<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 22:00:48 +0000</lastBuildDate>
    <item>
      <title>d70cce3f-8cd3-458a-8799-bb479a5798a2</title>
      <link>https://vulnerability.circl.lu/sighting/d70cce3f-8cd3-458a-8799-bb479a5798a2/export</link>
      <description>{"uuid": "d70cce3f-8cd3-458a-8799-bb479a5798a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38428", "type": "seen", "source": "https://t.me/cibsecurity/66867", "content": "\u203c CVE-2023-38428 \u203c\n\nAn issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T07:25:39.000000Z"}</description>
      <content:encoded>{"uuid": "d70cce3f-8cd3-458a-8799-bb479a5798a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38428", "type": "seen", "source": "https://t.me/cibsecurity/66867", "content": "\u203c CVE-2023-38428 \u203c\n\nAn issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T07:25:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d70cce3f-8cd3-458a-8799-bb479a5798a2/export</guid>
      <pubDate>Tue, 18 Jul 2023 07:25:39 +0000</pubDate>
    </item>
    <item>
      <title>70d27fbe-6f5f-4b4d-88ed-8b7865908273</title>
      <link>https://vulnerability.circl.lu/sighting/70d27fbe-6f5f-4b4d-88ed-8b7865908273/export</link>
      <description>{"uuid": "70d27fbe-6f5f-4b4d-88ed-8b7865908273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38426", "type": "seen", "source": "https://t.me/cibsecurity/66875", "content": "\u203c CVE-2023-38426 \u203c\n\nAn issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T07:25:50.000000Z"}</description>
      <content:encoded>{"uuid": "70d27fbe-6f5f-4b4d-88ed-8b7865908273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38426", "type": "seen", "source": "https://t.me/cibsecurity/66875", "content": "\u203c CVE-2023-38426 \u203c\n\nAn issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T07:25:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/70d27fbe-6f5f-4b4d-88ed-8b7865908273/export</guid>
      <pubDate>Tue, 18 Jul 2023 07:25:50 +0000</pubDate>
    </item>
    <item>
      <title>e77dde5b-e975-4e57-9789-44b4d6503833</title>
      <link>https://vulnerability.circl.lu/sighting/e77dde5b-e975-4e57-9789-44b4d6503833/export</link>
      <description>{"uuid": "e77dde5b-e975-4e57-9789-44b4d6503833", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38427", "type": "seen", "source": "https://t.me/cibsecurity/66876", "content": "\u203c CVE-2023-38427 \u203c\n\nAn issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T07:25:51.000000Z"}</description>
      <content:encoded>{"uuid": "e77dde5b-e975-4e57-9789-44b4d6503833", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38427", "type": "seen", "source": "https://t.me/cibsecurity/66876", "content": "\u203c CVE-2023-38427 \u203c\n\nAn issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T07:25:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e77dde5b-e975-4e57-9789-44b4d6503833/export</guid>
      <pubDate>Tue, 18 Jul 2023 07:25:51 +0000</pubDate>
    </item>
    <item>
      <title>07b8e54f-579b-4983-91b8-a8350889d18c</title>
      <link>https://vulnerability.circl.lu/sighting/07b8e54f-579b-4983-91b8-a8350889d18c/export</link>
      <description>{"uuid": "07b8e54f-579b-4983-91b8-a8350889d18c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38429", "type": "seen", "source": "https://t.me/cibsecurity/66880", "content": "\u203c CVE-2023-38429 \u203c\n\nAn issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T07:25:57.000000Z"}</description>
      <content:encoded>{"uuid": "07b8e54f-579b-4983-91b8-a8350889d18c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38429", "type": "seen", "source": "https://t.me/cibsecurity/66880", "content": "\u203c CVE-2023-38429 \u203c\n\nAn issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-18T07:25:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/07b8e54f-579b-4983-91b8-a8350889d18c/export</guid>
      <pubDate>Tue, 18 Jul 2023 07:25:57 +0000</pubDate>
    </item>
    <item>
