<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T07:12:57.936071+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f9dcf230-2865-4a80-bf70-bc22e6e54aeb/export</id>
    <title>f9dcf230-2865-4a80-bf70-bc22e6e54aeb</title>
    <updated>2026-05-07T07:12:58.279885+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f9dcf230-2865-4a80-bf70-bc22e6e54aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35991", "type": "seen", "source": "https://t.me/cibsecurity/68821", "content": "\u203c CVE-2023-35991 \u203c\n\nHidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-18T14:38:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f9dcf230-2865-4a80-bf70-bc22e6e54aeb/export"/>
    <published>2023-08-18T14:38:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/62d6bb4c-6eb7-4b76-bcae-5856b52bfb8a/export</id>
    <title>62d6bb4c-6eb7-4b76-bcae-5856b52bfb8a</title>
    <updated>2026-05-07T07:12:58.279779+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "62d6bb4c-6eb7-4b76-bcae-5856b52bfb8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35990", "type": "seen", "source": "https://t.me/cibsecurity/71055", "content": "\u203c CVE-2023-35990 \u203c\n\nThe issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T18:35:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/62d6bb4c-6eb7-4b76-bcae-5856b52bfb8a/export"/>
    <published>2023-09-27T18:35:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c48741aa-d04a-4d28-ad0a-c4ea9c16748e/export</id>
    <title>c48741aa-d04a-4d28-ad0a-c4ea9c16748e</title>
    <updated>2026-05-07T07:12:58.279693+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c48741aa-d04a-4d28-ad0a-c4ea9c16748e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35992", "type": "seen", "source": "https://t.me/ctinow/165609", "content": "https://ift.tt/aVzb6tY\nCVE-2023-35992 Exploit", "creation_timestamp": "2024-01-10T08:16:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c48741aa-d04a-4d28-ad0a-c4ea9c16748e/export"/>
    <published>2024-01-10T08:16:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b613730f-5eb1-4090-9a60-fd723fbafbfe/export</id>
    <title>b613730f-5eb1-4090-9a60-fd723fbafbfe</title>
    <updated>2026-05-07T07:12:58.279589+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b613730f-5eb1-4090-9a60-fd723fbafbfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35996", "type": "seen", "source": "https://t.me/ctinow/168995", "content": "https://ift.tt/1Sfzcx8\nCVE-2023-35996 Exploit", "creation_timestamp": "2024-01-16T21:16:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b613730f-5eb1-4090-9a60-fd723fbafbfe/export"/>
    <published>2024-01-16T21:16:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e1fcb73f-4a8e-4e04-9f7d-9cd2f6faf1bf/export</id>
    <title>e1fcb73f-4a8e-4e04-9f7d-9cd2f6faf1bf</title>
    <updated>2026-05-07T07:12:58.279485+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e1fcb73f-4a8e-4e04-9f7d-9cd2f6faf1bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35995", "type": "seen", "source": "https://t.me/ctinow/168996", "content": "https://ift.tt/m5nD2y4\nCVE-2023-35995 Exploit", "creation_timestamp": "2024-01-16T21:16:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e1fcb73f-4a8e-4e04-9f7d-9cd2f6faf1bf/export"/>
    <published>2024-01-16T21:16:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ab436169-7d9c-4d2d-b874-1bd267e7444a/export</id>
    <title>ab436169-7d9c-4d2d-b874-1bd267e7444a</title>
    <updated>2026-05-07T07:12:58.279397+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ab436169-7d9c-4d2d-b874-1bd267e7444a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35997", "type": "seen", "source": "https://t.me/ctinow/168999", "content": "https://ift.tt/4LDs1pM\nCVE-2023-35997 Exploit", "creation_timestamp": "2024-01-16T21:16:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ab436169-7d9c-4d2d-b874-1bd267e7444a/export"/>
    <published>2024-01-16T21:16:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/91232483-d347-47bd-ae9a-10794728ae42/export</id>
    <title>91232483-d347-47bd-ae9a-10794728ae42</title>
    <updated>2026-05-07T07:12:58.279301+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "91232483-d347-47bd-ae9a-10794728ae42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35994", "type": "seen", "source": "https://t.me/ctinow/169001", "content": "https://ift.tt/kTqIQVG\nCVE-2023-35994 Exploit", "creation_timestamp": "2024-01-16T21:16:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/91232483-d347-47bd-ae9a-10794728ae42/export"/>
    <published>2024-01-16T21:16:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/94b2dcc8-a167-4c25-a30b-6aa047b12b8a/export</id>
    <title>94b2dcc8-a167-4c25-a30b-6aa047b12b8a</title>
    <updated>2026-05-07T07:12:58.279190+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "94b2dcc8-a167-4c25-a30b-6aa047b12b8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35992", "type": "seen", "source": "https://t.me/ctinow/173424", "content": "https://ift.tt/9ARHxTB\nCVE-2023-35992 | GTKWave 3.3.115 fstReaderIterBlocks2 integer overflow (TALOS-2023-1790)", "creation_timestamp": "2024-01-25T13:11:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/94b2dcc8-a167-4c25-a30b-6aa047b12b8a/export"/>
    <published>2024-01-25T13:11:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9d5b3081-3520-46a3-84c2-a438faf09c44/export</id>
    <title>9d5b3081-3520-46a3-84c2-a438faf09c44</title>
    <updated>2026-05-07T07:12:58.279041+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9d5b3081-3520-46a3-84c2-a438faf09c44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35990", "type": "seen", "source": "https://bsky.app/profile/sentrysecurity.bsky.social/post/3ll545osrjc2d", "content": "", "creation_timestamp": "2025-03-24T15:48:03.850005Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9d5b3081-3520-46a3-84c2-a438faf09c44/export"/>
    <published>2025-03-24T15:48:03.850005+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2cae1101-d1f6-435b-bca6-7b69a3e7f312/export</id>
    <title>2cae1101-d1f6-435b-bca6-7b69a3e7f312</title>
    <updated>2026-05-07T07:12:58.274125+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2cae1101-d1f6-435b-bca6-7b69a3e7f312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35992", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18660", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35992\n\ud83d\udd25 CVSS Score: 7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An integer overflow vulnerability exists in the FST fstReaderIterBlocks2 vesc allocation functionality of GTKWave 3.3.115, when compiled as a 32-bit binary. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.\n\ud83d\udccf Published: 2024-01-08T14:47:57.460Z\n\ud83d\udccf Modified: 2025-06-17T20:29:18.236Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1790\n2. https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html", "creation_timestamp": "2025-06-17T20:39:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2cae1101-d1f6-435b-bca6-7b69a3e7f312/export"/>
    <published>2025-06-17T20:39:48+00:00</published>
  </entry>
</feed>
