<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T12:22:41.861458+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/91233ecb-a05d-465b-b799-35e4f1e6d4bc/export</id>
    <title>91233ecb-a05d-465b-b799-35e4f1e6d4bc</title>
    <updated>2026-05-09T12:22:42.241728+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "91233ecb-a05d-465b-b799-35e4f1e6d4bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22380", "type": "seen", "source": "https://t.me/ctinow/172491", "content": "https://ift.tt/cxGhNFA\nCVE-2024-22380", "creation_timestamp": "2024-01-24T03:26:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/91233ecb-a05d-465b-b799-35e4f1e6d4bc/export"/>
    <published>2024-01-24T03:26:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1149ade5-d2b9-4df1-997e-2df5b49afb6a/export</id>
    <title>1149ade5-d2b9-4df1-997e-2df5b49afb6a</title>
    <updated>2026-05-09T12:22:42.241641+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1149ade5-d2b9-4df1-997e-2df5b49afb6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22386", "type": "seen", "source": "https://t.me/ctinow/179063", "content": "https://ift.tt/UDnekiw\nCVE-2024-22386", "creation_timestamp": "2024-02-05T09:31:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1149ade5-d2b9-4df1-997e-2df5b49afb6a/export"/>
    <published>2024-02-05T09:31:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/caadd540-5e7d-478d-b072-0a6e588ad0f5/export</id>
    <title>caadd540-5e7d-478d-b072-0a6e588ad0f5</title>
    <updated>2026-05-09T12:22:42.241540+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "caadd540-5e7d-478d-b072-0a6e588ad0f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22388", "type": "seen", "source": "https://t.me/ctinow/180434", "content": "https://ift.tt/ANhPv5Z\nCVE-2024-22388", "creation_timestamp": "2024-02-07T00:31:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/caadd540-5e7d-478d-b072-0a6e588ad0f5/export"/>
    <published>2024-02-07T00:31:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5d826d03-cec3-4483-95a1-1814a000c3fb/export</id>
    <title>5d826d03-cec3-4483-95a1-1814a000c3fb</title>
    <updated>2026-05-09T12:22:42.241439+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5d826d03-cec3-4483-95a1-1814a000c3fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22380", "type": "seen", "source": "https://t.me/ctinow/186978", "content": "https://ift.tt/o2uzXsx\nCVE-2024-22380 | Ministry of Agriculture, Forestry and Fisheries Electronic Delivery Check System up to 14.0.001.002 XML File xml external entity reference", "creation_timestamp": "2024-02-17T17:16:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5d826d03-cec3-4483-95a1-1814a000c3fb/export"/>
    <published>2024-02-17T17:16:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ebcc3b35-847c-42c7-a053-33b88b4c7c92/export</id>
    <title>ebcc3b35-847c-42c7-a053-33b88b4c7c92</title>
    <updated>2026-05-09T12:22:42.241292+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ebcc3b35-847c-42c7-a053-33b88b4c7c92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22386", "type": "seen", "source": "https://t.me/ctinow/196348", "content": "https://ift.tt/WOja7ce\nCVE-2024-22386 | Linux Kernel up to 6.5 Exynos Device Driver exynos_drm_crtc_atomic_disable null pointer dereference", "creation_timestamp": "2024-02-29T08:47:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ebcc3b35-847c-42c7-a053-33b88b4c7c92/export"/>
    <published>2024-02-29T08:47:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9e832c5a-0f8d-409b-b047-c0d91eb06721/export</id>
    <title>9e832c5a-0f8d-409b-b047-c0d91eb06721</title>
    <updated>2026-05-09T12:22:42.241127+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9e832c5a-0f8d-409b-b047-c0d91eb06721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22388", "type": "seen", "source": "https://t.me/ctinow/197659", "content": "https://ift.tt/fKdQaBC\nCVE-2024-22388 | HID Global iCLASS SE/OMNIKEY Encoder Configuration improper authorization (icsa-24-037-01)", "creation_timestamp": "2024-03-01T14:46:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9e832c5a-0f8d-409b-b047-c0d91eb06721/export"/>
    <published>2024-03-01T14:46:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/87fdcc8c-1c7e-42c0-91cb-bcbc2ec012d3/export</id>
    <title>87fdcc8c-1c7e-42c0-91cb-bcbc2ec012d3</title>
    <updated>2026-05-09T12:22:42.240968+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "87fdcc8c-1c7e-42c0-91cb-bcbc2ec012d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22383", "type": "seen", "source": "https://t.me/ctinow/199884", "content": "https://ift.tt/6cdOI2C\nCVE-2024-22383", "creation_timestamp": "2024-03-05T04:27:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/87fdcc8c-1c7e-42c0-91cb-bcbc2ec012d3/export"/>
    <published>2024-03-05T04:27:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c3f14aed-71b7-4530-b9f8-d18ed31ce6e9/export</id>
    <title>c3f14aed-71b7-4530-b9f8-d18ed31ce6e9</title>
    <updated>2026-05-09T12:22:42.240739+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c3f14aed-71b7-4530-b9f8-d18ed31ce6e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22383", "type": "seen", "source": "https://t.me/ctinow/199889", "content": "https://ift.tt/6cdOI2C\nCVE-2024-22383", "creation_timestamp": "2024-03-05T04:32:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c3f14aed-71b7-4530-b9f8-d18ed31ce6e9/export"/>
    <published>2024-03-05T04:32:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/78c16a6a-451d-465d-bcbf-082fa70421a3/export</id>
    <title>78c16a6a-451d-465d-bcbf-082fa70421a3</title>
    <updated>2026-05-09T12:22:42.237772+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "78c16a6a-451d-465d-bcbf-082fa70421a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22387", "type": "seen", "source": "https://t.me/cvedetector/627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22387 - External Control of Critical State Data (CWE-642)\", \n  \"Content\": \"CVE ID : CVE-2024-22387 \nPublished : July 11, 2024, 3:15 a.m. | 23\u00a0minutes ago \nDescription : External Control of Critical State Data (CWE-642) in the Controller 6000 and Controller 7000 diagnostic web interface allows an authenticated user to modify device I/O connections leading to unexpected behavior that in some circumstances could compromise site physical security controls. Gallagher recommend the diagnostic web page is not enabled (default is off) unless advised by Gallagher Technical support. This interface is intended only for diagnostic purposes.  \n  \n  \n  \nThis issue affects:\u00a0Gallagher Controller 6000 and 7000   \n  \n9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)),\u00a08.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T05:46:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/78c16a6a-451d-465d-bcbf-082fa70421a3/export"/>
    <published>2024-07-11T05:46:28+00:00</published>
  </entry>
</feed>
