<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 05:39:11 +0000</lastBuildDate>
    <item>
      <title>1b294a30-0f94-49b7-880e-0c993dcce184</title>
      <link>https://vulnerability.circl.lu/sighting/1b294a30-0f94-49b7-880e-0c993dcce184/export</link>
      <description>{"uuid": "1b294a30-0f94-49b7-880e-0c993dcce184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28733", "type": "seen", "source": "https://t.me/cibsecurity/61167", "content": "\u203c CVE-2023-28733 \u203c\n\nAnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-30T16:26:15.000000Z"}</description>
      <content:encoded>{"uuid": "1b294a30-0f94-49b7-880e-0c993dcce184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28733", "type": "seen", "source": "https://t.me/cibsecurity/61167", "content": "\u203c CVE-2023-28733 \u203c\n\nAnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-30T16:26:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1b294a30-0f94-49b7-880e-0c993dcce184/export</guid>
      <pubDate>Thu, 30 Mar 2023 16:26:15 +0000</pubDate>
    </item>
    <item>
      <title>b0b11da6-e10e-495b-b545-b28f4e33c5bf</title>
      <link>https://vulnerability.circl.lu/sighting/b0b11da6-e10e-495b-b545-b28f4e33c5bf/export</link>
      <description>{"uuid": "b0b11da6-e10e-495b-b545-b28f4e33c5bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28731", "type": "seen", "source": "https://t.me/cibsecurity/61168", "content": "\u203c CVE-2023-28731 \u203c\n\nAnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-30T16:26:16.000000Z"}</description>
      <content:encoded>{"uuid": "b0b11da6-e10e-495b-b545-b28f4e33c5bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28731", "type": "seen", "source": "https://t.me/cibsecurity/61168", "content": "\u203c CVE-2023-28731 \u203c\n\nAnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-30T16:26:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b0b11da6-e10e-495b-b545-b28f4e33c5bf/export</guid>
      <pubDate>Thu, 30 Mar 2023 16:26:16 +0000</pubDate>
    </item>
    <item>
      <title>9df8ea53-4e33-413b-bf27-17c4be827e24</title>
      <link>https://vulnerability.circl.lu/sighting/9df8ea53-4e33-413b-bf27-17c4be827e24/export</link>
      <description>{"uuid": "9df8ea53-4e33-413b-bf27-17c4be827e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2873", "type": "seen", "source": "https://t.me/cibsecurity/64711", "content": "\u203c CVE-2023-2873 \u203c\n\nA vulnerability classified as critical was found in Twister Antivirus 8. This vulnerability affects the function 0x804f2143/0x804f217f/0x804f214b/0x80800043 in the library filppd.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T22:27:16.000000Z"}</description>
      <content:encoded>{"uuid": "9df8ea53-4e33-413b-bf27-17c4be827e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2873", "type": "seen", "source": "https://t.me/cibsecurity/64711", "content": "\u203c CVE-2023-2873 \u203c\n\nA vulnerability classified as critical was found in Twister Antivirus 8. This vulnerability affects the function 0x804f2143/0x804f217f/0x804f214b/0x80800043 in the library filppd.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-24T22:27:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9df8ea53-4e33-413b-bf27-17c4be827e24/export</guid>
      <pubDate>Wed, 24 May 2023 22:27:16 +0000</pubDate>
    </item>
    <item>
      <title>237cb2df-1be7-4916-96cc-f2fb66425192</title>
      <link>https://vulnerability.circl.lu/sighting/237cb2df-1be7-4916-96cc-f2fb66425192/export</link>
      <description>{"uuid": "237cb2df-1be7-4916-96cc-f2fb66425192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28730", "type": "seen", "source": "https://t.me/cibsecurity/67084", "content": "\u203c CVE-2023-28730 \u203c\n\nA memory corruption vulnerability Panasonic Control FPWIN Pro versions 7.6.0.3 and all previous versions may allow arbitrary code execution when opening specially crafted project files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-21T12:33:21.000000Z"}</description>
      <content:encoded>{"uuid": "237cb2df-1be7-4916-96cc-f2fb66425192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28730", "type": "seen", "source": "https://t.me/cibsecurity/67084", "content": "\u203c CVE-2023-28730 \u203c\n\nA memory corruption vulnerability Panasonic Control FPWIN Pro versions 7.6.0.3 and all previous versions may allow arbitrary code execution when opening specially crafted project files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-21T12:33:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/237cb2df-1be7-4916-96cc-f2fb66425192/export</guid>
