{"vulnerability": "CVE-2023-2874", "sightings": [{"uuid": "b2511e4a-4d84-46cf-a44c-c3847e4944cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://gist.github.com/alanc/ae834f8047eb234c68cf9b4db4a96958", "content": "", "creation_timestamp": "2025-08-19T21:03:01.000000Z"}, {"uuid": "2bce2f7c-8690-46be-b9fc-0adf123e717e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13584", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28746\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\ud83d\udccf Published: 2024-03-14T16:45:50.370Z\n\ud83d\udccf Modified: 2025-04-26T20:03:13.216Z\n\ud83d\udd17 References:\n1. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html\n2. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/\n3. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/\n4. https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/\n5. http://www.openwall.com/lists/oss-security/2024/03/12/13\n6. https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html\n7. https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "creation_timestamp": "2025-04-26T20:08:34.000000Z"}, {"uuid": "197200da-1663-49cd-9c3d-8b3b1116f2b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28748", "type": "seen", "source": "https://t.me/cibsecurity/73579", "content": "\u203c CVE-2023-28748 \u203c\n\nImproper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in biztechc Copy or Move Comments allows SQL Injection.This issue affects Copy or Move Comments: from n/a through 5.0.4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-06T12:25:42.000000Z"}, {"uuid": "54e5459f-9c66-417f-a5be-5ec119d28fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/arpsyndicate/4260", "content": "#ExploitObserverAlert\n\nCVE-2023-28746\n\nDESCRIPTION: Exploit Observer has 67 entries in 7 file formats related to CVE-2023-28746. Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-03-16T21:27:43.000000Z"}, {"uuid": "d58e0173-4227-4c42-8ec0-10ff8c80e9d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28744", "type": "seen", "source": "https://t.me/arpsyndicate/2439", "content": "#ExploitObserverAlert\n\nCVE-2023-28744\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-28744. A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.1.1.15289. A specially crafted PDF document can trigger the reuse of previously freed memory by manipulating form fields of a specific type. This can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.\n\nFIRST-EPSS: 0.002380000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-04T05:57:58.000000Z"}, {"uuid": "0a0c27ad-e320-4fff-b8c4-cbc432d741bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208004", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:22:38.000000Z"}, {"uuid": "8e1b0fa1-346d-42ee-900a-ccdbdf998062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28746", "type": "seen", "source": "https://t.me/ctinow/208021", "content": "https://ift.tt/8bMS9T1\nCVE-2023-28746", "creation_timestamp": "2024-03-14T18:26:53.000000Z"}, {"uuid": "2082e577-bc89-4c6a-bc83-8dde6d6086d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28745", "type": "seen", "source": "https://t.me/ctinow/201255", "content": "https://ift.tt/wIazXCK\nCVE-2023-28745 | Intel QSFP+ Configuration Utility Software uncontrolled search path (intel-sa-00974)", "creation_timestamp": "2024-03-06T12:11:32.000000Z"}, {"uuid": "5a693c53-b74a-48f0-aa2b-fd349d26c61e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28743", "type": "seen", "source": "https://t.me/ctinow/185721", "content": "https://ift.tt/1sxfzTC\nCVE-2023-28743 | Intel NUC BIOS prior QN0073 input validation (intel-sa-01009)", "creation_timestamp": "2024-02-15T17:51:37.000000Z"}, {"uuid": "e378a548-a2b6-45ec-9ae1-30c9c1c608f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28743", "type": "seen", "source": "https://t.me/ctinow/170406", "content": "https://ift.tt/kbfWzlc\nCVE-2023-28743", "creation_timestamp": "2024-01-19T21:27:15.000000Z"}, {"uuid": "93e3c322-559b-433c-b037-a350497173f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28744", "type": "seen", "source": "https://t.me/cibsecurity/67010", "content": "\u203c CVE-2023-28744 \u203c\n\nA use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.1.1.15289. A specially crafted PDF document can trigger the reuse of previously freed memory by manipulating form fields of a specific type. This can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-19T18:21:55.000000Z"}, {"uuid": "a412f552-54ab-4ba2-b914-abfae067153b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2874", "type": "seen", "source": "https://t.me/cibsecurity/64709", "content": "\u203c CVE-2023-2874 \u203c\n\nA vulnerability, which was classified as problematic, has been found in Twister Antivirus 8. This issue affects the function 0x804f2158/0x804f2154/0x804f2150/0x804f215c/0x804f2160/0x80800040/0x804f214c/0x804f2148/0x804f2144/0x801120e4/0x804f213c/0x804f2140 in the library filppd.sys of the component IoControlCode Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-229853 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T22:27:14.000000Z"}]}