<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 13:11:39 +0000</lastBuildDate>
    <item>
      <title>f9dcf230-2865-4a80-bf70-bc22e6e54aeb</title>
      <link>https://vulnerability.circl.lu/sighting/f9dcf230-2865-4a80-bf70-bc22e6e54aeb/export</link>
      <description>{"uuid": "f9dcf230-2865-4a80-bf70-bc22e6e54aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35991", "type": "seen", "source": "https://t.me/cibsecurity/68821", "content": "\u203c CVE-2023-35991 \u203c\n\nHidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-18T14:38:19.000000Z"}</description>
      <content:encoded>{"uuid": "f9dcf230-2865-4a80-bf70-bc22e6e54aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35991", "type": "seen", "source": "https://t.me/cibsecurity/68821", "content": "\u203c CVE-2023-35991 \u203c\n\nHidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-18T14:38:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f9dcf230-2865-4a80-bf70-bc22e6e54aeb/export</guid>
      <pubDate>Fri, 18 Aug 2023 14:38:19 +0000</pubDate>
    </item>
    <item>
      <title>62d6bb4c-6eb7-4b76-bcae-5856b52bfb8a</title>
      <link>https://vulnerability.circl.lu/sighting/62d6bb4c-6eb7-4b76-bcae-5856b52bfb8a/export</link>
      <description>{"uuid": "62d6bb4c-6eb7-4b76-bcae-5856b52bfb8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35990", "type": "seen", "source": "https://t.me/cibsecurity/71055", "content": "\u203c CVE-2023-35990 \u203c\n\nThe issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T18:35:54.000000Z"}</description>
      <content:encoded>{"uuid": "62d6bb4c-6eb7-4b76-bcae-5856b52bfb8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35990", "type": "seen", "source": "https://t.me/cibsecurity/71055", "content": "\u203c CVE-2023-35990 \u203c\n\nThe issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T18:35:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/62d6bb4c-6eb7-4b76-bcae-5856b52bfb8a/export</guid>
      <pubDate>Wed, 27 Sep 2023 18:35:54 +0000</pubDate>
    </item>
    <item>
      <title>c48741aa-d04a-4d28-ad0a-c4ea9c16748e</title>
      <link>https://vulnerability.circl.lu/sighting/c48741aa-d04a-4d28-ad0a-c4ea9c16748e/export</link>
      <description>{"uuid": "c48741aa-d04a-4d28-ad0a-c4ea9c16748e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35992", "type": "seen", "source": "https://t.me/ctinow/165609", "content": "https://ift.tt/aVzb6tY\nCVE-2023-35992 Exploit", "creation_timestamp": "2024-01-10T08:16:27.000000Z"}</description>
      <content:encoded>{"uuid": "c48741aa-d04a-4d28-ad0a-c4ea9c16748e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35992", "type": "seen", "source": "https://t.me/ctinow/165609", "content": "https://ift.tt/aVzb6tY\nCVE-2023-35992 Exploit", "creation_timestamp": "2024-01-10T08:16:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c48741aa-d04a-4d28-ad0a-c4ea9c16748e/export</guid>
      <pubDate>Wed, 10 Jan 2024 08:16:27 +0000</pubDate>
    </item>
    <item>
      <title>b613730f-5eb1-4090-9a60-fd723fbafbfe</title>
      <link>https://vulnerability.circl.lu/sighting/b613730f-5eb1-4090-9a60-fd723fbafbfe/export</link>
      <description>{"uuid": "b613730f-5eb1-4090-9a60-fd723fbafbfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35996", "type": "seen", "source": "https://t.me/ctinow/168995", "content": "https://ift.tt/1Sfzcx8\nCVE-2023-35996 Exploit", "creation_timestamp": "2024-01-16T21:16:16.000000Z"}</description>
