<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T06:51:16.295796+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/34ea18a7-f3ae-487d-86c3-c09ce98ae3a5/export</id>
    <title>34ea18a7-f3ae-487d-86c3-c09ce98ae3a5</title>
    <updated>2026-05-04T06:51:16.557428+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "34ea18a7-f3ae-487d-86c3-c09ce98ae3a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28703", "type": "seen", "source": "https://t.me/true_secator/4523", "content": "\ud83d\udea4 \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f ASUS \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u00ab\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0438\u0442\u044c\u0441\u044f\u00bb\n\nASUS \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043d\u043e\u0432\u0443\u044e \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0443 \u0441 \u043a\u0443\u043c\u0443\u043b\u044f\u0442\u0438\u0432\u043d\u044b\u043c\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445. \u0412 \u0440\u0430\u0437\u0434\u0435\u043b\u0435 \"Latest security updates\" \u043e\u0442 06/19/2023 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043e \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.\n\n\u2194\ufe0f \u0412 \u043d\u043e\u0432\u043e\u0439 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442\u0441\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0434\u0435\u0432\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0432\u044b\u0441\u043e\u043a\u0438\u0435 \u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435. \u0412 \u0441\u043f\u0438\u0441\u043a\u0435 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442\u0441\u044f CVE-2023-28702, CVE-2023-28703, CVE-2023-31195, CVE-2022-46871, CVE-2022-38105, CVE-2022-35401, CVE-2018-1160, CVE-2022-38393, CVE-2022-26376.\n\n\u0412 \u0441\u043f\u0438\u0441\u043e\u043a \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432\u0445\u043e\u0434\u044f\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043c\u043e\u0434\u0435\u043b\u0438: GT6, GT-AXE16000, GT-AX11000 PRO, GT-AX6000, GT-AX11000, GS-AX5400, GS-AX3000, XT9, XT8, XT8 V2, RT-AX86U PRO, RT-AX86U, RT-AX86S, RT-AX82U, RT-AX58U, RT-AX3000, TUF-AX6000 \u0438 TUF-AX5400.\n\nhttps://www.asus.com/content/asus-product-security-advisory/#:~:text=06/19/2023%20New%20firmware%20with%20accumulate%20security%20updates\n\n\u270b @Russian_OSINT", "creation_timestamp": "2023-06-21T14:27:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/34ea18a7-f3ae-487d-86c3-c09ce98ae3a5/export"/>
    <published>2023-06-21T14:27:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/52240c30-9b74-4e0d-89f1-d12105858697/export</id>
    <title>52240c30-9b74-4e0d-89f1-d12105858697</title>
    <updated>2026-05-04T06:51:16.557368+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "52240c30-9b74-4e0d-89f1-d12105858697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28702", "type": "seen", "source": "https://t.me/true_secator/4523", "content": "\ud83d\udea4 \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f ASUS \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u00ab\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0438\u0442\u044c\u0441\u044f\u00bb\n\nASUS \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043d\u043e\u0432\u0443\u044e \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0443 \u0441 \u043a\u0443\u043c\u0443\u043b\u044f\u0442\u0438\u0432\u043d\u044b\u043c\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445. \u0412 \u0440\u0430\u0437\u0434\u0435\u043b\u0435 \"Latest security updates\" \u043e\u0442 06/19/2023 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043e \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.\n\n\u2194\ufe0f \u0412 \u043d\u043e\u0432\u043e\u0439 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442\u0441\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0434\u0435\u0432\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0432\u044b\u0441\u043e\u043a\u0438\u0435 \u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435. \u0412 \u0441\u043f\u0438\u0441\u043a\u0435 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442\u0441\u044f CVE-2023-28702, CVE-2023-28703, CVE-2023-31195, CVE-2022-46871, CVE-2022-38105, CVE-2022-35401, CVE-2018-1160, CVE-2022-38393, CVE-2022-26376.\n\n\u0412 \u0441\u043f\u0438\u0441\u043e\u043a \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432\u0445\u043e\u0434\u044f\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043c\u043e\u0434\u0435\u043b\u0438: GT6, GT-AXE16000, GT-AX11000 PRO, GT-AX6000, GT-AX11000, GS-AX5400, GS-AX3000, XT9, XT8, XT8 V2, RT-AX86U PRO, RT-AX86U, RT-AX86S, RT-AX82U, RT-AX58U, RT-AX3000, TUF-AX6000 \u0438 TUF-AX5400.\n\nhttps://www.asus.com/content/asus-product-security-advisory/#:~:text=06/19/2023%20New%20firmware%20with%20accumulate%20security%20updates\n\n\u270b @Russian_OSINT", "creation_timestamp": "2023-06-21T14:27:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/52240c30-9b74-4e0d-89f1-d12105858697/export"/>
    <published>2023-06-21T14:27:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/91bf5809-bbb2-45de-a1f5-c17ee75afdbb/export</id>
    <title>91bf5809-bbb2-45de-a1f5-c17ee75afdbb</title>
