<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 17:41:04 +0000</lastBuildDate>
    <item>
      <title>22654e47-83c9-4ce4-a51d-7f2626985518</title>
      <link>https://vulnerability.circl.lu/sighting/22654e47-83c9-4ce4-a51d-7f2626985518/export</link>
      <description>{"uuid": "22654e47-83c9-4ce4-a51d-7f2626985518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26244", "type": "seen", "source": "https://t.me/cibsecurity/62958", "content": "\u203c CVE-2023-26244 \u203c\n\nAn issue was discovered in the Hyundai Gen5W_L in-vehicle infotainment system AE_E_PE_EUR.S5W_L001.001.211214. The AppDMClient binary file, which is used during the firmware installation process, can be modified by an attacker to bypass the digital signature check of AppUpgrade and .lge.upgrade.xml files, which are used during the firmware installation process. This indirectly allows an attacker to use a custom version of AppUpgrade and .lge.upgrade.xml files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-27T07:39:52.000000Z"}</description>
      <content:encoded>{"uuid": "22654e47-83c9-4ce4-a51d-7f2626985518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26244", "type": "seen", "source": "https://t.me/cibsecurity/62958", "content": "\u203c CVE-2023-26244 \u203c\n\nAn issue was discovered in the Hyundai Gen5W_L in-vehicle infotainment system AE_E_PE_EUR.S5W_L001.001.211214. The AppDMClient binary file, which is used during the firmware installation process, can be modified by an attacker to bypass the digital signature check of AppUpgrade and .lge.upgrade.xml files, which are used during the firmware installation process. This indirectly allows an attacker to use a custom version of AppUpgrade and .lge.upgrade.xml files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-27T07:39:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/22654e47-83c9-4ce4-a51d-7f2626985518/export</guid>
      <pubDate>Thu, 27 Apr 2023 07:39:52 +0000</pubDate>
    </item>
    <item>
      <title>a93dae19-6816-412a-bbe1-6b4fc17a0137</title>
      <link>https://vulnerability.circl.lu/sighting/a93dae19-6816-412a-bbe1-6b4fc17a0137/export</link>
      <description>{"uuid": "a93dae19-6816-412a-bbe1-6b4fc17a0137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26244", "type": "seen", "source": "https://t.me/arpsyndicate/519", "content": "#ExploitObserverAlert\n\nCVE-2023-26244\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-26244. An issue was discovered in the Hyundai Gen5W_L in-vehicle infotainment system AE_E_PE_EUR.S5W_L001.001.211214. The AppDMClient binary file, which is used during the firmware installation process, can be modified by an attacker to bypass the digital signature check of AppUpgrade and .lge.upgrade.xml files, which are used during the firmware installation process. This indirectly allows an attacker to use a custom version of AppUpgrade and .lge.upgrade.xml files.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-24T07:11:36.000000Z"}</description>
      <content:encoded>{"uuid": "a93dae19-6816-412a-bbe1-6b4fc17a0137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26244", "type": "seen", "source": "https://t.me/arpsyndicate/519", "content": "#ExploitObserverAlert\n\nCVE-2023-26244\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-26244. An issue was discovered in the Hyundai Gen5W_L in-vehicle infotainment system AE_E_PE_EUR.S5W_L001.001.211214. The AppDMClient binary file, which is used during the firmware installation process, can be modified by an attacker to bypass the digital signature check of AppUpgrade and .lge.upgrade.xml files, which are used during the firmware installation process. This indirectly allows an attacker to use a custom version of AppUpgrade and .lge.upgrade.xml files.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-24T07:11:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a93dae19-6816-412a-bbe1-6b4fc17a0137/export</guid>
      <pubDate>Fri, 24 Nov 2023 07:11:36 +0000</pubDate>
    </item>
    <item>
      <title>1e6f68b4-8a23-403a-aa10-1a389b0b9e90</title>
      <link>https://vulnerability.circl.lu/sighting/1e6f68b4-8a23-403a-aa10-1a389b0b9e90/export</link>
      <description>{"uuid": "1e6f68b4-8a23-403a-aa10-1a389b0b9e90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26244", "type": "seen", "source": "https://t.me/arpsyndicate/1631", "content": "#ExploitObserverAlert\n\nCVE-2023-26244\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-26244. An issue was discovered in the Hyundai Gen5W_L in-vehicle infotainment system AE_E_PE_EUR.S5W_L001.001.211214. The AppDMClient binary file, which is used during the firmware installation process, can be modified by an attacker to bypass the digital signature check of AppUpgrade and .lge.upgrade.xml files, which are used during the firmware installation process. This indirectly allows an attacker to use a custom version of AppUpgrade and .lge.upgrade.xml files.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-10T14:04:57.000000Z"}</description>
      <content:encoded>{"uuid": "1e6f68b4-8a23-403a-aa10-1a389b0b9e90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26244", "type": "seen", "source": "https://t.me/arpsyndicate/1631", "content": "#ExploitObserverAlert\n\nCVE-2023-26244\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-26244. An issue was discovered in the Hyundai Gen5W_L in-vehicle infotainment system AE_E_PE_EUR.S5W_L001.001.211214. The AppDMClient binary file, which is used during the firmware installation process, can be modified by an attacker to bypass the digital signature check of AppUpgrade and .lge.upgrade.xml files, which are used during the firmware installation process. This indirectly allows an attacker to use a custom version of AppUpgrade and .lge.upgrade.xml files.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-10T14:04:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1e6f68b4-8a23-403a-aa10-1a389b0b9e90/export</guid>
      <pubDate>Sun, 10 Dec 2023 14:04:57 +0000</pubDate>
    </item>
  </channel>
</rss>
