<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T06:39:49.826284+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5e347d64-a4c9-4e77-8a2c-a2f642af7542/export</id>
    <title>5e347d64-a4c9-4e77-8a2c-a2f642af7542</title>
    <updated>2026-05-11T06:39:50.212285+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5e347d64-a4c9-4e77-8a2c-a2f642af7542", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39341", "type": "seen", "source": "https://t.me/cvedetector/6199", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39341 - Entrust Cardwizard Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39341 \nPublished : Sept. 23, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Entrust Instant Financial Issuance (On Premise) Software (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier leaves behind a configuration file (i.e. WebAPI.cfg.xml) after the installation process. This file can be accessed without authentication on HTTP port 80 by guessing the correct IIS webroot path. It includes system configuration parameter names and values with sensitive configuration values encrypted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-23T21:20:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5e347d64-a4c9-4e77-8a2c-a2f642af7542/export"/>
    <published>2024-09-23T21:20:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4dde2735-9a6b-474e-a1ef-b692720c9d5c/export</id>
    <title>4dde2735-9a6b-474e-a1ef-b692720c9d5c</title>
    <updated>2026-05-11T06:39:50.210427+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4dde2735-9a6b-474e-a1ef-b692720c9d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39341", "type": "seen", "source": "https://t.me/cvedetector/6200", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39342 - Entrust Instant Financial Issuance AES Encryption Key Reuse Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39342 \nPublished : Sept. 23, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from \"WebAPI.cfg.xml\" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-23T21:20:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4dde2735-9a6b-474e-a1ef-b692720c9d5c/export"/>
    <published>2024-09-23T21:20:13+00:00</published>
  </entry>
</feed>
