<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T10:59:20.553356+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4c34ad82-5e06-4694-acec-02937ed0eb4b/export</id>
    <title>4c34ad82-5e06-4694-acec-02937ed0eb4b</title>
    <updated>2026-05-09T10:59:20.924729+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4c34ad82-5e06-4694-acec-02937ed0eb4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7553", "type": "seen", "source": "https://t.me/cvedetector/2677", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7553 - MongoDB Windows Local File System Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-7553 \nPublished : Aug. 7, 2024, 10:15 a.m. | 24\u00a0minutes ago \nDescription : Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.  \n  \nRequired Configuration:  \n  \nOnly environments with Windows as the underlying operating system is affected by this issue \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T12:47:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4c34ad82-5e06-4694-acec-02937ed0eb4b/export"/>
    <published>2024-08-07T12:47:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b9cc629d-a212-465c-9a90-76669038de48/export</id>
    <title>b9cc629d-a212-465c-9a90-76669038de48</title>
    <updated>2026-05-09T10:59:20.921087+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b9cc629d-a212-465c-9a90-76669038de48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7553", "type": "seen", "source": "https://t.me/HackingInsights/9239", "content": "\u200aMongoDB Patches High-Severity Windows Vulnerability (CVE-2024-7553) in Multiple Products\n\nhttps://securityonline.info/mongodb-patches-high-severity-windows-vulnerability-cve-2024-7553-in-multiple-products/", "creation_timestamp": "2024-08-10T21:41:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b9cc629d-a212-465c-9a90-76669038de48/export"/>
    <published>2024-08-10T21:41:30+00:00</published>
  </entry>
</feed>
