<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 12:16:59 +0000</lastBuildDate>
    <item>
      <title>14c33ea8-4f95-4513-ac23-5564aff459e7</title>
      <link>https://vulnerability.circl.lu/sighting/14c33ea8-4f95-4513-ac23-5564aff459e7/export</link>
      <description>{"uuid": "14c33ea8-4f95-4513-ac23-5564aff459e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29748", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/997", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29748\n\ud83d\udd39 Description: Story Saver for Instragram - Video Downloader 1.0.6 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memory when the application is opened. When an attacker injects too much data, the application will trigger an OOM error and crash at startup, resulting in a persistent denial of service.\n\ud83d\udccf Published: 2023-06-01T00:00:00\n\ud83d\udccf Modified: 2025-01-09T17:58:30.004Z\n\ud83d\udd17 References:\n1. https://apksos.com/app/story.saver.downloader.photo.video.repost.byrk\n2. https://www.instagram.com/nihans_macrame/\n3. https://play.google.com/store/apps/details?id=ru.yandex.yandexnavi\n4. https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md", "creation_timestamp": "2025-01-09T18:16:49.000000Z"}</description>
      <content:encoded>{"uuid": "14c33ea8-4f95-4513-ac23-5564aff459e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-29748", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/997", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-29748\n\ud83d\udd39 Description: Story Saver for Instragram - Video Downloader 1.0.6 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memory when the application is opened. When an attacker injects too much data, the application will trigger an OOM error and crash at startup, resulting in a persistent denial of service.\n\ud83d\udccf Published: 2023-06-01T00:00:00\n\ud83d\udccf Modified: 2025-01-09T17:58:30.004Z\n\ud83d\udd17 References:\n1. https://apksos.com/app/story.saver.downloader.photo.video.repost.byrk\n2. https://www.instagram.com/nihans_macrame/\n3. https://play.google.com/store/apps/details?id=ru.yandex.yandexnavi\n4. https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md", "creation_timestamp": "2025-01-09T18:16:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/14c33ea8-4f95-4513-ac23-5564aff459e7/export</guid>
      <pubDate>Thu, 09 Jan 2025 18:16:49 +0000</pubDate>
    </item>
  </channel>
</rss>
