<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T19:09:40.565256+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/738b2019-aa31-4eb6-a599-68649c7c2d31/export</id>
    <title>738b2019-aa31-4eb6-a599-68649c7c2d31</title>
    <updated>2026-05-10T19:09:40.879730+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "738b2019-aa31-4eb6-a599-68649c7c2d31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5005", "type": "seen", "source": "https://t.me/information_security_channel/3217", "content": "Vulnerability fixed in Quick Heal products\nhttp://blogs.quickheal.com/vulnerability-fixed-quick-heal-products/\n\nOut of Bound Write on Stack Buffer Background A security vulnerability \u2013\u00a0 CVE-2017-5005 in Quick Heal allowed illegal Remote Code Execution and Privilege Escalation. Present Status \u2022 Vulnerability fixed and released as an update to all Quick Heal users on Saturday, 11th June 2016. \u2022 Quick Heal products having virus...\nThe post Vulnerability fixed in Quick Heal products (http://blogs.quickheal.com/vulnerability-fixed-quick-heal-products/) appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice (http://blogs.quickheal.com/).", "creation_timestamp": "2017-01-16T09:58:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/738b2019-aa31-4eb6-a599-68649c7c2d31/export"/>
    <published>2017-01-16T09:58:56+00:00</published>
  </entry>
</feed>
