<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:29:10 +0000</lastBuildDate>
    <item>
      <title>03d142a5-5822-4ef3-a409-fce7f20955a5</title>
      <link>https://vulnerability.circl.lu/sighting/03d142a5-5822-4ef3-a409-fce7f20955a5/export</link>
      <description>{"uuid": "03d142a5-5822-4ef3-a409-fce7f20955a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46382", "type": "seen", "source": "https://t.me/cibsecurity/73556", "content": "\u203c CVE-2023-46382 \u203c\n\nLOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices use cleartext HTTP for login.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-05T01:24:31.000000Z"}</description>
      <content:encoded>{"uuid": "03d142a5-5822-4ef3-a409-fce7f20955a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46382", "type": "seen", "source": "https://t.me/cibsecurity/73556", "content": "\u203c CVE-2023-46382 \u203c\n\nLOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices use cleartext HTTP for login.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-11-05T01:24:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/03d142a5-5822-4ef3-a409-fce7f20955a5/export</guid>
      <pubDate>Sun, 05 Nov 2023 01:24:31 +0000</pubDate>
    </item>
    <item>
      <title>037d692a-69ac-4a08-bc51-4c364452f0e3</title>
      <link>https://vulnerability.circl.lu/sighting/037d692a-69ac-4a08-bc51-4c364452f0e3/export</link>
      <description>{"uuid": "037d692a-69ac-4a08-bc51-4c364452f0e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46386", "type": "seen", "source": "https://t.me/ctinow/155621", "content": "https://ift.tt/ue5oqZ2\nCVE-2023-46386 | LOYTEC LINX-151/LINX-212 SMTP Client registry.xml credentials storage (ID 175952)", "creation_timestamp": "2023-12-17T15:11:49.000000Z"}</description>
      <content:encoded>{"uuid": "037d692a-69ac-4a08-bc51-4c364452f0e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46386", "type": "seen", "source": "https://t.me/ctinow/155621", "content": "https://ift.tt/ue5oqZ2\nCVE-2023-46386 | LOYTEC LINX-151/LINX-212 SMTP Client registry.xml credentials storage (ID 175952)", "creation_timestamp": "2023-12-17T15:11:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/037d692a-69ac-4a08-bc51-4c364452f0e3/export</guid>
      <pubDate>Sun, 17 Dec 2023 15:11:49 +0000</pubDate>
    </item>
    <item>
      <title>68437ab1-3e32-4972-bcd0-c232d9e4aab5</title>
      <link>https://vulnerability.circl.lu/sighting/68437ab1-3e32-4972-bcd0-c232d9e4aab5/export</link>
      <description>{"uuid": "68437ab1-3e32-4972-bcd0-c232d9e4aab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46387", "type": "seen", "source": "https://t.me/ctinow/155622", "content": "https://ift.tt/LQrnFiD\nCVE-2023-46387 | LOYTEC LINX-151/LINX-212 File Download API dpal_config.zml information disclosure (ID 175952)", "creation_timestamp": "2023-12-17T15:11:51.000000Z"}</description>
      <content:encoded>{"uuid": "68437ab1-3e32-4972-bcd0-c232d9e4aab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46387", "type": "seen", "source": "https://t.me/ctinow/155622", "content": "https://ift.tt/LQrnFiD\nCVE-2023-46387 | LOYTEC LINX-151/LINX-212 File Download API dpal_config.zml information disclosure (ID 175952)", "creation_timestamp": "2023-12-17T15:11:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/68437ab1-3e32-4972-bcd0-c232d9e4aab5/export</guid>
      <pubDate>Sun, 17 Dec 2023 15:11:51 +0000</pubDate>
    </item>
    <item>
      <title>6f943c16-4e12-44c7-9374-77d3495cdcaf</title>
      <link>https://vulnerability.circl.lu/sighting/6f943c16-4e12-44c7-9374-77d3495cdcaf/export</link>
      <description>{"uuid": "6f943c16-4e12-44c7-9374-77d3495cdcaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46388", "type": "seen", "source": "https://t.me/ctinow/155623", "content": "https://ift.tt/JRmE14u\nCVE-2023-46388 | LOYTEC LINX-151/LINX-212 SMTP Client dpal_config.wbx credentials storage (ID 175952)", "creation_timestamp": "2023-12-17T15:11:51.000000Z"}</description>
