<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 13:10:57 +0000</lastBuildDate>
    <item>
      <title>587d5509-0f4e-43df-9716-acb8c2e5179a</title>
      <link>https://vulnerability.circl.lu/sighting/587d5509-0f4e-43df-9716-acb8c2e5179a/export</link>
      <description>{"uuid": "587d5509-0f4e-43df-9716-acb8c2e5179a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32219", "type": "seen", "source": "https://t.me/arpsyndicate/562", "content": "#ExploitObserverAlert\n\nCVE-2023-32219\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32219. A Mazda model (2015-2016) can be unlocked via an unspecified method.\n\nFIRST-EPSS: 0.000480000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-25T02:10:02.000000Z"}</description>
      <content:encoded>{"uuid": "587d5509-0f4e-43df-9716-acb8c2e5179a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32219", "type": "seen", "source": "https://t.me/arpsyndicate/562", "content": "#ExploitObserverAlert\n\nCVE-2023-32219\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32219. A Mazda model (2015-2016) can be unlocked via an unspecified method.\n\nFIRST-EPSS: 0.000480000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-25T02:10:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/587d5509-0f4e-43df-9716-acb8c2e5179a/export</guid>
      <pubDate>Sat, 25 Nov 2023 02:10:02 +0000</pubDate>
    </item>
    <item>
      <title>fa018746-208b-46ab-b517-7e2c8e0af56a</title>
      <link>https://vulnerability.circl.lu/sighting/fa018746-208b-46ab-b517-7e2c8e0af56a/export</link>
      <description>{"uuid": "fa018746-208b-46ab-b517-7e2c8e0af56a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32219", "type": "seen", "source": "https://t.me/arpsyndicate/1664", "content": "#ExploitObserverAlert\n\nCVE-2023-32219\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-32219. A Mazda model (2015-2016) can be unlocked via an unspecified method.\n\nFIRST-EPSS: 0.000480000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T17:29:37.000000Z"}</description>
      <content:encoded>{"uuid": "fa018746-208b-46ab-b517-7e2c8e0af56a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32219", "type": "seen", "source": "https://t.me/arpsyndicate/1664", "content": "#ExploitObserverAlert\n\nCVE-2023-32219\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-32219. A Mazda model (2015-2016) can be unlocked via an unspecified method.\n\nFIRST-EPSS: 0.000480000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T17:29:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fa018746-208b-46ab-b517-7e2c8e0af56a/export</guid>
      <pubDate>Sun, 10 Dec 2023 17:29:37 +0000</pubDate>
    </item>
    <item>
      <title>73f1e94f-89f7-47d6-a530-7715ff5682fc</title>
      <link>https://vulnerability.circl.lu/sighting/73f1e94f-89f7-47d6-a530-7715ff5682fc/export</link>
      <description>{"uuid": "73f1e94f-89f7-47d6-a530-7715ff5682fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32217", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1161", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32217\n\ud83d\udd39 Description: IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\n\n\n\ud83d\udccf Published: 2023-05-31T00:00:00\n\ud83d\udccf Modified: 2025-01-10T15:40:35.132Z\n\ud83d\udd17 References:\n1. https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/", "creation_timestamp": "2025-01-10T16:03:46.000000Z"}</description>
      <content:encoded>{"uuid": "73f1e94f-89f7-47d6-a530-7715ff5682fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32217", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1161", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32217\n\ud83d\udd39 Description: IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\n\n\n\ud83d\udccf Published: 2023-05-31T00:00:00\n\ud83d\udccf Modified: 2025-01-10T15:40:35.132Z\n\ud83d\udd17 References:\n1. https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/", "creation_timestamp": "2025-01-10T16:03:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/73f1e94f-89f7-47d6-a530-7715ff5682fc/export</guid>
      <pubDate>Fri, 10 Jan 2025 16:03:46 +0000</pubDate>
    </item>
    <item>
      <title>75722828-8c87-431b-85d1-a75522a9c049</title>
      <link>https://vulnerability.circl.lu/sighting/75722828-8c87-431b-85d1-a75522a9c049/export</link>
      <description>{"uuid": "75722828-8c87-431b-85d1-a75522a9c049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32216", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17690", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32216\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Mozilla developers and community members Ronald Crane, Andrew McCreight, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 113.\n\ud83d\udccf Published: 2023-06-19T09:42:17.546Z\n\ud83d\udccf Modified: 2025-05-27T16:53:17.147Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746479%2C1806852%2C1815987%2C1820359%2C1823568%2C1824803%2C1824834%2C1825170%2C1827020%2C1828130\n2. https://security.gentoo.org/glsa/202401-10\n3. https://www.mozilla.org/security/advisories/mfsa2023-16/", "creation_timestamp": "2025-05-27T17:48:59.000000Z"}</description>
