<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:48:32 +0000</lastBuildDate>
    <item>
      <title>38ce215f-262a-43fa-ae4d-8d6a280e1871</title>
      <link>https://vulnerability.circl.lu/sighting/38ce215f-262a-43fa-ae4d-8d6a280e1871/export</link>
      <description>{"uuid": "38ce215f-262a-43fa-ae4d-8d6a280e1871", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "Telegram/Jay9RkKiGwNKOeQ_WU-5E1hMgjui2eC3igROxpdYXhxFfmo", "content": "", "creation_timestamp": "2024-06-29T05:06:04.000000Z"}</description>
      <content:encoded>{"uuid": "38ce215f-262a-43fa-ae4d-8d6a280e1871", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "Telegram/Jay9RkKiGwNKOeQ_WU-5E1hMgjui2eC3igROxpdYXhxFfmo", "content": "", "creation_timestamp": "2024-06-29T05:06:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/38ce215f-262a-43fa-ae4d-8d6a280e1871/export</guid>
      <pubDate>Sat, 29 Jun 2024 05:06:04 +0000</pubDate>
    </item>
    <item>
      <title>83ee3004-1b83-4fb0-a2cd-66f595fe5752</title>
      <link>https://vulnerability.circl.lu/sighting/83ee3004-1b83-4fb0-a2cd-66f595fe5752/export</link>
      <description>{"uuid": "83ee3004-1b83-4fb0-a2cd-66f595fe5752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "https://t.me/CipherAgents/1303613", "content": "CVE-2024-27842 + CVE-2023-40404 macOS\n\nSploit allows you to execute code at the kernel level\n\nPOC exploit (\u0434\u043b\u044f CVE-2024-27842)\nPOC exploit (\u0434\u043b\u044f CVE-2023-40404)\n\n#\ud835\ude4f\ud835\ude40\ud835\ude3c\ud835\ude48_\ud835\ude41\ud835\ude4e\ud835\ude40\ud835\ude3e #\ud835\ude4f\ud835\ude40\ud835\ude3c\ud835\ude48_\ud835\ude44\ud835\ude49\ud835\ude3f", "creation_timestamp": "2024-07-03T19:55:08.000000Z"}</description>
      <content:encoded>{"uuid": "83ee3004-1b83-4fb0-a2cd-66f595fe5752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "https://t.me/CipherAgents/1303613", "content": "CVE-2024-27842 + CVE-2023-40404 macOS\n\nSploit allows you to execute code at the kernel level\n\nPOC exploit (\u0434\u043b\u044f CVE-2024-27842)\nPOC exploit (\u0434\u043b\u044f CVE-2023-40404)\n\n#\ud835\ude4f\ud835\ude40\ud835\ude3c\ud835\ude48_\ud835\ude41\ud835\ude4e\ud835\ude40\ud835\ude3e #\ud835\ude4f\ud835\ude40\ud835\ude3c\ud835\ude48_\ud835\ude44\ud835\ude49\ud835\ude3f", "creation_timestamp": "2024-07-03T19:55:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/83ee3004-1b83-4fb0-a2cd-66f595fe5752/export</guid>
      <pubDate>Wed, 03 Jul 2024 19:55:08 +0000</pubDate>
    </item>
    <item>
      <title>28e7810a-7133-4049-a00e-dcd2841eaee8</title>
      <link>https://vulnerability.circl.lu/sighting/28e7810a-7133-4049-a00e-dcd2841eaee8/export</link>
      <description>{"uuid": "28e7810a-7133-4049-a00e-dcd2841eaee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40400", "type": "seen", "source": "https://t.me/cvedetector/4560", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-7256 - Libpcap Buffer Double Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-7256 \nPublished : Aug. 31, 2024, 12:15 a.m. | 41\u00a0minutes ago \nDescription : In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns.  This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block.  A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-31T03:21:42.000000Z"}</description>
      <content:encoded>{"uuid": "28e7810a-7133-4049-a00e-dcd2841eaee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40400", "type": "seen", "source": "https://t.me/cvedetector/4560", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-7256 - Libpcap Buffer Double Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-7256 \nPublished : Aug. 31, 2024, 12:15 a.m. | 41\u00a0minutes ago \nDescription : In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns.  This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block.  A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-31T03:21:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/28e7810a-7133-4049-a00e-dcd2841eaee8/export</guid>
      <pubDate>Sat, 31 Aug 2024 03:21:42 +0000</pubDate>
    </item>
    <item>
      <title>aabf2962-f65d-4b97-b539-82f6bf47130e</title>
      <link>https://vulnerability.circl.lu/sighting/aabf2962-f65d-4b97-b539-82f6bf47130e/export</link>
      <description>{"uuid": "aabf2962-f65d-4b97-b539-82f6bf47130e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40403", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lwqmoy2kt624", "content": "", "creation_timestamp": "2025-08-19T09:41:42.788947Z"}</description>
      <content:encoded>{"uuid": "aabf2962-f65d-4b97-b539-82f6bf47130e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40403", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lwqmoy2kt624", "content": "", "creation_timestamp": "2025-08-19T09:41:42.788947Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aabf2962-f65d-4b97-b539-82f6bf47130e/export</guid>
      <pubDate>Tue, 19 Aug 2025 09:41:42 +0000</pubDate>
    </item>
    <item>
      <title>79105b64-fe09-436a-93e0-950b81ba91d4</title>
