<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 22:20:12 +0000</lastBuildDate>
    <item>
      <title>7380d383-35a5-45cb-8d02-f16c3f599d71</title>
      <link>https://vulnerability.circl.lu/sighting/7380d383-35a5-45cb-8d02-f16c3f599d71/export</link>
      <description>{"uuid": "7380d383-35a5-45cb-8d02-f16c3f599d71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6644", "type": "seen", "source": "https://t.me/cvedetector/556", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6644 - A vulnerability was found in zmops ArgusDBM up to\", \n  \"Content\": \"CVE ID : CVE-2024-6644 \nPublished : July 10, 2024, 5:15 p.m. | 24\u00a0minutes ago \nDescription : A vulnerability was found in zmops ArgusDBM up to 0.1.0. It has been classified as critical. Affected is the function getDefaultClassLoader of the file CalculateAlarm.java of the component AviatorScript Handler. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-271050 is the identifier assigned to this vulnerability. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T19:43:21.000000Z"}</description>
      <content:encoded>{"uuid": "7380d383-35a5-45cb-8d02-f16c3f599d71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6644", "type": "seen", "source": "https://t.me/cvedetector/556", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6644 - A vulnerability was found in zmops ArgusDBM up to\", \n  \"Content\": \"CVE ID : CVE-2024-6644 \nPublished : July 10, 2024, 5:15 p.m. | 24\u00a0minutes ago \nDescription : A vulnerability was found in zmops ArgusDBM up to 0.1.0. It has been classified as critical. Affected is the function getDefaultClassLoader of the file CalculateAlarm.java of the component AviatorScript Handler. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-271050 is the identifier assigned to this vulnerability. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T19:43:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7380d383-35a5-45cb-8d02-f16c3f599d71/export</guid>
      <pubDate>Wed, 10 Jul 2024 19:43:21 +0000</pubDate>
    </item>
  </channel>
</rss>
