<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 14:00:55 +0000</lastBuildDate>
    <item>
      <title>91233ecb-a05d-465b-b799-35e4f1e6d4bc</title>
      <link>https://vulnerability.circl.lu/sighting/91233ecb-a05d-465b-b799-35e4f1e6d4bc/export</link>
      <description>{"uuid": "91233ecb-a05d-465b-b799-35e4f1e6d4bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22380", "type": "seen", "source": "https://t.me/ctinow/172491", "content": "https://ift.tt/cxGhNFA\nCVE-2024-22380", "creation_timestamp": "2024-01-24T03:26:27.000000Z"}</description>
      <content:encoded>{"uuid": "91233ecb-a05d-465b-b799-35e4f1e6d4bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22380", "type": "seen", "source": "https://t.me/ctinow/172491", "content": "https://ift.tt/cxGhNFA\nCVE-2024-22380", "creation_timestamp": "2024-01-24T03:26:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/91233ecb-a05d-465b-b799-35e4f1e6d4bc/export</guid>
      <pubDate>Wed, 24 Jan 2024 03:26:27 +0000</pubDate>
    </item>
    <item>
      <title>1149ade5-d2b9-4df1-997e-2df5b49afb6a</title>
      <link>https://vulnerability.circl.lu/sighting/1149ade5-d2b9-4df1-997e-2df5b49afb6a/export</link>
      <description>{"uuid": "1149ade5-d2b9-4df1-997e-2df5b49afb6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22386", "type": "seen", "source": "https://t.me/ctinow/179063", "content": "https://ift.tt/UDnekiw\nCVE-2024-22386", "creation_timestamp": "2024-02-05T09:31:31.000000Z"}</description>
      <content:encoded>{"uuid": "1149ade5-d2b9-4df1-997e-2df5b49afb6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22386", "type": "seen", "source": "https://t.me/ctinow/179063", "content": "https://ift.tt/UDnekiw\nCVE-2024-22386", "creation_timestamp": "2024-02-05T09:31:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1149ade5-d2b9-4df1-997e-2df5b49afb6a/export</guid>
      <pubDate>Mon, 05 Feb 2024 09:31:31 +0000</pubDate>
    </item>
    <item>
      <title>caadd540-5e7d-478d-b072-0a6e588ad0f5</title>
      <link>https://vulnerability.circl.lu/sighting/caadd540-5e7d-478d-b072-0a6e588ad0f5/export</link>
      <description>{"uuid": "caadd540-5e7d-478d-b072-0a6e588ad0f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22388", "type": "seen", "source": "https://t.me/ctinow/180434", "content": "https://ift.tt/ANhPv5Z\nCVE-2024-22388", "creation_timestamp": "2024-02-07T00:31:43.000000Z"}</description>
      <content:encoded>{"uuid": "caadd540-5e7d-478d-b072-0a6e588ad0f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22388", "type": "seen", "source": "https://t.me/ctinow/180434", "content": "https://ift.tt/ANhPv5Z\nCVE-2024-22388", "creation_timestamp": "2024-02-07T00:31:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/caadd540-5e7d-478d-b072-0a6e588ad0f5/export</guid>
      <pubDate>Wed, 07 Feb 2024 00:31:43 +0000</pubDate>
    </item>
    <item>
      <title>5d826d03-cec3-4483-95a1-1814a000c3fb</title>
      <link>https://vulnerability.circl.lu/sighting/5d826d03-cec3-4483-95a1-1814a000c3fb/export</link>
      <description>{"uuid": "5d826d03-cec3-4483-95a1-1814a000c3fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22380", "type": "seen", "source": "https://t.me/ctinow/186978", "content": "https://ift.tt/o2uzXsx\nCVE-2024-22380 | Ministry of Agriculture, Forestry and Fisheries Electronic Delivery Check System up to 14.0.001.002 XML File xml external entity reference", "creation_timestamp": "2024-02-17T17:16:15.000000Z"}</description>
