<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:30:14.287430+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/03d142a5-5822-4ef3-a409-fce7f20955a5/export</id>
    <title>03d142a5-5822-4ef3-a409-fce7f20955a5</title>
    <updated>2026-05-04T10:30:14.655664+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "03d142a5-5822-4ef3-a409-fce7f20955a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46382", "type": "seen", "source": "https://t.me/cibsecurity/73556", "content": "\u203c CVE-2023-46382 \u203c\n\nLOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices use cleartext HTTP for login.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-05T01:24:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/03d142a5-5822-4ef3-a409-fce7f20955a5/export"/>
    <published>2023-11-05T01:24:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/037d692a-69ac-4a08-bc51-4c364452f0e3/export</id>
    <title>037d692a-69ac-4a08-bc51-4c364452f0e3</title>
    <updated>2026-05-04T10:30:14.655585+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "037d692a-69ac-4a08-bc51-4c364452f0e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46386", "type": "seen", "source": "https://t.me/ctinow/155621", "content": "https://ift.tt/ue5oqZ2\nCVE-2023-46386 | LOYTEC LINX-151/LINX-212 SMTP Client registry.xml credentials storage (ID 175952)", "creation_timestamp": "2023-12-17T15:11:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/037d692a-69ac-4a08-bc51-4c364452f0e3/export"/>
    <published>2023-12-17T15:11:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/68437ab1-3e32-4972-bcd0-c232d9e4aab5/export</id>
    <title>68437ab1-3e32-4972-bcd0-c232d9e4aab5</title>
    <updated>2026-05-04T10:30:14.655503+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "68437ab1-3e32-4972-bcd0-c232d9e4aab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46387", "type": "seen", "source": "https://t.me/ctinow/155622", "content": "https://ift.tt/LQrnFiD\nCVE-2023-46387 | LOYTEC LINX-151/LINX-212 File Download API dpal_config.zml information disclosure (ID 175952)", "creation_timestamp": "2023-12-17T15:11:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/68437ab1-3e32-4972-bcd0-c232d9e4aab5/export"/>
    <published>2023-12-17T15:11:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6f943c16-4e12-44c7-9374-77d3495cdcaf/export</id>
    <title>6f943c16-4e12-44c7-9374-77d3495cdcaf</title>
    <updated>2026-05-04T10:30:14.655418+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6f943c16-4e12-44c7-9374-77d3495cdcaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46388", "type": "seen", "source": "https://t.me/ctinow/155623", "content": "https://ift.tt/JRmE14u\nCVE-2023-46388 | LOYTEC LINX-151/LINX-212 SMTP Client dpal_config.wbx credentials storage (ID 175952)", "creation_timestamp": "2023-12-17T15:11:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6f943c16-4e12-44c7-9374-77d3495cdcaf/export"/>
    <published>2023-12-17T15:11:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9dadc934-51a4-400d-bd0f-b1ac5cd1bd22/export</id>
    <title>9dadc934-51a4-400d-bd0f-b1ac5cd1bd22</title>
    <updated>2026-05-04T10:30:14.655333+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9dadc934-51a4-400d-bd0f-b1ac5cd1bd22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46389", "type": "seen", "source": "https://t.me/ctinow/155624", "content": "https://ift.tt/zxSP264\nCVE-2023-46389 | LOYTEC LINX-151/LINX-212 File Download API /tmp/registry.xml information disclosure (ID 175952)", "creation_timestamp": "2023-12-17T15:11:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9dadc934-51a4-400d-bd0f-b1ac5cd1bd22/export"/>
    <published>2023-12-17T15:11:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/95219941-631f-4404-b970-65ab4f5ab4b8/export</id>
    <title>95219941-631f-4404-b970-65ab4f5ab4b8</title>
    <updated>2026-05-04T10:30:14.655240+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "95219941-631f-4404-b970-65ab4f5ab4b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46383", "type": "seen", "source": "https://t.me/ctinow/155626", "content": "https://ift.tt/rV1eMUc\nCVE-2023-46383 | LOYTEC LINX Configurator 7.4.10 cleartext transmission (ID 175951)", "creation_timestamp": "2023-12-17T15:47:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/95219941-631f-4404-b970-65ab4f5ab4b8/export"/>
    <published>2023-12-17T15:47:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c6a90f0-71e6-4328-8580-ca08e72f2716/export</id>
    <title>3c6a90f0-71e6-4328-8580-ca08e72f2716</title>
    <updated>2026-05-04T10:30:14.655161+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c6a90f0-71e6-4328-8580-ca08e72f2716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46384", "type": "seen", "source": "https://t.me/ctinow/155627", "content": "https://ift.tt/5s6pOGc\nCVE-2023-46384 | LOYTEC LINX Configurator 7.4.10 cleartext storage in the registry (ID 175951)", "creation_timestamp": "2023-12-17T15:47:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c6a90f0-71e6-4328-8580-ca08e72f2716/export"/>
    <published>2023-12-17T15:47:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8b564e10-21d1-49ed-8c9f-a96cd5455702/export</id>
    <title>8b564e10-21d1-49ed-8c9f-a96cd5455702</title>
    <updated>2026-05-04T10:30:14.655066+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8b564e10-21d1-49ed-8c9f-a96cd5455702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46385", "type": "seen", "source": "https://t.me/ctinow/155628", "content": "https://ift.tt/mM4Xa5T\nCVE-2023-46385 | LOYTEC LINX Configurator 7.4.10 password cleartext transmission (ID 175951)", "creation_timestamp": "2023-12-17T15:47:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8b564e10-21d1-49ed-8c9f-a96cd5455702/export"/>
    <published>2023-12-17T15:47:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c0f631f2-654e-4e0a-85aa-7a856c619fbd/export</id>
    <title>c0f631f2-654e-4e0a-85aa-7a856c619fbd</title>
    <updated>2026-05-04T10:30:14.654938+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c0f631f2-654e-4e0a-85aa-7a856c619fbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46381", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14217", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46381\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.\n\ud83d\udccf Published: 2023-11-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T03:55:35.812Z\n\ud83d\udd17 References:\n1. https://seclists.org/fulldisclosure/2023/Nov/0\n2. http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html\n3. https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/\n4. https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01", "creation_timestamp": "2025-05-01T04:14:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c0f631f2-654e-4e0a-85aa-7a856c619fbd/export"/>
    <published>2025-05-01T04:14:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1eb18eeb-06ce-433e-b4e7-89f205261137/export</id>
    <title>1eb18eeb-06ce-433e-b4e7-89f205261137</title>
    <updated>2026-05-04T10:30:14.652954+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1eb18eeb-06ce-433e-b4e7-89f205261137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46380", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14218", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46380\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) send password-change requests via cleartext HTTP.\n\ud83d\udccf Published: 2023-11-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T03:55:35.497Z\n\ud83d\udd17 References:\n1. https://seclists.org/fulldisclosure/2023/Nov/0\n2. http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html\n3. https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/\n4. https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01", "creation_timestamp": "2025-05-01T04:14:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1eb18eeb-06ce-433e-b4e7-89f205261137/export"/>
    <published>2025-05-01T04:14:30+00:00</published>
  </entry>
</feed>
