<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 13:43:27 +0000</lastBuildDate>
    <item>
      <title>7398a163-48c0-4b22-8cb5-9388030336f8</title>
      <link>https://vulnerability.circl.lu/sighting/7398a163-48c0-4b22-8cb5-9388030336f8/export</link>
      <description>{"uuid": "7398a163-48c0-4b22-8cb5-9388030336f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42977", "type": "seen", "source": "https://t.me/cibsecurity/33498", "content": "\u203c CVE-2021-42977 \u203c\n\nNoMachine Enterprise Desktop is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-07T22:22:10.000000Z"}</description>
      <content:encoded>{"uuid": "7398a163-48c0-4b22-8cb5-9388030336f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42977", "type": "seen", "source": "https://t.me/cibsecurity/33498", "content": "\u203c CVE-2021-42977 \u203c\n\nNoMachine Enterprise Desktop is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-07T22:22:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7398a163-48c0-4b22-8cb5-9388030336f8/export</guid>
      <pubDate>Tue, 07 Dec 2021 22:22:10 +0000</pubDate>
    </item>
  </channel>
</rss>