      <content:encoded>{"uuid": "b613730f-5eb1-4090-9a60-fd723fbafbfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35996", "type": "seen", "source": "https://t.me/ctinow/168995", "content": "https://ift.tt/1Sfzcx8\nCVE-2023-35996 Exploit", "creation_timestamp": "2024-01-16T21:16:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b613730f-5eb1-4090-9a60-fd723fbafbfe/export</guid>
      <pubDate>Tue, 16 Jan 2024 21:16:16 +0000</pubDate>
    </item>
    <item>
      <title>e1fcb73f-4a8e-4e04-9f7d-9cd2f6faf1bf</title>
      <link>https://vulnerability.circl.lu/sighting/e1fcb73f-4a8e-4e04-9f7d-9cd2f6faf1bf/export</link>
      <description>{"uuid": "e1fcb73f-4a8e-4e04-9f7d-9cd2f6faf1bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35995", "type": "seen", "source": "https://t.me/ctinow/168996", "content": "https://ift.tt/m5nD2y4\nCVE-2023-35995 Exploit", "creation_timestamp": "2024-01-16T21:16:18.000000Z"}</description>
      <content:encoded>{"uuid": "e1fcb73f-4a8e-4e04-9f7d-9cd2f6faf1bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35995", "type": "seen", "source": "https://t.me/ctinow/168996", "content": "https://ift.tt/m5nD2y4\nCVE-2023-35995 Exploit", "creation_timestamp": "2024-01-16T21:16:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e1fcb73f-4a8e-4e04-9f7d-9cd2f6faf1bf/export</guid>
      <pubDate>Tue, 16 Jan 2024 21:16:18 +0000</pubDate>
    </item>
    <item>
      <title>ab436169-7d9c-4d2d-b874-1bd267e7444a</title>
      <link>https://vulnerability.circl.lu/sighting/ab436169-7d9c-4d2d-b874-1bd267e7444a/export</link>
      <description>{"uuid": "ab436169-7d9c-4d2d-b874-1bd267e7444a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35997", "type": "seen", "source": "https://t.me/ctinow/168999", "content": "https://ift.tt/4LDs1pM\nCVE-2023-35997 Exploit", "creation_timestamp": "2024-01-16T21:16:27.000000Z"}</description>
      <content:encoded>{"uuid": "ab436169-7d9c-4d2d-b874-1bd267e7444a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35997", "type": "seen", "source": "https://t.me/ctinow/168999", "content": "https://ift.tt/4LDs1pM\nCVE-2023-35997 Exploit", "creation_timestamp": "2024-01-16T21:16:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ab436169-7d9c-4d2d-b874-1bd267e7444a/export</guid>
      <pubDate>Tue, 16 Jan 2024 21:16:27 +0000</pubDate>
    </item>
    <item>
      <title>91232483-d347-47bd-ae9a-10794728ae42</title>
      <link>https://vulnerability.circl.lu/sighting/91232483-d347-47bd-ae9a-10794728ae42/export</link>
      <description>{"uuid": "91232483-d347-47bd-ae9a-10794728ae42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35994", "type": "seen", "source": "https://t.me/ctinow/169001", "content": "https://ift.tt/kTqIQVG\nCVE-2023-35994 Exploit", "creation_timestamp": "2024-01-16T21:16:33.000000Z"}</description>
      <content:encoded>{"uuid": "91232483-d347-47bd-ae9a-10794728ae42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35994", "type": "seen", "source": "https://t.me/ctinow/169001", "content": "https://ift.tt/kTqIQVG\nCVE-2023-35994 Exploit", "creation_timestamp": "2024-01-16T21:16:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/91232483-d347-47bd-ae9a-10794728ae42/export</guid>
      <pubDate>Tue, 16 Jan 2024 21:16:33 +0000</pubDate>
    </item>
    <item>
      <title>94b2dcc8-a167-4c25-a30b-6aa047b12b8a</title>
      <link>https://vulnerability.circl.lu/sighting/94b2dcc8-a167-4c25-a30b-6aa047b12b8a/export</link>
      <description>{"uuid": "94b2dcc8-a167-4c25-a30b-6aa047b12b8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35992", "type": "seen", "source": "https://t.me/ctinow/173424", "content": "https://ift.tt/9ARHxTB\nCVE-2023-35992 | GTKWave 3.3.115 fstReaderIterBlocks2 integer overflow (TALOS-2023-1790)", "creation_timestamp": "2024-01-25T13:11:36.000000Z"}</description>