      <content:encoded>{"uuid": "5d826d03-cec3-4483-95a1-1814a000c3fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22380", "type": "seen", "source": "https://t.me/ctinow/186978", "content": "https://ift.tt/o2uzXsx\nCVE-2024-22380 | Ministry of Agriculture, Forestry and Fisheries Electronic Delivery Check System up to 14.0.001.002 XML File xml external entity reference", "creation_timestamp": "2024-02-17T17:16:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5d826d03-cec3-4483-95a1-1814a000c3fb/export</guid>
      <pubDate>Sat, 17 Feb 2024 17:16:15 +0000</pubDate>
    </item>
    <item>
      <title>ebcc3b35-847c-42c7-a053-33b88b4c7c92</title>
      <link>https://vulnerability.circl.lu/sighting/ebcc3b35-847c-42c7-a053-33b88b4c7c92/export</link>
      <description>{"uuid": "ebcc3b35-847c-42c7-a053-33b88b4c7c92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22386", "type": "seen", "source": "https://t.me/ctinow/196348", "content": "https://ift.tt/WOja7ce\nCVE-2024-22386 | Linux Kernel up to 6.5 Exynos Device Driver exynos_drm_crtc_atomic_disable null pointer dereference", "creation_timestamp": "2024-02-29T08:47:07.000000Z"}</description>
      <content:encoded>{"uuid": "ebcc3b35-847c-42c7-a053-33b88b4c7c92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22386", "type": "seen", "source": "https://t.me/ctinow/196348", "content": "https://ift.tt/WOja7ce\nCVE-2024-22386 | Linux Kernel up to 6.5 Exynos Device Driver exynos_drm_crtc_atomic_disable null pointer dereference", "creation_timestamp": "2024-02-29T08:47:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ebcc3b35-847c-42c7-a053-33b88b4c7c92/export</guid>
      <pubDate>Thu, 29 Feb 2024 08:47:07 +0000</pubDate>
    </item>
    <item>
      <title>9e832c5a-0f8d-409b-b047-c0d91eb06721</title>
      <link>https://vulnerability.circl.lu/sighting/9e832c5a-0f8d-409b-b047-c0d91eb06721/export</link>
      <description>{"uuid": "9e832c5a-0f8d-409b-b047-c0d91eb06721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22388", "type": "seen", "source": "https://t.me/ctinow/197659", "content": "https://ift.tt/fKdQaBC\nCVE-2024-22388 | HID Global iCLASS SE/OMNIKEY Encoder Configuration improper authorization (icsa-24-037-01)", "creation_timestamp": "2024-03-01T14:46:48.000000Z"}</description>
      <content:encoded>{"uuid": "9e832c5a-0f8d-409b-b047-c0d91eb06721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22388", "type": "seen", "source": "https://t.me/ctinow/197659", "content": "https://ift.tt/fKdQaBC\nCVE-2024-22388 | HID Global iCLASS SE/OMNIKEY Encoder Configuration improper authorization (icsa-24-037-01)", "creation_timestamp": "2024-03-01T14:46:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9e832c5a-0f8d-409b-b047-c0d91eb06721/export</guid>
      <pubDate>Fri, 01 Mar 2024 14:46:48 +0000</pubDate>
    </item>
    <item>
      <title>87fdcc8c-1c7e-42c0-91cb-bcbc2ec012d3</title>
      <link>https://vulnerability.circl.lu/sighting/87fdcc8c-1c7e-42c0-91cb-bcbc2ec012d3/export</link>
      <description>{"uuid": "87fdcc8c-1c7e-42c0-91cb-bcbc2ec012d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22383", "type": "seen", "source": "https://t.me/ctinow/199884", "content": "https://ift.tt/6cdOI2C\nCVE-2024-22383", "creation_timestamp": "2024-03-05T04:27:31.000000Z"}</description>
      <content:encoded>{"uuid": "87fdcc8c-1c7e-42c0-91cb-bcbc2ec012d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22383", "type": "seen", "source": "https://t.me/ctinow/199884", "content": "https://ift.tt/6cdOI2C\nCVE-2024-22383", "creation_timestamp": "2024-03-05T04:27:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/87fdcc8c-1c7e-42c0-91cb-bcbc2ec012d3/export</guid>