      <content:encoded>{"uuid": "6f943c16-4e12-44c7-9374-77d3495cdcaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46388", "type": "seen", "source": "https://t.me/ctinow/155623", "content": "https://ift.tt/JRmE14u\nCVE-2023-46388 | LOYTEC LINX-151/LINX-212 SMTP Client dpal_config.wbx credentials storage (ID 175952)", "creation_timestamp": "2023-12-17T15:11:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6f943c16-4e12-44c7-9374-77d3495cdcaf/export</guid>
      <pubDate>Sun, 17 Dec 2023 15:11:51 +0000</pubDate>
    </item>
    <item>
      <title>9dadc934-51a4-400d-bd0f-b1ac5cd1bd22</title>
      <link>https://vulnerability.circl.lu/sighting/9dadc934-51a4-400d-bd0f-b1ac5cd1bd22/export</link>
      <description>{"uuid": "9dadc934-51a4-400d-bd0f-b1ac5cd1bd22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46389", "type": "seen", "source": "https://t.me/ctinow/155624", "content": "https://ift.tt/zxSP264\nCVE-2023-46389 | LOYTEC LINX-151/LINX-212 File Download API /tmp/registry.xml information disclosure (ID 175952)", "creation_timestamp": "2023-12-17T15:11:53.000000Z"}</description>
      <content:encoded>{"uuid": "9dadc934-51a4-400d-bd0f-b1ac5cd1bd22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46389", "type": "seen", "source": "https://t.me/ctinow/155624", "content": "https://ift.tt/zxSP264\nCVE-2023-46389 | LOYTEC LINX-151/LINX-212 File Download API /tmp/registry.xml information disclosure (ID 175952)", "creation_timestamp": "2023-12-17T15:11:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9dadc934-51a4-400d-bd0f-b1ac5cd1bd22/export</guid>
      <pubDate>Sun, 17 Dec 2023 15:11:53 +0000</pubDate>
    </item>
    <item>
      <title>95219941-631f-4404-b970-65ab4f5ab4b8</title>
      <link>https://vulnerability.circl.lu/sighting/95219941-631f-4404-b970-65ab4f5ab4b8/export</link>
      <description>{"uuid": "95219941-631f-4404-b970-65ab4f5ab4b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46383", "type": "seen", "source": "https://t.me/ctinow/155626", "content": "https://ift.tt/rV1eMUc\nCVE-2023-46383 | LOYTEC LINX Configurator 7.4.10 cleartext transmission (ID 175951)", "creation_timestamp": "2023-12-17T15:47:57.000000Z"}</description>
      <content:encoded>{"uuid": "95219941-631f-4404-b970-65ab4f5ab4b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46383", "type": "seen", "source": "https://t.me/ctinow/155626", "content": "https://ift.tt/rV1eMUc\nCVE-2023-46383 | LOYTEC LINX Configurator 7.4.10 cleartext transmission (ID 175951)", "creation_timestamp": "2023-12-17T15:47:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/95219941-631f-4404-b970-65ab4f5ab4b8/export</guid>
      <pubDate>Sun, 17 Dec 2023 15:47:57 +0000</pubDate>
    </item>
    <item>
      <title>3c6a90f0-71e6-4328-8580-ca08e72f2716</title>
      <link>https://vulnerability.circl.lu/sighting/3c6a90f0-71e6-4328-8580-ca08e72f2716/export</link>
      <description>{"uuid": "3c6a90f0-71e6-4328-8580-ca08e72f2716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46384", "type": "seen", "source": "https://t.me/ctinow/155627", "content": "https://ift.tt/5s6pOGc\nCVE-2023-46384 | LOYTEC LINX Configurator 7.4.10 cleartext storage in the registry (ID 175951)", "creation_timestamp": "2023-12-17T15:47:58.000000Z"}</description>
      <content:encoded>{"uuid": "3c6a90f0-71e6-4328-8580-ca08e72f2716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46384", "type": "seen", "source": "https://t.me/ctinow/155627", "content": "https://ift.tt/5s6pOGc\nCVE-2023-46384 | LOYTEC LINX Configurator 7.4.10 cleartext storage in the registry (ID 175951)", "creation_timestamp": "2023-12-17T15:47:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3c6a90f0-71e6-4328-8580-ca08e72f2716/export</guid>
      <pubDate>Sun, 17 Dec 2023 15:47:58 +0000</pubDate>
    </item>
    <item>
      <title>8b564e10-21d1-49ed-8c9f-a96cd5455702</title>
      <link>https://vulnerability.circl.lu/sighting/8b564e10-21d1-49ed-8c9f-a96cd5455702/export</link>
      <description>{"uuid": "8b564e10-21d1-49ed-8c9f-a96cd5455702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46385", "type": "seen", "source": "https://t.me/ctinow/155628", "content": "https://ift.tt/mM4Xa5T\nCVE-2023-46385 | LOYTEC LINX Configurator 7.4.10 password cleartext transmission (ID 175951)", "creation_timestamp": "2023-12-17T15:47:59.000000Z"}</description>
