<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:02:17.747345+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b7cc88a9-b2be-4550-9e47-fab92aae45d6/export</id>
    <title>b7cc88a9-b2be-4550-9e47-fab92aae45d6</title>
    <updated>2026-05-06T09:02:18.077746+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b7cc88a9-b2be-4550-9e47-fab92aae45d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34923", "type": "seen", "source": "https://t.me/cibsecurity/65432", "content": "\u203c CVE-2023-34923 \u203c\n\nXML Signature Wrapping (XSW) in SAML-based Single Sign-on feature in TOPdesk v12.10.12 allows bad actors with credentials to authenticate with the Identity Provider (IP) to impersonate any TOPdesk user via SAML Response manipulation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-22T22:32:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b7cc88a9-b2be-4550-9e47-fab92aae45d6/export"/>
    <published>2023-06-22T22:32:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/61865409-05d5-44be-9fb5-5f6601139c57/export</id>
    <title>61865409-05d5-44be-9fb5-5f6601139c57</title>
    <updated>2026-05-06T09:02:18.077623+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "61865409-05d5-44be-9fb5-5f6601139c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34928", "type": "seen", "source": "https://t.me/cibsecurity/65609", "content": "\u203c CVE-2023-34928 \u203c\n\nA stack overflow in the Edit_BasicSSID function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T18:12:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/61865409-05d5-44be-9fb5-5f6601139c57/export"/>
    <published>2023-06-28T18:12:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1eb65bad-6f26-4fa5-93cf-4b73526bec02/export</id>
    <title>1eb65bad-6f26-4fa5-93cf-4b73526bec02</title>
    <updated>2026-05-06T09:02:18.077451+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1eb65bad-6f26-4fa5-93cf-4b73526bec02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34929", "type": "seen", "source": "https://t.me/cibsecurity/65619", "content": "\u203c CVE-2023-34929 \u203c\n\nA stack overflow in the AddMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T18:13:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1eb65bad-6f26-4fa5-93cf-4b73526bec02/export"/>
    <published>2023-06-28T18:13:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/87ad12c3-698a-4988-a51c-6bc2f53c49ef/export</id>
    <title>87ad12c3-698a-4988-a51c-6bc2f53c49ef</title>
    <updated>2026-05-06T09:02:18.074523+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "87ad12c3-698a-4988-a51c-6bc2f53c49ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3492", "type": "seen", "source": "https://t.me/cibsecurity/67875", "content": "\u203c CVE-2023-3492 \u203c\n\nThe WP Shopping Pages WordPress plugin through 1.14 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-07T18:13:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/87ad12c3-698a-4988-a51c-6bc2f53c49ef/export"/>
    <published>2023-08-07T18:13:46+00:00</published>
  </entry>
</feed>
