<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 04:13:41 +0000</lastBuildDate>
    <item>
      <title>738b2019-aa31-4eb6-a599-68649c7c2d31</title>
      <link>https://vulnerability.circl.lu/sighting/738b2019-aa31-4eb6-a599-68649c7c2d31/export</link>
      <description>{"uuid": "738b2019-aa31-4eb6-a599-68649c7c2d31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5005", "type": "seen", "source": "https://t.me/information_security_channel/3217", "content": "Vulnerability fixed in Quick Heal products\nhttp://blogs.quickheal.com/vulnerability-fixed-quick-heal-products/\n\nOut of Bound Write on Stack Buffer Background A security vulnerability \u2013\u00a0 CVE-2017-5005 in Quick Heal allowed illegal Remote Code Execution and Privilege Escalation. Present Status \u2022 Vulnerability fixed and released as an update to all Quick Heal users on Saturday, 11th June 2016. \u2022 Quick Heal products having virus...\nThe post Vulnerability fixed in Quick Heal products (http://blogs.quickheal.com/vulnerability-fixed-quick-heal-products/) appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice (http://blogs.quickheal.com/).", "creation_timestamp": "2017-01-16T09:58:56.000000Z"}</description>
      <content:encoded>{"uuid": "738b2019-aa31-4eb6-a599-68649c7c2d31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5005", "type": "seen", "source": "https://t.me/information_security_channel/3217", "content": "Vulnerability fixed in Quick Heal products\nhttp://blogs.quickheal.com/vulnerability-fixed-quick-heal-products/\n\nOut of Bound Write on Stack Buffer Background A security vulnerability \u2013\u00a0 CVE-2017-5005 in Quick Heal allowed illegal Remote Code Execution and Privilege Escalation. Present Status \u2022 Vulnerability fixed and released as an update to all Quick Heal users on Saturday, 11th June 2016. \u2022 Quick Heal products having virus...\nThe post Vulnerability fixed in Quick Heal products (http://blogs.quickheal.com/vulnerability-fixed-quick-heal-products/) appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice (http://blogs.quickheal.com/).", "creation_timestamp": "2017-01-16T09:58:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/738b2019-aa31-4eb6-a599-68649c7c2d31/export</guid>
      <pubDate>Mon, 16 Jan 2017 09:58:56 +0000</pubDate>
    </item>
  </channel>
</rss>
