912867c1fb/export</guid>
      <pubDate>Tue, 17 Jun 2025 20:40:06 +0000</pubDate>
    </item>
    <item>
      <title>1366401d-4684-4ebe-9301-d1a5c22b385d</title>
      <link>https://vulnerability.circl.lu/sighting/1366401d-4684-4ebe-9301-d1a5c22b385d/export</link>
      <description>{"uuid": "1366401d-4684-4ebe-9301-d1a5c22b385d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3me5bzf7xr724", "content": "", "creation_timestamp": "2026-02-05T21:02:50.927398Z"}</description>
      <content:encoded>{"uuid": "1366401d-4684-4ebe-9301-d1a5c22b385d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35708", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3me5bzf7xr724", "content": "", "creation_timestamp": "2026-02-05T21:02:50.927398Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1366401d-4684-4ebe-9301-d1a5c22b385d/export</guid>
      <pubDate>Thu, 05 Feb 2026 21:02:50 +0000</pubDate>
    </item>
  </channel>
</rss>
