<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T10:15:58.345973+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a9fc199f-b695-4d19-b879-1c90f2e71bef/export</id>
    <title>a9fc199f-b695-4d19-b879-1c90f2e71bef</title>
    <updated>2026-05-08T10:15:58.574237+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a9fc199f-b695-4d19-b879-1c90f2e71bef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33502", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113827355879730690", "content": "", "creation_timestamp": "2025-01-14T15:13:33.726870Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a9fc199f-b695-4d19-b879-1c90f2e71bef/export"/>
    <published>2025-01-14T15:13:33.726870+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c04bf6b-fb36-43f0-8c97-1f0c1d7b511a/export</id>
    <title>3c04bf6b-fb36-43f0-8c97-1f0c1d7b511a</title>
    <updated>2026-05-08T10:15:58.574153+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c04bf6b-fb36-43f0-8c97-1f0c1d7b511a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33503", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1620", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-33503\n\ud83d\udd39 Description: A improper privilege management in Fortinet FortiManager version 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14 allows attacker to escalation of privilege via specific shell commands\n\ud83d\udccf Published: 2025-01-14T14:09:33.613Z\n\ud83d\udccf Modified: 2025-01-14T20:54:57.869Z\n\ud83d\udd17 References:\n1. https://fortiguard.fortinet.com/psirt/FG-IR-24-127", "creation_timestamp": "2025-01-14T21:11:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c04bf6b-fb36-43f0-8c97-1f0c1d7b511a/export"/>
    <published>2025-01-14T21:11:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e5fd1c59-f42c-413d-99d7-1f152b2ae7c7/export</id>
    <title>e5fd1c59-f42c-413d-99d7-1f152b2ae7c7</title>
    <updated>2026-05-08T10:15:58.574066+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e5fd1c59-f42c-413d-99d7-1f152b2ae7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33502", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1771", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-33502\n\ud83d\udd39 Description: An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiManager, FortiAnalyzer versions 7.4.0 through 7.4.2 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.12 and 6.4.0 through 6.4.14 and 6.2.0 through 6.2.12 and 6.0.0 through 6.0.12 allows attacker to execute unauthorized code or commands via crafted HTTP or HTTPs requests.\n\ud83d\udccf Published: 2025-01-14T14:09:50.493Z\n\ud83d\udccf Modified: 2025-01-15T14:54:27.861Z\n\ud83d\udd17 References:\n1. https://fortiguard.fortinet.com/psirt/FG-IR-24-143", "creation_timestamp": "2025-01-15T15:10:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e5fd1c59-f42c-413d-99d7-1f152b2ae7c7/export"/>
    <published>2025-01-15T15:10:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d4262a69-b9a0-4d1f-80cb-c393558ee4b6/export</id>
    <title>d4262a69-b9a0-4d1f-80cb-c393558ee4b6</title>
    <updated>2026-05-08T10:15:58.573981+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d4262a69-b9a0-4d1f-80cb-c393558ee4b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33504", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113986167652495803", "content": "", "creation_timestamp": "2025-02-11T16:21:28.825311Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d4262a69-b9a0-4d1f-80cb-c393558ee4b6/export"/>
    <published>2025-02-11T16:21:28.825311+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1fd5ea1c-5b1f-4a11-9ed3-450f7cd7b3e0/export</id>
    <title>1fd5ea1c-5b1f-4a11-9ed3-450f7cd7b3e0</title>
    <updated>2026-05-08T10:15:58.573900+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1fd5ea1c-5b1f-4a11-9ed3-450f7cd7b3e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33504", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw5xvumyc2z", "content": "", "creation_timestamp": "2025-02-11T17:16:20.331764Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1fd5ea1c-5b1f-4a11-9ed3-450f7cd7b3e0/export"/>
    <published>2025-02-11T17:16:20.331764+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/356db3a3-3c14-4467-a233-50259d3c9b00/export</id>
    <title>356db3a3-3c14-4467-a233-50259d3c9b00</title>
    <updated>2026-05-08T10:15:58.573812+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "356db3a3-3c14-4467-a233-50259d3c9b00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33504", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113986497919466758", "content": "", "creation_timestamp": "2025-02-11T17:45:29.489103Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/356db3a3-3c14-4467-a233-50259d3c9b00/export"/>
    <published>2025-02-11T17:45:29.489103+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0b00d794-f322-45dc-b7cf-3d1c96b79c1e/export</id>
    <title>0b00d794-f322-45dc-b7cf-3d1c96b79c1e</title>
    <updated>2026-05-08T10:15:58.573716+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0b00d794-f322-45dc-b7cf-3d1c96b79c1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33504", "type": "seen", "source": "https://t.me/cvedetector/17727", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33504 - FortiManager Hard-Coded Cryptographic Key Encryption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33504 \nPublished : Feb. 11, 2025, 5:15 p.m. | 58\u00a0minutes ago \nDescription : A use of hard-coded cryptographic key to encrypt sensitive data vulnerability [CWE-321] in FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.9, 7.0 all versions, 6.4 all versions may allow an attacker with JSON API access permissions to decrypt some secrets even if the 'private-data-encryption' setting is enabled. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T19:53:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0b00d794-f322-45dc-b7cf-3d1c96b79c1e/export"/>
    <published>2025-02-11T19:53:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8d6e8374-6bd5-4e52-83c9-e04f5cd61996/export</id>
    <title>8d6e8374-6bd5-4e52-83c9-e04f5cd61996</title>
    <updated>2026-05-08T10:15:58.573624+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8d6e8374-6bd5-4e52-83c9-e04f5cd61996", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3350", "type": "seen", "source": "Telegram/NHaetfsXAWV-ysWI7vilrQ9aDE5s__50AtKYNE4LkPBHHHYk", "content": "", "creation_timestamp": "2025-02-14T10:01:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8d6e8374-6bd5-4e52-83c9-e04f5cd61996/export"/>
    <published>2025-02-14T10:01:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a5d7309-d4ac-4b36-b407-9c1342fd5def/export</id>
    <title>4a5d7309-d4ac-4b36-b407-9c1342fd5def</title>
    <updated>2026-05-08T10:15:58.573484+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a5d7309-d4ac-4b36-b407-9c1342fd5def", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33501", "type": "seen", "source": "https://t.me/cvedetector/20101", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33501 - Fortinet FortiAnalyzer/FortiManager/FortiAnalyzer-BigData SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-33501 \nPublished : March 11, 2025, 3:15 p.m. | 1\u00a0hour ago \nDescription : Two improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5, FortiManager version 7.4.0 through 7.4.2 and before 7.2.5 and FortiAnalyzer-BigData version 7.4.0 and before 7.2.7 allows a privileged attacker\u00a0to execute unauthorized code or commands via specifically crafted CLI requests. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T17:37:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a5d7309-d4ac-4b36-b407-9c1342fd5def/export"/>
    <published>2025-03-11T17:37:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/00f6ae93-ce2f-41f0-b90c-331f72e27c2b/export</id>
    <title>00f6ae93-ce2f-41f0-b90c-331f72e27c2b</title>
    <updated>2026-05-08T10:15:58.570619+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "00f6ae93-ce2f-41f0-b90c-331f72e27c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33501", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-8eaa21ec-de6847694340d6ba", "content": "", "creation_timestamp": "2025-03-14T07:37:36.232765Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/00f6ae93-ce2f-41f0-b90c-331f72e27c2b/export"/>
    <published>2025-03-14T07:37:36.232765+00:00</published>
  </entry>
</feed>
