<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 23:59:48 +0000</lastBuildDate>
    <item>
      <title>968f47a6-ee47-4e1b-9433-6ecf162ef515</title>
      <link>https://vulnerability.circl.lu/sighting/968f47a6-ee47-4e1b-9433-6ecf162ef515/export</link>
      <description>{"uuid": "968f47a6-ee47-4e1b-9433-6ecf162ef515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9287", "type": "seen", "source": "https://t.me/cibsecurity/4276", "content": "ATENTION\u203c New - CVE-2015-9287\n\nDirectory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field (\"kid\") of the IdP's HTTP response message (\"WLS-Response\") can be manipulated by an attacker. The \"kid\" field is not signed like the rest of the message, and manipulation is therefore trivial. The \"kid\" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-13T20:31:41.000000Z"}</description>
      <content:encoded>{"uuid": "968f47a6-ee47-4e1b-9433-6ecf162ef515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9287", "type": "seen", "source": "https://t.me/cibsecurity/4276", "content": "ATENTION\u203c New - CVE-2015-9287\n\nDirectory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field (\"kid\") of the IdP's HTTP response message (\"WLS-Response\") can be manipulated by an attacker. The \"kid\" field is not signed like the rest of the message, and manipulation is therefore trivial. The \"kid\" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-13T20:31:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/968f47a6-ee47-4e1b-9433-6ecf162ef515/export</guid>
      <pubDate>Mon, 13 May 2019 20:31:41 +0000</pubDate>
    </item>
    <item>
      <title>880ce671-891d-436a-a624-c8573cc3b0ca</title>
      <link>https://vulnerability.circl.lu/sighting/880ce671-891d-436a-a624-c8573cc3b0ca/export</link>
      <description>{"uuid": "880ce671-891d-436a-a624-c8573cc3b0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9287", "type": "seen", "source": "https://t.me/cibsecurity/4387", "content": "ATENTION\u203c New - CVE-2015-9287 (the_university_of_cambridge_web_authentication_system_apache_authentication_agent)\n\nDirectory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field (\"kid\") of the IdP's HTTP response message (\"WLS-Response\") can be manipulated by an attacker. The \"kid\" field is not signed like the rest of the message, and manipulation is therefore trivial. The \"kid\" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-20T16:30:32.000000Z"}</description>
      <content:encoded>{"uuid": "880ce671-891d-436a-a624-c8573cc3b0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9287", "type": "seen", "source": "https://t.me/cibsecurity/4387", "content": "ATENTION\u203c New - CVE-2015-9287 (the_university_of_cambridge_web_authentication_system_apache_authentication_agent)\n\nDirectory Traversal was discovered in University of Cambridge mod_ucam_webauth before 2.0.2. The key identification field (\"kid\") of the IdP's HTTP response message (\"WLS-Response\") can be manipulated by an attacker. The \"kid\" field is not signed like the rest of the message, and manipulation is therefore trivial. The \"kid\" field should only ever represent an integer. However, it is possible to provide any string value. An attacker could use this to their advantage to force the application agent to load the RSA public key required for message integrity checking from an unintended location.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-20T16:30:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/880ce671-891d-436a-a624-c8573cc3b0ca/export</guid>
      <pubDate>Mon, 20 May 2019 16:30:32 +0000</pubDate>
    </item>
  </channel>
</rss>
