<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 08:03:22 +0000</lastBuildDate>
    <item>
      <title>00be5289-6257-440c-94fb-177bff36f309</title>
      <link>https://vulnerability.circl.lu/sighting/00be5289-6257-440c-94fb-177bff36f309/export</link>
      <description>{"uuid": "00be5289-6257-440c-94fb-177bff36f309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37857", "type": "seen", "source": "https://t.me/cibsecurity/68078", "content": "\u203c CVE-2023-37857 \u203c\n\nIn PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. This issue cannot be exploited to bypass the web service authentication of the affected device(s).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-09T12:16:33.000000Z"}</description>
      <content:encoded>{"uuid": "00be5289-6257-440c-94fb-177bff36f309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-37857", "type": "seen", "source": "https://t.me/cibsecurity/68078", "content": "\u203c CVE-2023-37857 \u203c\n\nIn PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. This issue cannot be exploited to bypass the web service authentication of the affected device(s).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-09T12:16:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/00be5289-6257-440c-94fb-177bff36f309/export</guid>
      <pubDate>Wed, 09 Aug 2023 12:16:33 +0000</pubDate>
    </item>
  </channel>
</rss>