      <content:encoded>{"uuid": "8b564e10-21d1-49ed-8c9f-a96cd5455702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46385", "type": "seen", "source": "https://t.me/ctinow/155628", "content": "https://ift.tt/mM4Xa5T\nCVE-2023-46385 | LOYTEC LINX Configurator 7.4.10 password cleartext transmission (ID 175951)", "creation_timestamp": "2023-12-17T15:47:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8b564e10-21d1-49ed-8c9f-a96cd5455702/export</guid>
      <pubDate>Sun, 17 Dec 2023 15:47:59 +0000</pubDate>
    </item>
    <item>
      <title>c0f631f2-654e-4e0a-85aa-7a856c619fbd</title>
      <link>https://vulnerability.circl.lu/sighting/c0f631f2-654e-4e0a-85aa-7a856c619fbd/export</link>
      <description>{"uuid": "c0f631f2-654e-4e0a-85aa-7a856c619fbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46381", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14217", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46381\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.\n\ud83d\udccf Published: 2023-11-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T03:55:35.812Z\n\ud83d\udd17 References:\n1. https://seclists.org/fulldisclosure/2023/Nov/0\n2. http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html\n3. https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/\n4. https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01", "creation_timestamp": "2025-05-01T04:14:30.000000Z"}</description>
      <content:encoded>{"uuid": "c0f631f2-654e-4e0a-85aa-7a856c619fbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46381", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14217", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46381\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.\n\ud83d\udccf Published: 2023-11-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T03:55:35.812Z\n\ud83d\udd17 References:\n1. https://seclists.org/fulldisclosure/2023/Nov/0\n2. http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html\n3. https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/\n4. https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01", "creation_timestamp": "2025-05-01T04:14:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c0f631f2-654e-4e0a-85aa-7a856c619fbd/export</guid>
      <pubDate>Thu, 01 May 2025 04:14:30 +0000</pubDate>
    </item>
    <item>
      <title>1eb18eeb-06ce-433e-b4e7-89f205261137</title>
      <link>https://vulnerability.circl.lu/sighting/1eb18eeb-06ce-433e-b4e7-89f205261137/export</link>
      <description>{"uuid": "1eb18eeb-06ce-433e-b4e7-89f205261137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46380", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14218", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46380\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) send password-change requests via cleartext HTTP.\n\ud83d\udccf Published: 2023-11-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T03:55:35.497Z\n\ud83d\udd17 References:\n1. https://seclists.org/fulldisclosure/2023/Nov/0\n2. http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html\n3. https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/\n4. https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01", "creation_timestamp": "2025-05-01T04:14:30.000000Z"}</description>
      <content:encoded>{"uuid": "1eb18eeb-06ce-433e-b4e7-89f205261137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46380", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14218", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-46380\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) send password-change requests via cleartext HTTP.\n\ud83d\udccf Published: 2023-11-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T03:55:35.497Z\n\ud83d\udd17 References:\n1. https://seclists.org/fulldisclosure/2023/Nov/0\n2. http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html\n3. https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/\n4. https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01", "creation_timestamp": "2025-05-01T04:14:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1eb18eeb-06ce-433e-b4e7-89f205261137/export</guid>
      <pubDate>Thu, 01 May 2025 04:14:30 +0000</pubDate>
    </item>
  </channel>
</rss>
