<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T03:08:42.158514+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6ca5988e-5e9c-43ba-8680-64995f28420f/export</id>
    <title>6ca5988e-5e9c-43ba-8680-64995f28420f</title>
    <updated>2026-05-08T03:08:42.574177+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6ca5988e-5e9c-43ba-8680-64995f28420f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "https://t.me/cvedetector/8033", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45461 - Apache CloudStack Quota Access and Configuration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45461 \nPublished : Oct. 16, 2024, 8:15 a.m. | 37\u00a0minutes ago \nDescription : The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled.  \n  \n  \n  \n  \nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.\u00a0Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting \"quota.enable.service\" to \"false\". \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T11:20:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6ca5988e-5e9c-43ba-8680-64995f28420f/export"/>
    <published>2024-10-16T11:20:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5fb29828-8d11-46e0-aa21-eb5987451994/export</id>
    <title>5fb29828-8d11-46e0-aa21-eb5987451994</title>
    <updated>2026-05-08T03:08:42.574079+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5fb29828-8d11-46e0-aa21-eb5987451994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4064", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45461\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-10-16T08:15:05.717\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n2. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n3. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n4. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n5. https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo\n6. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2/\n7. http://www.openwall.com/lists/oss-security/2024/10/15/3", "creation_timestamp": "2025-02-12T11:09:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5fb29828-8d11-46e0-aa21-eb5987451994/export"/>
    <published>2025-02-12T11:09:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82/export</id>
    <title>53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82</title>
    <updated>2026-05-08T03:08:42.573967+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4102", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45461\n\ud83d\udd25 CVSS Score: 5.6 (CVSS_V3)\n\ud83d\udd39 Description: The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled.\n\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.\u00a0Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting \"quota.enable.service\" to \"false\".\n\ud83d\udccf Published: 2024-10-16T09:30:31Z\n\ud83d\udccf Modified: 2025-02-12T12:30:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-45461\n2. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n3. https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo\n4. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2\n5. http://www.openwall.com/lists/oss-security/2024/10/15/3", "creation_timestamp": "2025-02-12T13:14:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82/export"/>
    <published>2025-02-12T13:14:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f3524b0d-0c63-4bcd-86e1-1db7a60d90a4/export</id>
    <title>f3524b0d-0c63-4bcd-86e1-1db7a60d90a4</title>
    <updated>2026-05-08T03:08:42.570993+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f3524b0d-0c63-4bcd-86e1-1db7a60d90a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "Telegram/bEpx4hr16v7elHFjBDtLuMdoVY4XrHSqCrH1aJrzFWxZ76kz", "content": "", "creation_timestamp": "2025-02-14T10:04:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f3524b0d-0c63-4bcd-86e1-1db7a60d90a4/export"/>
    <published>2025-02-14T10:04:57+00:00</published>
  </entry>
</feed>
