<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:11:52.978792+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2435f25d-767e-4e96-b825-73ddf6809b44/export</id>
    <title>2435f25d-767e-4e96-b825-73ddf6809b44</title>
    <updated>2026-05-06T10:11:53.337617+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2435f25d-767e-4e96-b825-73ddf6809b44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32229", "type": "seen", "source": "https://t.me/cibsecurity/65260", "content": "\u203c CVE-2023-32229 \u203c\n\nDue to an error in the software interface to the secure element chip on Bosch IP cameras of family CPP13 and CPP14, the chip can be permanently damaged when enabling the Stream security option (signing of the video stream) with option MD5, SHA-1 or SHA-256.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-15T14:26:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2435f25d-767e-4e96-b825-73ddf6809b44/export"/>
    <published>2023-06-15T14:26:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1e729a22-bf8f-4b9e-82f3-67220eb241d2/export</id>
    <title>1e729a22-bf8f-4b9e-82f3-67220eb241d2</title>
    <updated>2026-05-06T10:11:53.337535+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1e729a22-bf8f-4b9e-82f3-67220eb241d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32224", "type": "seen", "source": "https://t.me/cibsecurity/65690", "content": "\u203c CVE-2023-32224 \u203c\n\nD-Link DSL-224 firmware version 3.0.10 CWE-307: Improper Restriction of Excessive Authentication Attempts\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T00:13:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1e729a22-bf8f-4b9e-82f3-67220eb241d2/export"/>
    <published>2023-06-29T00:13:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c3505bef-16e2-4a94-969d-a899471f506d/export</id>
    <title>c3505bef-16e2-4a94-969d-a899471f506d</title>
    <updated>2026-05-06T10:11:53.337456+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c3505bef-16e2-4a94-969d-a899471f506d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32222", "type": "seen", "source": "https://t.me/cibsecurity/65697", "content": "\u203c CVE-2023-32222 \u203c\n\nD-Link DSL-G256DG version vBZ_1.00.27 web management interface allows authentication bypass via an unspecified method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T00:13:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c3505bef-16e2-4a94-969d-a899471f506d/export"/>
    <published>2023-06-29T00:13:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/66d5d514-c577-470d-b167-e381f8d08f68/export</id>
    <title>66d5d514-c577-470d-b167-e381f8d08f68</title>
    <updated>2026-05-06T10:11:53.337378+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "66d5d514-c577-470d-b167-e381f8d08f68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32227", "type": "seen", "source": "https://t.me/cibsecurity/67420", "content": "\u203c CVE-2023-32227 \u203c\n\nSynel SYnergy Fingerprint Terminals - CWE-798: Use of Hard-coded Credentials\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-30T12:30:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/66d5d514-c577-470d-b167-e381f8d08f68/export"/>
    <published>2023-07-30T12:30:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d4936170-23f5-4c0a-a227-c34c7366dd51/export</id>
    <title>d4936170-23f5-4c0a-a227-c34c7366dd51</title>
    <updated>2026-05-06T10:11:53.337297+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d4936170-23f5-4c0a-a227-c34c7366dd51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32226", "type": "seen", "source": "https://t.me/cibsecurity/67421", "content": "\u203c CVE-2023-32226 \u203c\n\nSysaid - CWE-552: Files or Directories Accessible to External Parties -\u00c2\u00a0Authenticated users may exfiltrate files from the server via an unspecified method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-30T12:30:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d4936170-23f5-4c0a-a227-c34c7366dd51/export"/>
    <published>2023-07-30T12:30:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bc84cc38-1da3-4a87-9ae8-15e158fa6a70/export</id>
    <title>bc84cc38-1da3-4a87-9ae8-15e158fa6a70</title>
    <updated>2026-05-06T10:11:53.337183+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bc84cc38-1da3-4a87-9ae8-15e158fa6a70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32225", "type": "seen", "source": "https://t.me/cibsecurity/67422", "content": "\u203c CVE-2023-32225 \u203c\n\nSysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -\u00c2\u00a0A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-30T12:30:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bc84cc38-1da3-4a87-9ae8-15e158fa6a70/export"/>
    <published>2023-07-30T12:30:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/641e5cdd-d1a5-46cb-acf4-f2b8f8c7f67f/export</id>
    <title>641e5cdd-d1a5-46cb-acf4-f2b8f8c7f67f</title>
    <updated>2026-05-06T10:11:53.335728+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "641e5cdd-d1a5-46cb-acf4-f2b8f8c7f67f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3222", "type": "seen", "source": "https://t.me/cibsecurity/69790", "content": "\u203c CVE-2023-3222 \u203c\n\nVulnerability in the password recovery mechanism of Password Recovery plugin for Roundcube, in its 1.2 version, which could allow a remote attacker to change an existing user\u00c2\u00b4s password by adding a 6-digit numeric token. An attacker could create an automatic script to test all possible values because the platform has no limit on the number of requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T16:16:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/641e5cdd-d1a5-46cb-acf4-f2b8f8c7f67f/export"/>
    <published>2023-09-04T16:16:37+00:00</published>
  </entry>
</feed>