    <updated>2026-05-04T06:51:16.557290+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "91bf5809-bbb2-45de-a1f5-c17ee75afdbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28709", "type": "seen", "source": "https://t.me/true_secator/4880", "content": "\u0412 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 Atlassian \u0438 ISC BIND \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0434\u043b\u044f DoS  \u0438 RCE.\n\n\u0410\u0432\u0441\u0442\u0440\u0430\u043b\u0438\u0439\u0441\u043a\u0438\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u041f\u041e \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u0432 \u043d\u043e\u0432\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0447\u0435\u0442\u044b\u0440\u0435\u0445 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u043e\u0448\u0438\u0431\u043e\u043a \u0432 Jira, Confluence, Bitbucket \u0438 Bamboo.\n\n\u0421\u0430\u043c\u0430\u044f \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0430\u044f \u0438\u0437 \u044d\u0442\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c CVE-2023-22513\u00a0(CVSS: 8,5) \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c RCE \u0432 Bitbucket. \u0410\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0431\u0435\u0437 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0432 Bitbucket \u0432\u0435\u0440\u0441\u0438\u0438 8.0.0 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u0432 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 8.14.0.\n\n\u0412\u0442\u043e\u0440\u0430\u044f CVE-2023-22512 (CVSS 7,5) - \u044d\u0442\u043e DoS-\u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Confluence Data Center \u0438 Server (\u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 \u0432\u0435\u0440\u0441\u0438\u0438 5.6 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u044b\u043f\u0443\u0441\u043a\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430 \u0434\u043e 8.5.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e). \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u043f\u0440\u0435\u0442\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c, \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u0438\u043b\u0438 \u043d\u0430 \u043d\u0435\u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0439 \u0441\u0440\u043e\u043a \u043d\u0430\u0440\u0443\u0448\u0430\u044f \u0440\u0430\u0431\u043e\u0442\u0443 \u0441\u043b\u0443\u0436\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0433\u043e \u0445\u043e\u0441\u0442\u0430, \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u043e\u0433\u043e \u043a \u0441\u0435\u0442\u0438.\n\nCVE-2023-28709 (CVSS 7,5), \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a DoS-\u043e\u0448\u0438\u0431\u043a\u0430 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 Apache Tomcat, \u0432\u043b\u0438\u044f\u044e\u0449\u0430\u044f \u043d\u0430 Bamboo. \u041f\u0440\u0438\u0447\u0435\u043c \u0432 Apache Tomcat \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u043f\u043e\u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u0440\u0443\u0433\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, CVE-2023-24998, \u0431\u044b\u043b\u043e \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u043c.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0435 \u0434\u043b\u044f Jira, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442\u00a0CVE-2022-25647\u00a0(CVSS 7,5), \u043e\u0448\u0438\u0431\u043a\u0443 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u043f\u0430\u043a\u0435\u0442\u0435 Google Gson, \u0432\u043b\u0438\u044f\u044e\u0449\u0443\u044e \u043d\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0432 Jira Service Management.\n\n\u0414\u0432\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b ISC \u0432 Berkeley Internet Name Domain 9 (BIND).\n\nCVE-2023-3341\u00a0(CVSS: 7,5) \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u0443 \u0438\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u044f \u0441\u0442\u0435\u043a\u0430 \u0432 \u043a\u043e\u0434\u0435 \u043a\u0430\u043d\u0430\u043b\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044e \u0440\u0430\u0431\u043e\u0442\u044b \u043c\u0435\u0442\u043e\u0434\u0430 Name (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 9.16.44, 9.18.19, 9.19.17, 9.16.44-S1 \u0438 9.18, 19-S1).\n\n\u0414\u0440\u0443\u0433\u0430\u044f CVE-2023-4236\u00a0(CVSS: 7,5) - \u044d\u0442\u043e \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u0441\u0435\u0442\u0435\u0432\u043e\u043c \u043a\u043e\u0434\u0435, \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0435\u043c \u0437\u0430\u043f\u0440\u043e\u0441\u044b DNS-over-TLS, \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044e named. \u042d\u0442\u043e \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u0442, \u043a\u043e\u0433\u0434\u0430 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043f\u0440\u0438 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 9.18.19 \u0438 9.18.19-S1).\n\n\u0414\u0430\u043d\u043d\u044b\u0445 \u043e\u0431 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0437\u043b\u043e\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f.", "creation_timestamp": "2023-09-22T14:38:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/91bf5809-bbb2-45de-a1f5-c17ee75afdbb/export"/>
    <published>2023-09-22T14:38:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/49912242-977a-47a6-82c5-dcdb9fc0884c/export</id>
    <title>49912242-977a-47a6-82c5-dcdb9fc0884c</title>
    <updated>2026-05-04T06:51:16.557237+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "49912242-977a-47a6-82c5-dcdb9fc0884c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28700", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/758", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28700\n\ud83d\udd39 Description: OMICARD EDM backend system\u2019s file uploading function does not restrict upload of file with dangerous type. A local area network attacker with administrator privileges can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-01-08T18:00:10.567Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-7144-b7536-1.html", "creation_timestamp": "2025-01-08T18:16:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/49912242-977a-47a6-82c5-dcdb9fc0884c/export"/>