      <pubDate>Fri, 21 Jul 2023 12:33:21 +0000</pubDate>
    </item>
    <item>
      <title>2ddb0f49-60a7-4034-a547-0a9ad9ad6864</title>
      <link>https://vulnerability.circl.lu/sighting/2ddb0f49-60a7-4034-a547-0a9ad9ad6864/export</link>
      <description>{"uuid": "2ddb0f49-60a7-4034-a547-0a9ad9ad6864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28736", "type": "seen", "source": "https://t.me/cibsecurity/68279", "content": "\u203c CVE-2023-28736 \u203c\n\nBuffer overflow in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:26:35.000000Z"}</description>
      <content:encoded>{"uuid": "2ddb0f49-60a7-4034-a547-0a9ad9ad6864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28736", "type": "seen", "source": "https://t.me/cibsecurity/68279", "content": "\u203c CVE-2023-28736 \u203c\n\nBuffer overflow in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-11T07:26:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2ddb0f49-60a7-4034-a547-0a9ad9ad6864/export</guid>
      <pubDate>Fri, 11 Aug 2023 07:26:35 +0000</pubDate>
    </item>
    <item>
      <title>2b4a9887-e473-4862-a48a-46603d4c46d3</title>
      <link>https://vulnerability.circl.lu/sighting/2b4a9887-e473-4862-a48a-46603d4c46d3/export</link>
      <description>{"uuid": "2b4a9887-e473-4862-a48a-46603d4c46d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28738", "type": "seen", "source": "https://t.me/ctinow/170405", "content": "https://ift.tt/lDTb8aE\nCVE-2023-28738", "creation_timestamp": "2024-01-19T21:27:14.000000Z"}</description>
      <content:encoded>{"uuid": "2b4a9887-e473-4862-a48a-46603d4c46d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28738", "type": "seen", "source": "https://t.me/ctinow/170405", "content": "https://ift.tt/lDTb8aE\nCVE-2023-28738", "creation_timestamp": "2024-01-19T21:27:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2b4a9887-e473-4862-a48a-46603d4c46d3/export</guid>
      <pubDate>Fri, 19 Jan 2024 21:27:14 +0000</pubDate>
    </item>
    <item>
      <title>70504aa3-8e94-4a63-8b60-839b094a142d</title>
      <link>https://vulnerability.circl.lu/sighting/70504aa3-8e94-4a63-8b60-839b094a142d/export</link>
      <description>{"uuid": "70504aa3-8e94-4a63-8b60-839b094a142d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28738", "type": "seen", "source": "https://t.me/ctinow/185706", "content": "https://ift.tt/PKIOzeU\nCVE-2023-28738 | Intel NUC BIOS prior JY0070 input validation (intel-sa-01009)", "creation_timestamp": "2024-02-15T17:26:23.000000Z"}</description>
      <content:encoded>{"uuid": "70504aa3-8e94-4a63-8b60-839b094a142d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28738", "type": "seen", "source": "https://t.me/ctinow/185706", "content": "https://ift.tt/PKIOzeU\nCVE-2023-28738 | Intel NUC BIOS prior JY0070 input validation (intel-sa-01009)", "creation_timestamp": "2024-02-15T17:26:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/70504aa3-8e94-4a63-8b60-839b094a142d/export</guid>
      <pubDate>Thu, 15 Feb 2024 17:26:23 +0000</pubDate>
    </item>
    <item>
      <title>4ab2c051-7316-4cd8-8cce-03e7bc4619c4</title>
      <link>https://vulnerability.circl.lu/sighting/4ab2c051-7316-4cd8-8cce-03e7bc4619c4/export</link>
      <description>{"uuid": "4ab2c051-7316-4cd8-8cce-03e7bc4619c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28739", "type": "seen", "source": "https://t.me/ctinow/201222", "content": "https://ift.tt/n4mghvP\nCVE-2023-28739 | Intel Chipset Driver Software prior 10.1.19444.8378 default permission (intel-sa-00928)", "creation_timestamp": "2024-03-06T11:41:15.000000Z"}</description>
      <content:encoded>{"uuid": "4ab2c051-7316-4cd8-8cce-03e7bc4619c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28739", "type": "seen", "source": "https://t.me/ctinow/201222", "content": "https://ift.tt/n4mghvP\nCVE-2023-28739 | Intel Chipset Driver Software prior 10.1.19444.8378 default permission (intel-sa-00928)", "creation_timestamp": "2024-03-06T11:41:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4ab2c051-7316-4cd8-8cce-03e7bc4619c4/export</guid>
      <pubDate>Wed, 06 Mar 2024 11:41:15 +0000</pubDate>
    </item>
  </channel>
</rss>
