<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:19:40 +0000</lastBuildDate>
    <item>
      <title>2435f25d-767e-4e96-b825-73ddf6809b44</title>
      <link>https://vulnerability.circl.lu/sighting/2435f25d-767e-4e96-b825-73ddf6809b44/export</link>
      <description>{"uuid": "2435f25d-767e-4e96-b825-73ddf6809b44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32229", "type": "seen", "source": "https://t.me/cibsecurity/65260", "content": "\u203c CVE-2023-32229 \u203c\n\nDue to an error in the software interface to the secure element chip on Bosch IP cameras of family CPP13 and CPP14, the chip can be permanently damaged when enabling the Stream security option (signing of the video stream) with option MD5, SHA-1 or SHA-256.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-15T14:26:30.000000Z"}</description>
      <content:encoded>{"uuid": "2435f25d-767e-4e96-b825-73ddf6809b44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32229", "type": "seen", "source": "https://t.me/cibsecurity/65260", "content": "\u203c CVE-2023-32229 \u203c\n\nDue to an error in the software interface to the secure element chip on Bosch IP cameras of family CPP13 and CPP14, the chip can be permanently damaged when enabling the Stream security option (signing of the video stream) with option MD5, SHA-1 or SHA-256.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-15T14:26:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2435f25d-767e-4e96-b825-73ddf6809b44/export</guid>
      <pubDate>Thu, 15 Jun 2023 14:26:30 +0000</pubDate>
    </item>
    <item>
      <title>1e729a22-bf8f-4b9e-82f3-67220eb241d2</title>
      <link>https://vulnerability.circl.lu/sighting/1e729a22-bf8f-4b9e-82f3-67220eb241d2/export</link>
      <description>{"uuid": "1e729a22-bf8f-4b9e-82f3-67220eb241d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32224", "type": "seen", "source": "https://t.me/cibsecurity/65690", "content": "\u203c CVE-2023-32224 \u203c\n\nD-Link DSL-224 firmware version 3.0.10 CWE-307: Improper Restriction of Excessive Authentication Attempts\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T00:13:28.000000Z"}</description>
      <content:encoded>{"uuid": "1e729a22-bf8f-4b9e-82f3-67220eb241d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32224", "type": "seen", "source": "https://t.me/cibsecurity/65690", "content": "\u203c CVE-2023-32224 \u203c\n\nD-Link DSL-224 firmware version 3.0.10 CWE-307: Improper Restriction of Excessive Authentication Attempts\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T00:13:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1e729a22-bf8f-4b9e-82f3-67220eb241d2/export</guid>
      <pubDate>Thu, 29 Jun 2023 00:13:28 +0000</pubDate>
    </item>
    <item>
      <title>c3505bef-16e2-4a94-969d-a899471f506d</title>
      <link>https://vulnerability.circl.lu/sighting/c3505bef-16e2-4a94-969d-a899471f506d/export</link>
      <description>{"uuid": "c3505bef-16e2-4a94-969d-a899471f506d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32222", "type": "seen", "source": "https://t.me/cibsecurity/65697", "content": "\u203c CVE-2023-32222 \u203c\n\nD-Link DSL-G256DG version vBZ_1.00.27 web management interface allows authentication bypass via an unspecified method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T00:13:38.000000Z"}</description>
      <content:encoded>{"uuid": "c3505bef-16e2-4a94-969d-a899471f506d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32222", "type": "seen", "source": "https://t.me/cibsecurity/65697", "content": "\u203c CVE-2023-32222 \u203c\n\nD-Link DSL-G256DG version vBZ_1.00.27 web management interface allows authentication bypass via an unspecified method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-29T00:13:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c3505bef-16e2-4a94-969d-a899471f506d/export</guid>
      <pubDate>Thu, 29 Jun 2023 00:13:38 +0000</pubDate>
    </item>
    <item>
      <title>66d5d514-c577-470d-b167-e381f8d08f68</title>
      <link>https://vulnerability.circl.lu/sighting/66d5d514-c577-470d-b167-e381f8d08f68/export</link>
      <description>{"uuid": "66d5d514-c577-470d-b167-e381f8d08f68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32227", "type": "seen", "source": "https://t.me/cibsecurity/67420", "content": "\u203c CVE-2023-32227 \u203c\n\nSynel SYnergy Fingerprint Terminals - CWE-798: Use of Hard-coded Credentials\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-30T12:30:52.000000Z"}</description>
