<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T05:39:12.952364+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1b294a30-0f94-49b7-880e-0c993dcce184/export</id>
    <title>1b294a30-0f94-49b7-880e-0c993dcce184</title>
    <updated>2026-05-06T05:39:13.326945+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1b294a30-0f94-49b7-880e-0c993dcce184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28733", "type": "seen", "source": "https://t.me/cibsecurity/61167", "content": "\u203c CVE-2023-28733 \u203c\n\nAnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-30T16:26:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1b294a30-0f94-49b7-880e-0c993dcce184/export"/>
    <published>2023-03-30T16:26:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b0b11da6-e10e-495b-b545-b28f4e33c5bf/export</id>
    <title>b0b11da6-e10e-495b-b545-b28f4e33c5bf</title>
    <updated>2026-05-06T05:39:13.326854+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b0b11da6-e10e-495b-b545-b28f4e33c5bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28731", "type": "seen", "source": "https://t.me/cibsecurity/61168", "content": "\u203c CVE-2023-28731 \u203c\n\nAnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-30T16:26:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b0b11da6-e10e-495b-b545-b28f4e33c5bf/export"/>
    <published>2023-03-30T16:26:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9df8ea53-4e33-413b-bf27-17c4be827e24/export</id>
    <title>9df8ea53-4e33-413b-bf27-17c4be827e24</title>
    <updated>2026-05-06T05:39:13.326769+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9df8ea53-4e33-413b-bf27-17c4be827e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2873", "type": "seen", "source": "https://t.me/cibsecurity/64711", "content": "\u203c CVE-2023-2873 \u203c\n\nA vulnerability classified as critical was found in Twister Antivirus 8. This vulnerability affects the function 0x804f2143/0x804f217f/0x804f214b/0x80800043 in the library filppd.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T22:27:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9df8ea53-4e33-413b-bf27-17c4be827e24/export"/>
    <published>2023-05-24T22:27:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/237cb2df-1be7-4916-96cc-f2fb66425192/export</id>
    <title>237cb2df-1be7-4916-96cc-f2fb66425192</title>
    <updated>2026-05-06T05:39:13.326667+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "237cb2df-1be7-4916-96cc-f2fb66425192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28730", "type": "seen", "source": "https://t.me/cibsecurity/67084", "content": "\u203c CVE-2023-28730 \u203c\n\nA memory corruption vulnerability Panasonic Control FPWIN Pro versions 7.6.0.3 and all previous versions may allow arbitrary code execution when opening specially crafted project files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-21T12:33:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/237cb2df-1be7-4916-96cc-f2fb66425192/export"/>
    <published>2023-07-21T12:33:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2ddb0f49-60a7-4034-a547-0a9ad9ad6864/export</id>
    <title>2ddb0f49-60a7-4034-a547-0a9ad9ad6864</title>
    <updated>2026-05-06T05:39:13.326580+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2ddb0f49-60a7-4034-a547-0a9ad9ad6864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28736", "type": "seen", "source": "https://t.me/cibsecurity/68279", "content": "\u203c CVE-2023-28736 \u203c\n\nBuffer overflow in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:26:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2ddb0f49-60a7-4034-a547-0a9ad9ad6864/export"/>
    <published>2023-08-11T07:26:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2b4a9887-e473-4862-a48a-46603d4c46d3/export</id>
    <title>2b4a9887-e473-4862-a48a-46603d4c46d3</title>
    <updated>2026-05-06T05:39:13.326495+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2b4a9887-e473-4862-a48a-46603d4c46d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28738", "type": "seen", "source": "https://t.me/ctinow/170405", "content": "https://ift.tt/lDTb8aE\nCVE-2023-28738", "creation_timestamp": "2024-01-19T21:27:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2b4a9887-e473-4862-a48a-46603d4c46d3/export"/>
    <published>2024-01-19T21:27:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/70504aa3-8e94-4a63-8b60-839b094a142d/export</id>
    <title>70504aa3-8e94-4a63-8b60-839b094a142d</title>
    <updated>2026-05-06T05:39:13.326381+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "70504aa3-8e94-4a63-8b60-839b094a142d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28738", "type": "seen", "source": "https://t.me/ctinow/185706", "content": "https://ift.tt/PKIOzeU\nCVE-2023-28738 | Intel NUC BIOS prior JY0070 input validation (intel-sa-01009)", "creation_timestamp": "2024-02-15T17:26:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/70504aa3-8e94-4a63-8b60-839b094a142d/export"/>
    <published>2024-02-15T17:26:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ab2c051-7316-4cd8-8cce-03e7bc4619c4/export</id>
    <title>4ab2c051-7316-4cd8-8cce-03e7bc4619c4</title>
    <updated>2026-05-06T05:39:13.324273+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ab2c051-7316-4cd8-8cce-03e7bc4619c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28739", "type": "seen", "source": "https://t.me/ctinow/201222", "content": "https://ift.tt/n4mghvP\nCVE-2023-28739 | Intel Chipset Driver Software prior 10.1.19444.8378 default permission (intel-sa-00928)", "creation_timestamp": "2024-03-06T11:41:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ab2c051-7316-4cd8-8cce-03e7bc4619c4/export"/>
    <published>2024-03-06T11:41:15+00:00</published>
  </entry>
</feed>
