<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T18:43:39.976427+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fe3c57c9-b5b8-4fa8-81e8-8112872688c0/export</id>
    <title>fe3c57c9-b5b8-4fa8-81e8-8112872688c0</title>
    <updated>2026-05-09T18:43:40.388738+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fe3c57c9-b5b8-4fa8-81e8-8112872688c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8924", "type": "seen", "source": "https://t.me/cvedetector/9350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8924 - ServiceNow Now Platform Blind SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-8924 \nPublished : Oct. 29, 2024, 5:15 p.m. | 39\u00a0minutes ago \nDescription : ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information.\u00a0ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers.\u00a0Further, the vulnerability is addressed in the listed patches and hot fixes. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T18:57:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fe3c57c9-b5b8-4fa8-81e8-8112872688c0/export"/>
    <published>2024-10-29T18:57:45+00:00</published>
  </entry>
</feed>