      <content:encoded>{"uuid": "75722828-8c87-431b-85d1-a75522a9c049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32216", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17690", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32216\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Mozilla developers and community members Ronald Crane, Andrew McCreight, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 113.\n\ud83d\udccf Published: 2023-06-19T09:42:17.546Z\n\ud83d\udccf Modified: 2025-05-27T16:53:17.147Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746479%2C1806852%2C1815987%2C1820359%2C1823568%2C1824803%2C1824834%2C1825170%2C1827020%2C1828130\n2. https://security.gentoo.org/glsa/202401-10\n3. https://www.mozilla.org/security/advisories/mfsa2023-16/", "creation_timestamp": "2025-05-27T17:48:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/75722828-8c87-431b-85d1-a75522a9c049/export</guid>
      <pubDate>Tue, 27 May 2025 17:48:59 +0000</pubDate>
    </item>
    <item>
      <title>40016904-30cc-4188-8fb9-3cb57bd9b1cb</title>
      <link>https://vulnerability.circl.lu/sighting/40016904-30cc-4188-8fb9-3cb57bd9b1cb/export</link>
      <description>{"uuid": "40016904-30cc-4188-8fb9-3cb57bd9b1cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32210", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17691", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32210\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Documents were incorrectly assuming an ordering of principal objects when ensuring we were loading an appropriately privileged principal. In certain circumstances it might have been possible to cause a document to be loaded with a higher privileged principal than intended. This vulnerability affects Firefox &amp;lt; 113.\n\ud83d\udccf Published: 2023-06-19T09:37:25.092Z\n\ud83d\udccf Modified: 2025-05-27T16:53:16.609Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1776755\n2. https://security.gentoo.org/glsa/202401-10\n3. https://www.mozilla.org/security/advisories/mfsa2023-16/", "creation_timestamp": "2025-05-27T17:49:03.000000Z"}</description>
      <content:encoded>{"uuid": "40016904-30cc-4188-8fb9-3cb57bd9b1cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32210", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17691", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32210\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Documents were incorrectly assuming an ordering of principal objects when ensuring we were loading an appropriately privileged principal. In certain circumstances it might have been possible to cause a document to be loaded with a higher privileged principal than intended. This vulnerability affects Firefox &amp;lt; 113.\n\ud83d\udccf Published: 2023-06-19T09:37:25.092Z\n\ud83d\udccf Modified: 2025-05-27T16:53:16.609Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1776755\n2. https://security.gentoo.org/glsa/202401-10\n3. https://www.mozilla.org/security/advisories/mfsa2023-16/", "creation_timestamp": "2025-05-27T17:49:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/40016904-30cc-4188-8fb9-3cb57bd9b1cb/export</guid>
      <pubDate>Tue, 27 May 2025 17:49:03 +0000</pubDate>
    </item>
    <item>
      <title>c2517497-05de-4c69-a63d-067443c65d04</title>
      <link>https://vulnerability.circl.lu/sighting/c2517497-05de-4c69-a63d-067443c65d04/export</link>
      <description>{"uuid": "c2517497-05de-4c69-a63d-067443c65d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32215", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17694", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32215\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:14.999Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540883%2C1751943%2C1814856%2C1820210%2C1821480%2C1827019%2C1827024%2C1827144%2C1827359%2C1830186\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:06.000000Z"}</description>
      <content:encoded>{"uuid": "c2517497-05de-4c69-a63d-067443c65d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32215", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17694", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32215\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:14.999Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540883%2C1751943%2C1814856%2C1820210%2C1821480%2C1827019%2C1827024%2C1827144%2C1827359%2C1830186\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c2517497-05de-4c69-a63d-067443c65d04/export</guid>
      <pubDate>Tue, 27 May 2025 17:49:06 +0000</pubDate>
    </item>
    <item>
      <title>fd43e4c4-e0b2-4522-b507-b48039359f72</title>
      <link>https://vulnerability.circl.lu/sighting/fd43e4c4-e0b2-4522-b507-b48039359f72/export</link>