      <content:encoded>{"uuid": "94b2dcc8-a167-4c25-a30b-6aa047b12b8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35992", "type": "seen", "source": "https://t.me/ctinow/173424", "content": "https://ift.tt/9ARHxTB\nCVE-2023-35992 | GTKWave 3.3.115 fstReaderIterBlocks2 integer overflow (TALOS-2023-1790)", "creation_timestamp": "2024-01-25T13:11:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/94b2dcc8-a167-4c25-a30b-6aa047b12b8a/export</guid>
      <pubDate>Thu, 25 Jan 2024 13:11:36 +0000</pubDate>
    </item>
    <item>
      <title>9d5b3081-3520-46a3-84c2-a438faf09c44</title>
      <link>https://vulnerability.circl.lu/sighting/9d5b3081-3520-46a3-84c2-a438faf09c44/export</link>
      <description>{"uuid": "9d5b3081-3520-46a3-84c2-a438faf09c44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35990", "type": "seen", "source": "https://bsky.app/profile/sentrysecurity.bsky.social/post/3ll545osrjc2d", "content": "", "creation_timestamp": "2025-03-24T15:48:03.850005Z"}</description>
      <content:encoded>{"uuid": "9d5b3081-3520-46a3-84c2-a438faf09c44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35990", "type": "seen", "source": "https://bsky.app/profile/sentrysecurity.bsky.social/post/3ll545osrjc2d", "content": "", "creation_timestamp": "2025-03-24T15:48:03.850005Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9d5b3081-3520-46a3-84c2-a438faf09c44/export</guid>
      <pubDate>Mon, 24 Mar 2025 15:48:03 +0000</pubDate>
    </item>
    <item>
      <title>2cae1101-d1f6-435b-bca6-7b69a3e7f312</title>
      <link>https://vulnerability.circl.lu/sighting/2cae1101-d1f6-435b-bca6-7b69a3e7f312/export</link>
      <description>{"uuid": "2cae1101-d1f6-435b-bca6-7b69a3e7f312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35992", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18660", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35992\n\ud83d\udd25 CVSS Score: 7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An integer overflow vulnerability exists in the FST fstReaderIterBlocks2 vesc allocation functionality of GTKWave 3.3.115, when compiled as a 32-bit binary. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.\n\ud83d\udccf Published: 2024-01-08T14:47:57.460Z\n\ud83d\udccf Modified: 2025-06-17T20:29:18.236Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1790\n2. https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html", "creation_timestamp": "2025-06-17T20:39:48.000000Z"}</description>
      <content:encoded>{"uuid": "2cae1101-d1f6-435b-bca6-7b69a3e7f312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35992", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18660", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35992\n\ud83d\udd25 CVSS Score: 7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: An integer overflow vulnerability exists in the FST fstReaderIterBlocks2 vesc allocation functionality of GTKWave 3.3.115, when compiled as a 32-bit binary. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.\n\ud83d\udccf Published: 2024-01-08T14:47:57.460Z\n\ud83d\udccf Modified: 2025-06-17T20:29:18.236Z\n\ud83d\udd17 References:\n1. https://talosintelligence.com/vulnerability_reports/TALOS-2023-1790\n2. https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html", "creation_timestamp": "2025-06-17T20:39:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2cae1101-d1f6-435b-bca6-7b69a3e7f312/export</guid>
      <pubDate>Tue, 17 Jun 2025 20:39:48 +0000</pubDate>
    </item>
  </channel>
</rss>
