<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 15:54:26 +0000</lastBuildDate>
    <item>
      <title>f2e092e7-6372-4dc6-bc3c-4d81b0357b33</title>
      <link>https://vulnerability.circl.lu/sighting/f2e092e7-6372-4dc6-bc3c-4d81b0357b33/export</link>
      <description>{"uuid": "f2e092e7-6372-4dc6-bc3c-4d81b0357b33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27607", "type": "seen", "source": "https://t.me/cibsecurity/39358", "content": "\u203c CVE-2022-27607 \u203c\n\nBento4 1.6.0-639 has a heap-based buffer over-read in the AP4_HvccAtom class, a related issue to CVE-2018-14531.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-22T01:26:36.000000Z"}</description>
      <content:encoded>{"uuid": "f2e092e7-6372-4dc6-bc3c-4d81b0357b33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27607", "type": "seen", "source": "https://t.me/cibsecurity/39358", "content": "\u203c CVE-2022-27607 \u203c\n\nBento4 1.6.0-639 has a heap-based buffer over-read in the AP4_HvccAtom class, a related issue to CVE-2018-14531.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-22T01:26:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2e092e7-6372-4dc6-bc3c-4d81b0357b33/export</guid>
      <pubDate>Tue, 22 Mar 2022 01:26:36 +0000</pubDate>
    </item>
    <item>
      <title>73274d18-0b60-42e5-b923-4301eb7c284d</title>
      <link>https://vulnerability.circl.lu/sighting/73274d18-0b60-42e5-b923-4301eb7c284d/export</link>
      <description>{"uuid": "73274d18-0b60-42e5-b923-4301eb7c284d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27609", "type": "seen", "source": "https://t.me/cibsecurity/40125", "content": "\u203c CVE-2022-27609 \u203c\n\nForcepoint One Endpoint prior to version 22.01 installed on Microsoft Windows does not provide sufficient anti-tampering protection of services by users with Administrator privileges. This could result in a user to disable Forcepoint One Endpoint and the protection offered by it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T00:28:02.000000Z"}</description>
      <content:encoded>{"uuid": "73274d18-0b60-42e5-b923-4301eb7c284d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27609", "type": "seen", "source": "https://t.me/cibsecurity/40125", "content": "\u203c CVE-2022-27609 \u203c\n\nForcepoint One Endpoint prior to version 22.01 installed on Microsoft Windows does not provide sufficient anti-tampering protection of services by users with Administrator privileges. This could result in a user to disable Forcepoint One Endpoint and the protection offered by it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-05T00:28:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/73274d18-0b60-42e5-b923-4301eb7c284d/export</guid>
      <pubDate>Tue, 05 Apr 2022 00:28:02 +0000</pubDate>
    </item>
    <item>
      <title>b571dc7e-1d0b-44da-98c6-3f62a9877217</title>
      <link>https://vulnerability.circl.lu/sighting/b571dc7e-1d0b-44da-98c6-3f62a9877217/export</link>
      <description>{"uuid": "b571dc7e-1d0b-44da-98c6-3f62a9877217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2760", "type": "seen", "source": "https://t.me/cibsecurity/50577", "content": "\u203c CVE-2022-2760 \u203c\n\nIn affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-28T16:34:09.000000Z"}</description>
      <content:encoded>{"uuid": "b571dc7e-1d0b-44da-98c6-3f62a9877217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2760", "type": "seen", "source": "https://t.me/cibsecurity/50577", "content": "\u203c CVE-2022-2760 \u203c\n\nIn affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-28T16:34:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b571dc7e-1d0b-44da-98c6-3f62a9877217/export</guid>
      <pubDate>Wed, 28 Sep 2022 16:34:09 +0000</pubDate>
    </item>
    <item>
      <title>259c0b0d-91a4-4abc-94db-6269ccc365d2</title>
      <link>https://vulnerability.circl.lu/sighting/259c0b0d-91a4-4abc-94db-6269ccc365d2/export</link>
      <description>{"uuid": "259c0b0d-91a4-4abc-94db-6269ccc365d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27600", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113677066767895139", "content": "", "creation_timestamp": "2024-12-19T02:13:03.634039Z"}</description>
      <content:encoded>{"uuid": "259c0b0d-91a4-4abc-94db-6269ccc365d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27600", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113677066767895139", "content": "", "creation_timestamp": "2024-12-19T02:13:03.634039Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/259c0b0d-91a4-4abc-94db-6269ccc365d2/export</guid>
      <pubDate>Thu, 19 Dec 2024 02:13:03 +0000</pubDate>
    </item>
    <item>
      <title>cd408955-f677-43fb-b274-b7a0df8272aa</title>
      <link>https://vulnerability.circl.lu/sighting/cd408955-f677-43fb-b274-b7a0df8272aa/export</link>
      <description>{"uuid": "cd408955-f677-43fb-b274-b7a0df8272aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27600", "type": "seen", "source": "https://t.me/cvedetector/13304", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-27600 - QNAP QTS and QuTS hero QuTScloud Uncontrolled Resource Consumption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-27600 \nPublished : Dec. 19, 2024, 2:15 a.m. | 40\u00a0minutes ago \nDescription : An uncontrolled resource consumption vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to launch a denial-of-service (DoS) attack. \n \nWe have already fixed the vulnerability in the following versions: \nQTS 5.0.1.2277 and later \nQTS 4.5.4.2280 build 20230112 and later \nQuTS hero h5.0.1.2277 build 20230112 and later \nQuTS hero h4.5.4.2374 build 20230417 and later \nQuTScloud c5.0.1.2374 and later \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T03:55:52.000000Z"}</description>
      <content:encoded>{"uuid": "cd408955-f677-43fb-b274-b7a0df8272aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27600", "type": "seen", "source": "https://t.me/cvedetector/13304", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-27600 - QNAP QTS and QuTS hero QuTScloud Uncontrolled Resource Consumption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2022-27600 \nPublished : Dec. 19, 2024, 2:15 a.m. | 40\u00a0minutes ago \nDescription : An uncontrolled resource consumption vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to launch a denial-of-service (DoS) attack. \n \nWe have already fixed the vulnerability in the following versions: \nQTS 5.0.1.2277 and later \nQTS 4.5.4.2280 build 20230112 and later \nQuTS hero h5.0.1.2277 build 20230112 and later \nQuTS hero h4.5.4.2374 build 20230417 and later \nQuTScloud c5.0.1.2374 and later \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T03:55:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cd408955-f677-43fb-b274-b7a0df8272aa/export</guid>
      <pubDate>Thu, 19 Dec 2024 03:55:52 +0000</pubDate>
    </item>
  </channel>
</rss>
