<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 18:51:33 +0000</lastBuildDate>
    <item>
      <title>ad6904d6-ac3e-4b3a-8717-509e241f18ca</title>
      <link>https://vulnerability.circl.lu/sighting/ad6904d6-ac3e-4b3a-8717-509e241f18ca/export</link>
      <description>{"uuid": "ad6904d6-ac3e-4b3a-8717-509e241f18ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48265", "type": "seen", "source": "https://t.me/ctinow/174904", "content": "https://ift.tt/C2EXdpv\nCVE-2023-48265 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T11:26:43.000000Z"}</description>
      <content:encoded>{"uuid": "ad6904d6-ac3e-4b3a-8717-509e241f18ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48265", "type": "seen", "source": "https://t.me/ctinow/174904", "content": "https://ift.tt/C2EXdpv\nCVE-2023-48265 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T11:26:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ad6904d6-ac3e-4b3a-8717-509e241f18ca/export</guid>
      <pubDate>Sun, 28 Jan 2024 11:26:43 +0000</pubDate>
    </item>
    <item>
      <title>8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3</title>
      <link>https://vulnerability.circl.lu/sighting/8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3/export</link>
      <description>{"uuid": "8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48266", "type": "seen", "source": "https://t.me/ctinow/174905", "content": "https://ift.tt/2j5nAm8\nCVE-2023-48266 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T11:26:44.000000Z"}</description>
      <content:encoded>{"uuid": "8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48266", "type": "seen", "source": "https://t.me/ctinow/174905", "content": "https://ift.tt/2j5nAm8\nCVE-2023-48266 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 Network Request stack-based overflow", "creation_timestamp": "2024-01-28T11:26:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8a10a1fb-7d6f-4ba3-9ff3-f9d2f932eea3/export</guid>
      <pubDate>Sun, 28 Jan 2024 11:26:44 +0000</pubDate>
    </item>
    <item>
      <title>91a8999c-3824-415f-b6cc-b5319d9ced22</title>
      <link>https://vulnerability.circl.lu/sighting/91a8999c-3824-415f-b6cc-b5319d9ced22/export</link>
      <description>{"uuid": "91a8999c-3824-415f-b6cc-b5319d9ced22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48260", "type": "seen", "source": "https://t.me/ctinow/174925", "content": "https://ift.tt/CXOrc2h\nCVE-2023-48260 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 HTTP Request sql injection", "creation_timestamp": "2024-01-28T12:56:27.000000Z"}</description>
      <content:encoded>{"uuid": "91a8999c-3824-415f-b6cc-b5319d9ced22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48260", "type": "seen", "source": "https://t.me/ctinow/174925", "content": "https://ift.tt/CXOrc2h\nCVE-2023-48260 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 HTTP Request sql injection", "creation_timestamp": "2024-01-28T12:56:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/91a8999c-3824-415f-b6cc-b5319d9ced22/export</guid>
      <pubDate>Sun, 28 Jan 2024 12:56:27 +0000</pubDate>
    </item>
    <item>
      <title>feaa14a4-10b7-41b1-9abd-e8285c745c08</title>
      <link>https://vulnerability.circl.lu/sighting/feaa14a4-10b7-41b1-9abd-e8285c745c08/export</link>
      <description>{"uuid": "feaa14a4-10b7-41b1-9abd-e8285c745c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48261", "type": "seen", "source": "https://t.me/ctinow/174926", "content": "https://ift.tt/k52VF4A\nCVE-2023-48261 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 HTTP Request sql injection", "creation_timestamp": "2024-01-28T12:56:28.000000Z"}</description>
      <content:encoded>{"uuid": "feaa14a4-10b7-41b1-9abd-e8285c745c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48261", "type": "seen", "source": "https://t.me/ctinow/174926", "content": "https://ift.tt/k52VF4A\nCVE-2023-48261 | Rexroth Nexo Cordless Nutrunner up to V1500-SP2 HTTP Request sql injection", "creation_timestamp": "2024-01-28T12:56:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/feaa14a4-10b7-41b1-9abd-e8285c745c08/export</guid>
      <pubDate>Sun, 28 Jan 2024 12:56:28 +0000</pubDate>
    </item>
    <item>
      <title>a9118e30-800f-4150-adb0-ac1956d453bf</title>
      <link>https://vulnerability.circl.lu/sighting/a9118e30-800f-4150-adb0-ac1956d453bf/export</link>
      <description>{"uuid": "a9118e30-800f-4150-adb0-ac1956d453bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4826", "type": "seen", "source": "https://t.me/ctinow/191651", "content": "https://ift.tt/0NGjbCV\nCVE-2023-4826", "creation_timestamp": "2024-02-23T11:26:23.000000Z"}</description>
      <content:encoded>{"uuid": "a9118e30-800f-4150-adb0-ac1956d453bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4826", "type": "seen", "source": "https://t.me/ctinow/191651", "content": "https://ift.tt/0NGjbCV\nCVE-2023-4826", "creation_timestamp": "2024-02-23T11:26:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a9118e30-800f-4150-adb0-ac1956d453bf/export</guid>