      <link>https://vulnerability.circl.lu/sighting/79105b64-fe09-436a-93e0-950b81ba91d4/export</link>
      <description>{"uuid": "79105b64-fe09-436a-93e0-950b81ba91d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxsg77prvuj2", "content": "", "creation_timestamp": "2025-09-01T20:18:12.011825Z"}</description>
      <content:encoded>{"uuid": "79105b64-fe09-436a-93e0-950b81ba91d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxsg77prvuj2", "content": "", "creation_timestamp": "2025-09-01T20:18:12.011825Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/79105b64-fe09-436a-93e0-950b81ba91d4/export</guid>
      <pubDate>Mon, 01 Sep 2025 20:18:12 +0000</pubDate>
    </item>
    <item>
      <title>c5f7d80a-a53f-4d2f-b74c-7b1d61e75db6</title>
      <link>https://vulnerability.circl.lu/sighting/c5f7d80a-a53f-4d2f-b74c-7b1d61e75db6/export</link>
      <description>{"uuid": "c5f7d80a-a53f-4d2f-b74c-7b1d61e75db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40401", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxt24i336g52", "content": "", "creation_timestamp": "2025-09-02T02:12:37.037448Z"}</description>
      <content:encoded>{"uuid": "c5f7d80a-a53f-4d2f-b74c-7b1d61e75db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40401", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxt24i336g52", "content": "", "creation_timestamp": "2025-09-02T02:12:37.037448Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c5f7d80a-a53f-4d2f-b74c-7b1d61e75db6/export</guid>
      <pubDate>Tue, 02 Sep 2025 02:12:37 +0000</pubDate>
    </item>
    <item>
      <title>3aa9e36f-5986-4b4b-98d3-9c8545456af2</title>
      <link>https://vulnerability.circl.lu/sighting/3aa9e36f-5986-4b4b-98d3-9c8545456af2/export</link>
      <description>{"uuid": "3aa9e36f-5986-4b4b-98d3-9c8545456af2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40408", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxtold3oqeq2", "content": "", "creation_timestamp": "2025-09-02T08:18:49.803880Z"}</description>
      <content:encoded>{"uuid": "3aa9e36f-5986-4b4b-98d3-9c8545456af2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40408", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxtold3oqeq2", "content": "", "creation_timestamp": "2025-09-02T08:18:49.803880Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3aa9e36f-5986-4b4b-98d3-9c8545456af2/export</guid>
      <pubDate>Tue, 02 Sep 2025 08:18:49 +0000</pubDate>
    </item>
    <item>
      <title>86dd158a-62ad-4a93-8337-1205826db852</title>
      <link>https://vulnerability.circl.lu/sighting/86dd158a-62ad-4a93-8337-1205826db852/export</link>
      <description>{"uuid": "86dd158a-62ad-4a93-8337-1205826db852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40408", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lxtq6eet4i2f", "content": "", "creation_timestamp": "2025-09-02T08:47:11.277321Z"}</description>
      <content:encoded>{"uuid": "86dd158a-62ad-4a93-8337-1205826db852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40408", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lxtq6eet4i2f", "content": "", "creation_timestamp": "2025-09-02T08:47:11.277321Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/86dd158a-62ad-4a93-8337-1205826db852/export</guid>
      <pubDate>Tue, 02 Sep 2025 08:47:11 +0000</pubDate>
    </item>
    <item>
      <title>6ca5f1c8-0fb2-424d-a8a3-2c54753c5cdd</title>
      <link>https://vulnerability.circl.lu/sighting/6ca5f1c8-0fb2-424d-a8a3-2c54753c5cdd/export</link>
      <description>{"uuid": "6ca5f1c8-0fb2-424d-a8a3-2c54753c5cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40405", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxufkic4bhg2", "content": "", "creation_timestamp": "2025-09-02T15:09:57.239602Z"}</description>
      <content:encoded>{"uuid": "6ca5f1c8-0fb2-424d-a8a3-2c54753c5cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40405", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxufkic4bhg2", "content": "", "creation_timestamp": "2025-09-02T15:09:57.239602Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6ca5f1c8-0fb2-424d-a8a3-2c54753c5cdd/export</guid>
      <pubDate>Tue, 02 Sep 2025 15:09:57 +0000</pubDate>
    </item>
    <item>
      <title>1a837ff4-8d67-4c78-a60d-03eefa37fa5f</title>
      <link>https://vulnerability.circl.lu/sighting/1a837ff4-8d67-4c78-a60d-03eefa37fa5f/export</link>
      <description>{"uuid": "1a837ff4-8d67-4c78-a60d-03eefa37fa5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40400", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-06", "content": "", "creation_timestamp": "2026-02-12T11:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "1a837ff4-8d67-4c78-a60d-03eefa37fa5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40400", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-06", "content": "", "creation_timestamp": "2026-02-12T11:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1a837ff4-8d67-4c78-a60d-03eefa37fa5f/export</guid>
      <pubDate>Thu, 12 Feb 2026 11:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
