<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 22:58:44 +0000</lastBuildDate>
    <item>
      <title>6ac5bfec-863f-437c-9dd1-864fdbbdbe76</title>
      <link>https://vulnerability.circl.lu/sighting/6ac5bfec-863f-437c-9dd1-864fdbbdbe76/export</link>
      <description>{"uuid": "6ac5bfec-863f-437c-9dd1-864fdbbdbe76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6436", "type": "seen", "source": "https://t.me/cvedetector/6580", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6436 - Rockwell Automation Sequence Manager Denial of Service Input Validation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6436 \nPublished : Sept. 27, 2024, 8:15 p.m. | 17\u00a0minutes ago \nDescription : An input validation vulnerability exists in the Rockwell Automation Sequence Manager\u2122 which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T22:35:50.000000Z"}</description>
      <content:encoded>{"uuid": "6ac5bfec-863f-437c-9dd1-864fdbbdbe76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6436", "type": "seen", "source": "https://t.me/cvedetector/6580", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6436 - Rockwell Automation Sequence Manager Denial of Service Input Validation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6436 \nPublished : Sept. 27, 2024, 8:15 p.m. | 17\u00a0minutes ago \nDescription : An input validation vulnerability exists in the Rockwell Automation Sequence Manager\u2122 which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T22:35:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6ac5bfec-863f-437c-9dd1-864fdbbdbe76/export</guid>
      <pubDate>Fri, 27 Sep 2024 22:35:50 +0000</pubDate>
    </item>
  </channel>
</rss>