    <published>2025-01-08T18:16:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/83e01da4-2d6f-484a-8a7f-9fa05dff2345/export</id>
    <title>83e01da4-2d6f-484a-8a7f-9fa05dff2345</title>
    <updated>2026-05-04T06:51:16.557184+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "83e01da4-2d6f-484a-8a7f-9fa05dff2345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28702", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/804", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28702\n\ud83d\udd39 Description: ASUS RT-AC86U does not filter special characters for parameters in specific web URLs. A remote attacker with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands, disrupt system or terminate service.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-01-08T20:08:43.251Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-7146-ef92a-1.html", "creation_timestamp": "2025-01-08T20:13:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/83e01da4-2d6f-484a-8a7f-9fa05dff2345/export"/>
    <published>2025-01-08T20:13:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/93f63deb-405b-4865-871b-b4cb1f29339b/export</id>
    <title>93f63deb-405b-4865-871b-b4cb1f29339b</title>
    <updated>2026-05-04T06:51:16.557124+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "93f63deb-405b-4865-871b-b4cb1f29339b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28703", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/805", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28703\n\ud83d\udd39 Description: ASUS RT-AC86U\u2019s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-01-08T20:07:01.013Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-7147-afcf9-1.html", "creation_timestamp": "2025-01-08T20:13:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/93f63deb-405b-4865-871b-b4cb1f29339b/export"/>
    <published>2025-01-08T20:13:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/94efe5c4-6a5c-48c7-be7e-72c8e43de27e/export</id>
    <title>94efe5c4-6a5c-48c7-be7e-72c8e43de27e</title>
    <updated>2026-05-04T06:51:16.557040+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "94efe5c4-6a5c-48c7-be7e-72c8e43de27e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28704", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/806", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28704\n\ud83d\udd39 Description: Furbo dog camera has insufficient filtering for special parameter of device log management function. An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands or disrupt service.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-01-08T20:06:26.172Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-7153-68f52-1.html", "creation_timestamp": "2025-01-08T20:13:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/94efe5c4-6a5c-48c7-be7e-72c8e43de27e/export"/>
    <published>2025-01-08T20:13:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7ac9b038-2e7f-4f5f-907c-2879cccefeee/export</id>
    <title>7ac9b038-2e7f-4f5f-907c-2879cccefeee</title>
    <updated>2026-05-04T06:51:16.556869+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7ac9b038-2e7f-4f5f-907c-2879cccefeee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28705", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/810", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28705\n\ud83d\udd39 Description: Openfind Mail2000 has insufficient filtering special characters of email content of its content filtering function. A remote attacker can exploit this vulnerability using phishing emails that contain malicious web pages injected with JavaScript. When users access the system and open the email, it triggers an XSS (Reflected Cross-site scripting) attack.\n\ud83d\udccf Published: 2023-06-02T00:00:00\n\ud83d\udccf Modified: 2025-01-08T20:02:33.928Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-7158-751a6-1.html", "creation_timestamp": "2025-01-08T20:13:47.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7ac9b038-2e7f-4f5f-907c-2879cccefeee/export"/>
    <published>2025-01-08T20:13:47+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3a8a7a2c-0ea8-4547-9708-4afe41d463c0/export</id>
    <title>3a8a7a2c-0ea8-4547-9708-4afe41d463c0</title>
    <updated>2026-05-04T06:51:16.556610+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3a8a7a2c-0ea8-4547-9708-4afe41d463c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28708", "type": "seen", "source": "Telegram/WiynqZzT25YcTi3tLk0pE9kzMZQcA5M2annVh5CrF4lbPwBi", "content": "", "creation_timestamp": "2025-02-14T10:06:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3a8a7a2c-0ea8-4547-9708-4afe41d463c0/export"/>
    <published>2025-02-14T10:06:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b943724f-43ff-4f4c-b22c-5828fe24d7d1/export</id>
    <title>b943724f-43ff-4f4c-b22c-5828fe24d7d1</title>
    <updated>2026-05-04T06:51:16.553963+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b943724f-43ff-4f4c-b22c-5828fe24d7d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28708", "type": "seen", "source": "Telegram/__Oj8sKmo5j8U5anwivnRpoVYPskEI7N_i0_TOfd1PPyUdvk", "content": "", "creation_timestamp": "2025-02-14T10:08:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b943724f-43ff-4f4c-b22c-5828fe24d7d1/export"/>
    <published>2025-02-14T10:08:09+00:00</published>
  </entry>
</feed>
