<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:07:26 +0000</lastBuildDate>
    <item>
      <title>53fd08c8-ab99-4f61-9c65-27dadf0dc78e</title>
      <link>https://vulnerability.circl.lu/sighting/53fd08c8-ab99-4f61-9c65-27dadf0dc78e/export</link>
      <description>{"uuid": "53fd08c8-ab99-4f61-9c65-27dadf0dc78e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32235", "type": "seen", "source": "https://t.me/cibsecurity/44443", "content": "\u203c CVE-2022-32235 \u203c\n\nWhen a user opens manipulated AutoCAD (.dwg, TeighaTranslator.exe) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-14T22:19:13.000000Z"}</description>
      <content:encoded>{"uuid": "53fd08c8-ab99-4f61-9c65-27dadf0dc78e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32235", "type": "seen", "source": "https://t.me/cibsecurity/44443", "content": "\u203c CVE-2022-32235 \u203c\n\nWhen a user opens manipulated AutoCAD (.dwg, TeighaTranslator.exe) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-14T22:19:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/53fd08c8-ab99-4f61-9c65-27dadf0dc78e/export</guid>
      <pubDate>Tue, 14 Jun 2022 22:19:13 +0000</pubDate>
    </item>
    <item>
      <title>cbab829b-890f-46bb-ba23-33b30e29227b</title>
      <link>https://vulnerability.circl.lu/sighting/cbab829b-890f-46bb-ba23-33b30e29227b/export</link>
      <description>{"uuid": "cbab829b-890f-46bb-ba23-33b30e29227b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32239", "type": "seen", "source": "https://t.me/cibsecurity/44456", "content": "\u203c CVE-2022-32239 \u203c\n\nWhen a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T00:19:15.000000Z"}</description>
      <content:encoded>{"uuid": "cbab829b-890f-46bb-ba23-33b30e29227b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32239", "type": "seen", "source": "https://t.me/cibsecurity/44456", "content": "\u203c CVE-2022-32239 \u203c\n\nWhen a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T00:19:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cbab829b-890f-46bb-ba23-33b30e29227b/export</guid>
      <pubDate>Wed, 15 Jun 2022 00:19:15 +0000</pubDate>
    </item>
    <item>
      <title>611ea7c1-415b-4eb0-905e-ada2d06acbdb</title>
      <link>https://vulnerability.circl.lu/sighting/611ea7c1-415b-4eb0-905e-ada2d06acbdb/export</link>
      <description>{"uuid": "611ea7c1-415b-4eb0-905e-ada2d06acbdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32236", "type": "seen", "source": "https://t.me/cibsecurity/44460", "content": "\u203c CVE-2022-32236 \u203c\n\nWhen a user opens manipulated Windows Bitmap (.bmp, 2d.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T00:19:20.000000Z"}</description>
      <content:encoded>{"uuid": "611ea7c1-415b-4eb0-905e-ada2d06acbdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32236", "type": "seen", "source": "https://t.me/cibsecurity/44460", "content": "\u203c CVE-2022-32236 \u203c\n\nWhen a user opens manipulated Windows Bitmap (.bmp, 2d.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T00:19:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/611ea7c1-415b-4eb0-905e-ada2d06acbdb/export</guid>
      <pubDate>Wed, 15 Jun 2022 00:19:20 +0000</pubDate>
    </item>
    <item>
      <title>f8bb5d55-1b24-4409-ab65-63e7e5ea5ecf</title>
      <link>https://vulnerability.circl.lu/sighting/f8bb5d55-1b24-4409-ab65-63e7e5ea5ecf/export</link>
      <description>{"uuid": "f8bb5d55-1b24-4409-ab65-63e7e5ea5ecf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32238", "type": "seen", "source": "https://t.me/cibsecurity/44468", "content": "\u203c CVE-2022-32238 \u203c\n\nWhen a user opens manipulated Encapsulated Post Script (.eps, ai.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T00:19:28.000000Z"}</description>
      <content:encoded>{"uuid": "f8bb5d55-1b24-4409-ab65-63e7e5ea5ecf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32238", "type": "seen", "source": "https://t.me/cibsecurity/44468", "content": "\u203c CVE-2022-32238 \u203c\n\nWhen a user opens manipulated Encapsulated Post Script (.eps, ai.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T00:19:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f8bb5d55-1b24-4409-ab65-63e7e5ea5ecf/export</guid>
      <pubDate>Wed, 15 Jun 2022 00:19:28 +0000</pubDate>
    </item>
    <item>
      <title>7eb1939f-c4dd-440a-adda-10247507796a</title>
      <link>https://vulnerability.circl.lu/sighting/7eb1939f-c4dd-440a-adda-10247507796a/export</link>
      <description>{"uuid": "7eb1939f-c4dd-440a-adda-10247507796a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32237", "type": "seen", "source": "https://t.me/cibsecurity/44471", "content": "\u203c CVE-2022-32237 \u203c\n\nWhen a user opens manipulated Computer Graphics Metafile (.cgm, CgmCore.dll) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T00:19:34.000000Z"}</description>
