<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T17:21:41.447116+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3bcf780d-8197-4f4b-8963-5580894bc435/export</id>
    <title>3bcf780d-8197-4f4b-8963-5580894bc435</title>
    <updated>2026-05-09T17:21:41.772637+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3bcf780d-8197-4f4b-8963-5580894bc435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47401", "type": "seen", "source": "https://t.me/cvedetector/9273", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47401 - Mattermost GraphQL Discovery Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47401 \nPublished : Oct. 29, 2024, 9:15 a.m. | 19\u00a0minutes ago \nDescription : Mattermost versions 9.10.x &amp;lt;=&amp;lt;=&amp;lt;=\nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T10:35:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3bcf780d-8197-4f4b-8963-5580894bc435/export"/>
    <published>2024-10-29T10:35:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a37e44a4-c6fe-4f6b-912a-7ac442031d75/export</id>
    <title>a37e44a4-c6fe-4f6b-912a-7ac442031d75</title>
    <updated>2026-05-09T17:21:41.772544+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a37e44a4-c6fe-4f6b-912a-7ac442031d75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47402", "type": "seen", "source": "https://t.me/cvedetector/9823", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47402 - OpenHarmony Out-of-Bounds Read Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47402 \nPublished : Nov. 5, 2024, 8:15 a.m. | 18\u00a0minutes ago \nDescription : in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T09:40:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a37e44a4-c6fe-4f6b-912a-7ac442031d75/export"/>
    <published>2024-11-05T09:40:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/52154c51-60eb-4428-8d97-d8d5e1cdf484/export</id>
    <title>52154c51-60eb-4428-8d97-d8d5e1cdf484</title>
    <updated>2026-05-09T17:21:41.772444+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "52154c51-60eb-4428-8d97-d8d5e1cdf484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47404", "type": "seen", "source": "https://t.me/cvedetector/9824", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47404 - OpenHarmony Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-47404 \nPublished : Nov. 5, 2024, 8:15 a.m. | 18\u00a0minutes ago \nDescription : in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T09:40:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/52154c51-60eb-4428-8d97-d8d5e1cdf484/export"/>
    <published>2024-11-05T09:40:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1ce013dd-0578-41f7-a487-f49b6b75b6dd/export</id>
    <title>1ce013dd-0578-41f7-a487-f49b6b75b6dd</title>
    <updated>2026-05-09T17:21:41.772354+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1ce013dd-0578-41f7-a487-f49b6b75b6dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-326-07", "content": "", "creation_timestamp": "2024-11-21T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1ce013dd-0578-41f7-a487-f49b6b75b6dd/export"/>
    <published>2024-11-21T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dd158ef2-b108-4e9e-a8bd-47c3d4c10df1/export</id>
    <title>dd158ef2-b108-4e9e-a8bd-47c3d4c10df1</title>
    <updated>2026-05-09T17:21:41.772256+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dd158ef2-b108-4e9e-a8bd-47c3d4c10df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47408", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1314", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47408\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check smcd_v2_ext_offset when receiving proposal msg\n\nWhen receiving proposal msg in server, the field smcd_v2_ext_offset in\nproposal msg is from the remote client and can not be fully trusted.\nOnce the value of smcd_v2_ext_offset exceed the max value, there has\nthe chance to access wrong address, and crash may happen.\n\nThis patch checks the value of smcd_v2_ext_offset before using it.\n\ud83d\udccf Published: 2025-01-11T12:35:35.284Z\n\ud83d\udccf Modified: 2025-01-11T12:35:35.284Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/a36364d8d4fabb105001f992fb8ff2d3546203d6\n2. https://git.kernel.org/stable/c/e1cc8be2a785a8f1ce1f597f3e608602c5fccd46\n3. https://git.kernel.org/stable/c/935caf324b445fe73d7708fae6f7176fb243f357\n4. https://git.kernel.org/stable/c/48d5a8a304a643613dab376a278f29d3e22f7c34\n5. https://git.kernel.org/stable/c/9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad", "creation_timestamp": "2025-01-11T13:06:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dd158ef2-b108-4e9e-a8bd-47c3d4c10df1/export"/>
    <published>2025-01-11T13:06:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9ffcfdd-faec-4734-a4b8-7a9067d8ef05/export</id>
    <title>d9ffcfdd-faec-4734-a4b8-7a9067d8ef05</title>
    <updated>2026-05-09T17:21:41.772158+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9ffcfdd-faec-4734-a4b8-7a9067d8ef05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47408", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs3kejje2i", "content": "", "creation_timestamp": "2025-01-11T13:15:58.217525Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9ffcfdd-faec-4734-a4b8-7a9067d8ef05/export"/>
    <published>2025-01-11T13:15:58.217525+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/988bb048-1cce-464e-a1ac-9c250e9a7533/export</id>
    <title>988bb048-1cce-464e-a1ac-9c250e9a7533</title>
    <updated>2026-05-09T17:21:41.772060+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "988bb048-1cce-464e-a1ac-9c250e9a7533", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/scada/mypro_mgr_cmd.rb", "content": "", "creation_timestamp": "2025-02-11T08:32:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/988bb048-1cce-464e-a1ac-9c250e9a7533/export"/>
    <published>2025-02-11T08:32:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b428f711-402f-4d37-a63c-d6b59ed9f194/export</id>
    <title>b428f711-402f-4d37-a63c-d6b59ed9f194</title>
    <updated>2026-05-09T17:21:41.771960+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b428f711-402f-4d37-a63c-d6b59ed9f194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhwkli4wkw2k", "content": "", "creation_timestamp": "2025-02-11T21:02:02.612670Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b428f711-402f-4d37-a63c-d6b59ed9f194/export"/>
    <published>2025-02-11T21:02:02.612670+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/895d2cbc-22d0-43cc-bc0e-2950128f542b/export</id>
    <title>895d2cbc-22d0-43cc-bc0e-2950128f542b</title>
    <updated>2026-05-09T17:21:41.771833+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "895d2cbc-22d0-43cc-bc0e-2950128f542b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/895d2cbc-22d0-43cc-bc0e-2950128f542b/export"/>
    <published>2025-02-23T04:11:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5042ca6e-f66f-42c9-9a58-6d0b423c2d57/export</id>
    <title>5042ca6e-f66f-42c9-9a58-6d0b423c2d57</title>
    <updated>2026-05-09T17:21:41.769444+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5042ca6e-f66f-42c9-9a58-6d0b423c2d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5042ca6e-f66f-42c9-9a58-6d0b423c2d57/export"/>
    <published>2025-10-23T21:13:03+00:00</published>
  </entry>
</feed>