      <pubDate>Fri, 23 Feb 2024 11:26:23 +0000</pubDate>
    </item>
    <item>
      <title>1530041f-310e-448f-99a7-73627e62874f</title>
      <link>https://vulnerability.circl.lu/sighting/1530041f-310e-448f-99a7-73627e62874f/export</link>
      <description>{"uuid": "1530041f-310e-448f-99a7-73627e62874f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4826", "type": "seen", "source": "https://t.me/ctinow/191654", "content": "https://ift.tt/0NGjbCV\nCVE-2023-4826", "creation_timestamp": "2024-02-23T11:26:26.000000Z"}</description>
      <content:encoded>{"uuid": "1530041f-310e-448f-99a7-73627e62874f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4826", "type": "seen", "source": "https://t.me/ctinow/191654", "content": "https://ift.tt/0NGjbCV\nCVE-2023-4826", "creation_timestamp": "2024-02-23T11:26:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1530041f-310e-448f-99a7-73627e62874f/export</guid>
      <pubDate>Fri, 23 Feb 2024 11:26:26 +0000</pubDate>
    </item>
    <item>
      <title>4ad41397-b14d-4811-8479-2cdfac41cbee</title>
      <link>https://vulnerability.circl.lu/sighting/4ad41397-b14d-4811-8479-2cdfac41cbee/export</link>
      <description>{"uuid": "4ad41397-b14d-4811-8479-2cdfac41cbee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993094686929174", "content": "", "creation_timestamp": "2025-02-12T21:43:06.935104Z"}</description>
      <content:encoded>{"uuid": "4ad41397-b14d-4811-8479-2cdfac41cbee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993094686929174", "content": "", "creation_timestamp": "2025-02-12T21:43:06.935104Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4ad41397-b14d-4811-8479-2cdfac41cbee/export</guid>
      <pubDate>Wed, 12 Feb 2025 21:43:06 +0000</pubDate>
    </item>
    <item>
      <title>a449a3c1-b56e-4b5c-bb28-2632326367e8</title>
      <link>https://vulnerability.circl.lu/sighting/a449a3c1-b56e-4b5c-bb28-2632326367e8/export</link>
      <description>{"uuid": "a449a3c1-b56e-4b5c-bb28-2632326367e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz774ush72i", "content": "", "creation_timestamp": "2025-02-12T22:16:15.622922Z"}</description>
      <content:encoded>{"uuid": "a449a3c1-b56e-4b5c-bb28-2632326367e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz774ush72i", "content": "", "creation_timestamp": "2025-02-12T22:16:15.622922Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a449a3c1-b56e-4b5c-bb28-2632326367e8/export</guid>
      <pubDate>Wed, 12 Feb 2025 22:16:15 +0000</pubDate>
    </item>
    <item>
      <title>bbbeefd0-479f-4eba-be2c-3b82643a1d15</title>
      <link>https://vulnerability.circl.lu/sighting/bbbeefd0-479f-4eba-be2c-3b82643a1d15/export</link>
      <description>{"uuid": "bbbeefd0-479f-4eba-be2c-3b82643a1d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48267\n\ud83d\udd25 CVSS Score: 8.6 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-02-12T21:20:14.271Z\n\ud83d\udccf Modified: 2025-02-19T04:55:14.788Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", "creation_timestamp": "2025-02-19T08:39:13.000000Z"}</description>
      <content:encoded>{"uuid": "bbbeefd0-479f-4eba-be2c-3b82643a1d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48267", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4775", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48267\n\ud83d\udd25 CVSS Score: 8.6 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-02-12T21:20:14.271Z\n\ud83d\udccf Modified: 2025-02-19T04:55:14.788Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", "creation_timestamp": "2025-02-19T08:39:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bbbeefd0-479f-4eba-be2c-3b82643a1d15/export</guid>
      <pubDate>Wed, 19 Feb 2025 08:39:13 +0000</pubDate>
    </item>
    <item>
      <title>6a236e38-fe2f-4502-ab25-83353f7d3f36</title>
      <link>https://vulnerability.circl.lu/sighting/6a236e38-fe2f-4502-ab25-83353f7d3f36/export</link>
      <description>{"uuid": "6a236e38-fe2f-4502-ab25-83353f7d3f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48264", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48264\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.\n\ud83d\udccf Published: 2024-01-10T13:09:10.347Z\n\ud83d\udccf Modified: 2025-04-17T15:48:37.330Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html", "creation_timestamp": "2025-04-17T15:57:53.000000Z"}</description>
      <content:encoded>{"uuid": "6a236e38-fe2f-4502-ab25-83353f7d3f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48264", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-48264\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.\n\ud83d\udccf Published: 2024-01-10T13:09:10.347Z\n\ud83d\udccf Modified: 2025-04-17T15:48:37.330Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html", "creation_timestamp": "2025-04-17T15:57:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6a236e38-fe2f-4502-ab25-83353f7d3f36/export</guid>
      <pubDate>Thu, 17 Apr 2025 15:57:53 +0000</pubDate>
    </item>
  </channel>
</rss>