      <content:encoded>{"uuid": "7eb1939f-c4dd-440a-adda-10247507796a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32237", "type": "seen", "source": "https://t.me/cibsecurity/44471", "content": "\u203c CVE-2022-32237 \u203c\n\nWhen a user opens manipulated Computer Graphics Metafile (.cgm, CgmCore.dll) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-15T00:19:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7eb1939f-c4dd-440a-adda-10247507796a/export</guid>
      <pubDate>Wed, 15 Jun 2022 00:19:34 +0000</pubDate>
    </item>
    <item>
      <title>ca6c8122-5505-4a10-bfe0-50cd1e19c9cb</title>
      <link>https://vulnerability.circl.lu/sighting/ca6c8122-5505-4a10-bfe0-50cd1e19c9cb/export</link>
      <description>{"uuid": "ca6c8122-5505-4a10-bfe0-50cd1e19c9cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3223", "type": "seen", "source": "https://t.me/cibsecurity/49898", "content": "\u203c CVE-2022-3223 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 20.3.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T14:41:41.000000Z"}</description>
      <content:encoded>{"uuid": "ca6c8122-5505-4a10-bfe0-50cd1e19c9cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3223", "type": "seen", "source": "https://t.me/cibsecurity/49898", "content": "\u203c CVE-2022-3223 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 20.3.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-16T14:41:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ca6c8122-5505-4a10-bfe0-50cd1e19c9cb/export</guid>
      <pubDate>Fri, 16 Sep 2022 14:41:41 +0000</pubDate>
    </item>
    <item>
      <title>1717215b-d0bd-46c9-9110-348dcc596515</title>
      <link>https://vulnerability.circl.lu/sighting/1717215b-d0bd-46c9-9110-348dcc596515/export</link>
      <description>{"uuid": "1717215b-d0bd-46c9-9110-348dcc596515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32234", "type": "seen", "source": "https://t.me/cibsecurity/51092", "content": "\u203c CVE-2022-32234 \u203c\n\nAn out of bounds write in hermes, while handling large arrays, prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T07:25:25.000000Z"}</description>
      <content:encoded>{"uuid": "1717215b-d0bd-46c9-9110-348dcc596515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32234", "type": "seen", "source": "https://t.me/cibsecurity/51092", "content": "\u203c CVE-2022-32234 \u203c\n\nAn out of bounds write in hermes, while handling large arrays, prior to commit 06eaec767e376bfdb883d912cb15e987ddf2bda1 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-11T07:25:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1717215b-d0bd-46c9-9110-348dcc596515/export</guid>
      <pubDate>Tue, 11 Oct 2022 07:25:25 +0000</pubDate>
    </item>
    <item>
      <title>9d6f887e-0f68-46e3-9c74-da4dbc154ff5</title>
      <link>https://vulnerability.circl.lu/sighting/9d6f887e-0f68-46e3-9c74-da4dbc154ff5/export</link>
      <description>{"uuid": "9d6f887e-0f68-46e3-9c74-da4dbc154ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32231", "type": "seen", "source": "https://t.me/cibsecurity/58380", "content": "\u203c CVE-2022-32231 \u203c\n\nImproper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T22:26:56.000000Z"}</description>
      <content:encoded>{"uuid": "9d6f887e-0f68-46e3-9c74-da4dbc154ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32231", "type": "seen", "source": "https://t.me/cibsecurity/58380", "content": "\u203c CVE-2022-32231 \u203c\n\nImproper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T22:26:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9d6f887e-0f68-46e3-9c74-da4dbc154ff5/export</guid>
      <pubDate>Thu, 16 Feb 2023 22:26:56 +0000</pubDate>
    </item>
    <item>
      <title>7c345091-a9a2-43e5-b2d6-4066a76c032c</title>
      <link>https://vulnerability.circl.lu/sighting/7c345091-a9a2-43e5-b2d6-4066a76c032c/export</link>
      <description>{"uuid": "7c345091-a9a2-43e5-b2d6-4066a76c032c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32230", "type": "seen", "source": "https://t.me/arpsyndicate/2863", "content": "#ExploitObserverAlert\n\nCVE-2022-32230\n\nDESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2022-32230. Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.\n\nFIRST-EPSS: 0.001220000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-16T16:44:12.000000Z"}</description>
      <content:encoded>{"uuid": "7c345091-a9a2-43e5-b2d6-4066a76c032c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-32230", "type": "seen", "source": "https://t.me/arpsyndicate/2863", "content": "#ExploitObserverAlert\n\nCVE-2022-32230\n\nDESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2022-32230. Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.\n\nFIRST-EPSS: 0.001220000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-16T16:44:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c345091-a9a2-43e5-b2d6-4066a76c032c/export</guid>
      <pubDate>Tue, 16 Jan 2024 16:44:12 +0000</pubDate>
    </item>
  </channel>
</rss>