      <description>{"uuid": "fd43e4c4-e0b2-4522-b507-b48039359f72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32214", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17695", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32214\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service.\n*Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-19T09:38:56.644Z\n\ud83d\udccf Modified: 2025-05-27T16:53:14.473Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1828716\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:07.000000Z"}</description>
      <content:encoded>{"uuid": "fd43e4c4-e0b2-4522-b507-b48039359f72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32214", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17695", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32214\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service.\n*Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-19T09:38:56.644Z\n\ud83d\udccf Modified: 2025-05-27T16:53:14.473Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1828716\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fd43e4c4-e0b2-4522-b507-b48039359f72/export</guid>
      <pubDate>Tue, 27 May 2025 17:49:07 +0000</pubDate>
    </item>
    <item>
      <title>683a6cbd-8650-4d6d-85fa-795e0c4ec6bb</title>
      <link>https://vulnerability.circl.lu/sighting/683a6cbd-8650-4d6d-85fa-795e0c4ec6bb/export</link>
      <description>{"uuid": "683a6cbd-8650-4d6d-85fa-795e0c4ec6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17696", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32213\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:13.932Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1826666\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:11.000000Z"}</description>
      <content:encoded>{"uuid": "683a6cbd-8650-4d6d-85fa-795e0c4ec6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17696", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32213\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:13.932Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1826666\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/683a6cbd-8650-4d6d-85fa-795e0c4ec6bb/export</guid>
      <pubDate>Tue, 27 May 2025 17:49:11 +0000</pubDate>
    </item>
    <item>
      <title>bceddd39-16ff-4c44-9b69-ae8543236818</title>
      <link>https://vulnerability.circl.lu/sighting/bceddd39-16ff-4c44-9b69-ae8543236818/export</link>
      <description>{"uuid": "bceddd39-16ff-4c44-9b69-ae8543236818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32212", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17697", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32212\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An attacker could have positioned a `datalist` element to obscure the address bar. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:13.344Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1826622\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:12.000000Z"}</description>
      <content:encoded>{"uuid": "bceddd39-16ff-4c44-9b69-ae8543236818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32212", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17697", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32212\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An attacker could have positioned a `datalist` element to obscure the address bar. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:13.344Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1826622\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bceddd39-16ff-4c44-9b69-ae8543236818/export</guid>
      <pubDate>Tue, 27 May 2025 17:49:12 +0000</pubDate>
    </item>
    <item>
      <title>5a4abfea-f3ac-475a-aad0-c3e5a8a7960c</title>
      <link>https://vulnerability.circl.lu/sighting/5a4abfea-f3ac-475a-aad0-c3e5a8a7960c/export</link>
      <description>{"uuid": "5a4abfea-f3ac-475a-aad0-c3e5a8a7960c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32211", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17698", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32211\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:12.745Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1823379\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:13.000000Z"}</description>
      <content:encoded>{"uuid": "5a4abfea-f3ac-475a-aad0-c3e5a8a7960c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32211", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17698", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32211\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox &amp;lt; 113, Firefox ESR &amp;lt; 102.11, and Thunderbird &amp;lt; 102.11.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-05-27T16:53:12.745Z\n\ud83d\udd17 References:\n1. https://bugzilla.mozilla.org/show_bug.cgi?id=1823379\n2. https://security.gentoo.org/glsa/202312-03\n3. https://security.gentoo.org/glsa/202401-10\n4. https://www.mozilla.org/security/advisories/mfsa2023-16/\n5. https://www.mozilla.org/security/advisories/mfsa2023-17/\n6. https://www.mozilla.org/security/advisories/mfsa2023-18/", "creation_timestamp": "2025-05-27T17:49:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5a4abfea-f3ac-475a-aad0-c3e5a8a7960c/export</guid>
      <pubDate>Tue, 27 May 2025 17:49:13 +0000</pubDate>
    </item>
  </channel>
</rss>