      <pubDate>Tue, 05 Mar 2024 04:27:31 +0000</pubDate>
    </item>
    <item>
      <title>c3f14aed-71b7-4530-b9f8-d18ed31ce6e9</title>
      <link>https://vulnerability.circl.lu/sighting/c3f14aed-71b7-4530-b9f8-d18ed31ce6e9/export</link>
      <description>{"uuid": "c3f14aed-71b7-4530-b9f8-d18ed31ce6e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22383", "type": "seen", "source": "https://t.me/ctinow/199889", "content": "https://ift.tt/6cdOI2C\nCVE-2024-22383", "creation_timestamp": "2024-03-05T04:32:20.000000Z"}</description>
      <content:encoded>{"uuid": "c3f14aed-71b7-4530-b9f8-d18ed31ce6e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22383", "type": "seen", "source": "https://t.me/ctinow/199889", "content": "https://ift.tt/6cdOI2C\nCVE-2024-22383", "creation_timestamp": "2024-03-05T04:32:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c3f14aed-71b7-4530-b9f8-d18ed31ce6e9/export</guid>
      <pubDate>Tue, 05 Mar 2024 04:32:20 +0000</pubDate>
    </item>
    <item>
      <title>78c16a6a-451d-465d-bcbf-082fa70421a3</title>
      <link>https://vulnerability.circl.lu/sighting/78c16a6a-451d-465d-bcbf-082fa70421a3/export</link>
      <description>{"uuid": "78c16a6a-451d-465d-bcbf-082fa70421a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22387", "type": "seen", "source": "https://t.me/cvedetector/627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22387 - External Control of Critical State Data (CWE-642)\", \n  \"Content\": \"CVE ID : CVE-2024-22387 \nPublished : July 11, 2024, 3:15 a.m. | 23\u00a0minutes ago \nDescription : External Control of Critical State Data (CWE-642) in the Controller 6000 and Controller 7000 diagnostic web interface allows an authenticated user to modify device I/O connections leading to unexpected behavior that in some circumstances could compromise site physical security controls. Gallagher recommend the diagnostic web page is not enabled (default is off) unless advised by Gallagher Technical support. This interface is intended only for diagnostic purposes.  \n  \n  \n  \nThis issue affects:\u00a0Gallagher Controller 6000 and 7000   \n  \n9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)),\u00a08.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T05:46:28.000000Z"}</description>
      <content:encoded>{"uuid": "78c16a6a-451d-465d-bcbf-082fa70421a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22387", "type": "seen", "source": "https://t.me/cvedetector/627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22387 - External Control of Critical State Data (CWE-642)\", \n  \"Content\": \"CVE ID : CVE-2024-22387 \nPublished : July 11, 2024, 3:15 a.m. | 23\u00a0minutes ago \nDescription : External Control of Critical State Data (CWE-642) in the Controller 6000 and Controller 7000 diagnostic web interface allows an authenticated user to modify device I/O connections leading to unexpected behavior that in some circumstances could compromise site physical security controls. Gallagher recommend the diagnostic web page is not enabled (default is off) unless advised by Gallagher Technical support. This interface is intended only for diagnostic purposes.  \n  \n  \n  \nThis issue affects:\u00a0Gallagher Controller 6000 and 7000   \n  \n9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)),\u00a08.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T05:46:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/78c16a6a-451d-465d-bcbf-082fa70421a3/export</guid>
      <pubDate>Thu, 11 Jul 2024 05:46:28 +0000</pubDate>
    </item>
  </channel>
</rss>