      <title>2d8ea67a-d3be-45de-b3c3-2b9d455359c1</title>
      <link>https://vulnerability.circl.lu/sighting/2d8ea67a-d3be-45de-b3c3-2b9d455359c1/export</link>
      <description>{"uuid": "2d8ea67a-d3be-45de-b3c3-2b9d455359c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3842", "type": "seen", "source": "https://t.me/cibsecurity/67126", "content": "\u203c CVE-2023-3842 \u203c\n\nA vulnerability was found in Pointware EasyInventory 1.0.12.0 and classified as critical. This issue affects some unknown processing of the file C:\\Program Files (x86)\\EasyInventory\\Easy2W.exe. The manipulation leads to unquoted search path. Attacking locally is a requirement. The identifier VDB-235193 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-23T07:24:58.000000Z"}</description>
      <content:encoded>{"uuid": "2d8ea67a-d3be-45de-b3c3-2b9d455359c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3842", "type": "seen", "source": "https://t.me/cibsecurity/67126", "content": "\u203c CVE-2023-3842 \u203c\n\nA vulnerability was found in Pointware EasyInventory 1.0.12.0 and classified as critical. This issue affects some unknown processing of the file C:\\Program Files (x86)\\EasyInventory\\Easy2W.exe. The manipulation leads to unquoted search path. Attacking locally is a requirement. The identifier VDB-235193 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-23T07:24:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2d8ea67a-d3be-45de-b3c3-2b9d455359c1/export</guid>
      <pubDate>Sun, 23 Jul 2023 07:24:58 +0000</pubDate>
    </item>
    <item>
      <title>c5e67a49-e825-4dec-b198-640100f9464f</title>
      <link>https://vulnerability.circl.lu/sighting/c5e67a49-e825-4dec-b198-640100f9464f/export</link>
      <description>{"uuid": "c5e67a49-e825-4dec-b198-640100f9464f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38423", "type": "seen", "source": "https://t.me/cibsecurity/67601", "content": "\u203c CVE-2023-38423 \u203c\n\nA cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.\u00c2\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T20:39:21.000000Z"}</description>
      <content:encoded>{"uuid": "c5e67a49-e825-4dec-b198-640100f9464f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38423", "type": "seen", "source": "https://t.me/cibsecurity/67601", "content": "\u203c CVE-2023-38423 \u203c\n\nA cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.\u00c2\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-02T20:39:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c5e67a49-e825-4dec-b198-640100f9464f/export</guid>
      <pubDate>Wed, 02 Aug 2023 20:39:21 +0000</pubDate>
    </item>
    <item>
      <title>2abd89ee-3862-4b6f-85fd-df09af3a1e8f</title>
      <link>https://vulnerability.circl.lu/sighting/2abd89ee-3862-4b6f-85fd-df09af3a1e8f/export</link>
      <description>{"uuid": "2abd89ee-3862-4b6f-85fd-df09af3a1e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38422", "type": "seen", "source": "https://t.me/cibsecurity/69103", "content": "\u203c CVE-2023-38422 \u203c\n\nWalchem Intuition 9 firmware versions prior to v4.21 are missing authentication for some of the API routes of the management web server. This could allow an attacker to download and export sensitive data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-24T02:12:52.000000Z"}</description>
      <content:encoded>{"uuid": "2abd89ee-3862-4b6f-85fd-df09af3a1e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38422", "type": "seen", "source": "https://t.me/cibsecurity/69103", "content": "\u203c CVE-2023-38422 \u203c\n\nWalchem Intuition 9 firmware versions prior to v4.21 are missing authentication for some of the API routes of the management web server. This could allow an attacker to download and export sensitive data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-24T02:12:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2abd89ee-3862-4b6f-85fd-df09af3a1e8f/export</guid>
      <pubDate>Thu, 24 Aug 2023 02:12:52 +0000</pubDate>
    </item>
  </channel>
</rss>
