<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T06:05:07.006079+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a7f5a7b8-3fd1-4d8a-9ca4-c2939a96346a/export</id>
    <title>a7f5a7b8-3fd1-4d8a-9ca4-c2939a96346a</title>
    <updated>2026-05-10T06:05:07.427931+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a7f5a7b8-3fd1-4d8a-9ca4-c2939a96346a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33274", "type": "seen", "source": "https://t.me/cibsecurity/66608", "content": "\u203c CVE-2023-33274 \u203c\n\nThe authentication mechanism in PowerShield SNMP Web Pro 1.1 contains a vulnerability that allows unauthenticated users to directly access Common Gateway Interface (CGI) scripts without proper identification or authorization. This vulnerability arises from a lack of proper cookie verification and affects all instances of SNMP Web Pro 1.1 without HTTP Digest authentication enabled, regardless of the password used for the web interface.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T00:25:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a7f5a7b8-3fd1-4d8a-9ca4-c2939a96346a/export"/>
    <published>2023-07-13T00:25:50+00:00</published>
  </entry>
</feed>