      <content:encoded>{"uuid": "66d5d514-c577-470d-b167-e381f8d08f68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32227", "type": "seen", "source": "https://t.me/cibsecurity/67420", "content": "\u203c CVE-2023-32227 \u203c\n\nSynel SYnergy Fingerprint Terminals - CWE-798: Use of Hard-coded Credentials\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-30T12:30:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/66d5d514-c577-470d-b167-e381f8d08f68/export</guid>
      <pubDate>Sun, 30 Jul 2023 12:30:52 +0000</pubDate>
    </item>
    <item>
      <title>d4936170-23f5-4c0a-a227-c34c7366dd51</title>
      <link>https://vulnerability.circl.lu/sighting/d4936170-23f5-4c0a-a227-c34c7366dd51/export</link>
      <description>{"uuid": "d4936170-23f5-4c0a-a227-c34c7366dd51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32226", "type": "seen", "source": "https://t.me/cibsecurity/67421", "content": "\u203c CVE-2023-32226 \u203c\n\nSysaid - CWE-552: Files or Directories Accessible to External Parties -\u00c2\u00a0Authenticated users may exfiltrate files from the server via an unspecified method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-30T12:30:52.000000Z"}</description>
      <content:encoded>{"uuid": "d4936170-23f5-4c0a-a227-c34c7366dd51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32226", "type": "seen", "source": "https://t.me/cibsecurity/67421", "content": "\u203c CVE-2023-32226 \u203c\n\nSysaid - CWE-552: Files or Directories Accessible to External Parties -\u00c2\u00a0Authenticated users may exfiltrate files from the server via an unspecified method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-30T12:30:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d4936170-23f5-4c0a-a227-c34c7366dd51/export</guid>
      <pubDate>Sun, 30 Jul 2023 12:30:52 +0000</pubDate>
    </item>
    <item>
      <title>bc84cc38-1da3-4a87-9ae8-15e158fa6a70</title>
      <link>https://vulnerability.circl.lu/sighting/bc84cc38-1da3-4a87-9ae8-15e158fa6a70/export</link>
      <description>{"uuid": "bc84cc38-1da3-4a87-9ae8-15e158fa6a70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32225", "type": "seen", "source": "https://t.me/cibsecurity/67422", "content": "\u203c CVE-2023-32225 \u203c\n\nSysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -\u00c2\u00a0A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-30T12:30:53.000000Z"}</description>
      <content:encoded>{"uuid": "bc84cc38-1da3-4a87-9ae8-15e158fa6a70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32225", "type": "seen", "source": "https://t.me/cibsecurity/67422", "content": "\u203c CVE-2023-32225 \u203c\n\nSysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -\u00c2\u00a0A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-30T12:30:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bc84cc38-1da3-4a87-9ae8-15e158fa6a70/export</guid>
      <pubDate>Sun, 30 Jul 2023 12:30:53 +0000</pubDate>
    </item>
    <item>
      <title>641e5cdd-d1a5-46cb-acf4-f2b8f8c7f67f</title>
      <link>https://vulnerability.circl.lu/sighting/641e5cdd-d1a5-46cb-acf4-f2b8f8c7f67f/export</link>
      <description>{"uuid": "641e5cdd-d1a5-46cb-acf4-f2b8f8c7f67f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3222", "type": "seen", "source": "https://t.me/cibsecurity/69790", "content": "\u203c CVE-2023-3222 \u203c\n\nVulnerability in the password recovery mechanism of Password Recovery plugin for Roundcube, in its 1.2 version, which could allow a remote attacker to change an existing user\u00c2\u00b4s password by adding a 6-digit numeric token. An attacker could create an automatic script to test all possible values because the platform has no limit on the number of requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T16:16:37.000000Z"}</description>
      <content:encoded>{"uuid": "641e5cdd-d1a5-46cb-acf4-f2b8f8c7f67f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3222", "type": "seen", "source": "https://t.me/cibsecurity/69790", "content": "\u203c CVE-2023-3222 \u203c\n\nVulnerability in the password recovery mechanism of Password Recovery plugin for Roundcube, in its 1.2 version, which could allow a remote attacker to change an existing user\u00c2\u00b4s password by adding a 6-digit numeric token. An attacker could create an automatic script to test all possible values because the platform has no limit on the number of requests.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-04T16:16:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/641e5cdd-d1a5-46cb-acf4-f2b8f8c7f67f/export</guid>
      <pubDate>Mon, 04 Sep 2023 16:16:37 +0000</pubDate>
    </item>
  </channel>
</rss>
