<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 06:39:48 +0000</lastBuildDate>
    <item>
      <title>5e347d64-a4c9-4e77-8a2c-a2f642af7542</title>
      <link>https://vulnerability.circl.lu/sighting/5e347d64-a4c9-4e77-8a2c-a2f642af7542/export</link>
      <description>{"uuid": "5e347d64-a4c9-4e77-8a2c-a2f642af7542", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39341", "type": "seen", "source": "https://t.me/cvedetector/6199", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39341 - Entrust Cardwizard Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39341 \nPublished : Sept. 23, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Entrust Instant Financial Issuance (On Premise) Software (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier leaves behind a configuration file (i.e. WebAPI.cfg.xml) after the installation process. This file can be accessed without authentication on HTTP port 80 by guessing the correct IIS webroot path. It includes system configuration parameter names and values with sensitive configuration values encrypted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-23T21:20:12.000000Z"}</description>
      <content:encoded>{"uuid": "5e347d64-a4c9-4e77-8a2c-a2f642af7542", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39341", "type": "seen", "source": "https://t.me/cvedetector/6199", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39341 - Entrust Cardwizard Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39341 \nPublished : Sept. 23, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Entrust Instant Financial Issuance (On Premise) Software (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier leaves behind a configuration file (i.e. WebAPI.cfg.xml) after the installation process. This file can be accessed without authentication on HTTP port 80 by guessing the correct IIS webroot path. It includes system configuration parameter names and values with sensitive configuration values encrypted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-23T21:20:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5e347d64-a4c9-4e77-8a2c-a2f642af7542/export</guid>
      <pubDate>Mon, 23 Sep 2024 21:20:12 +0000</pubDate>
    </item>
    <item>
      <title>4dde2735-9a6b-474e-a1ef-b692720c9d5c</title>
      <link>https://vulnerability.circl.lu/sighting/4dde2735-9a6b-474e-a1ef-b692720c9d5c/export</link>
      <description>{"uuid": "4dde2735-9a6b-474e-a1ef-b692720c9d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39341", "type": "seen", "source": "https://t.me/cvedetector/6200", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39342 - Entrust Instant Financial Issuance AES Encryption Key Reuse Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39342 \nPublished : Sept. 23, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from \"WebAPI.cfg.xml\" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-23T21:20:13.000000Z"}</description>
      <content:encoded>{"uuid": "4dde2735-9a6b-474e-a1ef-b692720c9d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39341", "type": "seen", "source": "https://t.me/cvedetector/6200", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39342 - Entrust Instant Financial Issuance AES Encryption Key Reuse Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39342 \nPublished : Sept. 23, 2024, 6:15 p.m. | 39\u00a0minutes ago \nDescription : Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from \"WebAPI.cfg.xml\" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-23T21:20:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4dde2735-9a6b-474e-a1ef-b692720c9d5c/export</guid>
      <pubDate>Mon, 23 Sep 2024 21:20:13 +0000</pubDate>
    </item>
  </channel>
</rss>
