<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 22:49:17 +0000</lastBuildDate>
    <item>
      <title>b7cc88a9-b2be-4550-9e47-fab92aae45d6</title>
      <link>https://vulnerability.circl.lu/sighting/b7cc88a9-b2be-4550-9e47-fab92aae45d6/export</link>
      <description>{"uuid": "b7cc88a9-b2be-4550-9e47-fab92aae45d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34923", "type": "seen", "source": "https://t.me/cibsecurity/65432", "content": "\u203c CVE-2023-34923 \u203c\n\nXML Signature Wrapping (XSW) in SAML-based Single Sign-on feature in TOPdesk v12.10.12 allows bad actors with credentials to authenticate with the Identity Provider (IP) to impersonate any TOPdesk user via SAML Response manipulation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-22T22:32:15.000000Z"}</description>
      <content:encoded>{"uuid": "b7cc88a9-b2be-4550-9e47-fab92aae45d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34923", "type": "seen", "source": "https://t.me/cibsecurity/65432", "content": "\u203c CVE-2023-34923 \u203c\n\nXML Signature Wrapping (XSW) in SAML-based Single Sign-on feature in TOPdesk v12.10.12 allows bad actors with credentials to authenticate with the Identity Provider (IP) to impersonate any TOPdesk user via SAML Response manipulation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-22T22:32:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b7cc88a9-b2be-4550-9e47-fab92aae45d6/export</guid>
      <pubDate>Thu, 22 Jun 2023 22:32:15 +0000</pubDate>
    </item>
    <item>
      <title>61865409-05d5-44be-9fb5-5f6601139c57</title>
      <link>https://vulnerability.circl.lu/sighting/61865409-05d5-44be-9fb5-5f6601139c57/export</link>
      <description>{"uuid": "61865409-05d5-44be-9fb5-5f6601139c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34928", "type": "seen", "source": "https://t.me/cibsecurity/65609", "content": "\u203c CVE-2023-34928 \u203c\n\nA stack overflow in the Edit_BasicSSID function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T18:12:59.000000Z"}</description>
      <content:encoded>{"uuid": "61865409-05d5-44be-9fb5-5f6601139c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34928", "type": "seen", "source": "https://t.me/cibsecurity/65609", "content": "\u203c CVE-2023-34928 \u203c\n\nA stack overflow in the Edit_BasicSSID function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T18:12:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/61865409-05d5-44be-9fb5-5f6601139c57/export</guid>
      <pubDate>Wed, 28 Jun 2023 18:12:59 +0000</pubDate>
    </item>
    <item>
      <title>1eb65bad-6f26-4fa5-93cf-4b73526bec02</title>
      <link>https://vulnerability.circl.lu/sighting/1eb65bad-6f26-4fa5-93cf-4b73526bec02/export</link>
      <description>{"uuid": "1eb65bad-6f26-4fa5-93cf-4b73526bec02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34929", "type": "seen", "source": "https://t.me/cibsecurity/65619", "content": "\u203c CVE-2023-34929 \u203c\n\nA stack overflow in the AddMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T18:13:14.000000Z"}</description>
      <content:encoded>{"uuid": "1eb65bad-6f26-4fa5-93cf-4b73526bec02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34929", "type": "seen", "source": "https://t.me/cibsecurity/65619", "content": "\u203c CVE-2023-34929 \u203c\n\nA stack overflow in the AddMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-28T18:13:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1eb65bad-6f26-4fa5-93cf-4b73526bec02/export</guid>
      <pubDate>Wed, 28 Jun 2023 18:13:14 +0000</pubDate>
    </item>
    <item>
      <title>87ad12c3-698a-4988-a51c-6bc2f53c49ef</title>
      <link>https://vulnerability.circl.lu/sighting/87ad12c3-698a-4988-a51c-6bc2f53c49ef/export</link>
      <description>{"uuid": "87ad12c3-698a-4988-a51c-6bc2f53c49ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3492", "type": "seen", "source": "https://t.me/cibsecurity/67875", "content": "\u203c CVE-2023-3492 \u203c\n\nThe WP Shopping Pages WordPress plugin through 1.14 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-07T18:13:46.000000Z"}</description>
      <content:encoded>{"uuid": "87ad12c3-698a-4988-a51c-6bc2f53c49ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3492", "type": "seen", "source": "https://t.me/cibsecurity/67875", "content": "\u203c CVE-2023-3492 \u203c\n\nThe WP Shopping Pages WordPress plugin through 1.14 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-07T18:13:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/87ad12c3-698a-4988-a51c-6bc2f53c49ef/export</guid>
      <pubDate>Mon, 07 Aug 2023 18:13:46 +0000</pubDate>
    </item>
  </channel>
</rss>
