<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T14:47:40.415089+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/50c011ec-9ca6-4dc8-a79f-56ae3d60106d/export</id>
    <title>50c011ec-9ca6-4dc8-a79f-56ae3d60106d</title>
    <updated>2026-05-10T14:47:40.780265+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "50c011ec-9ca6-4dc8-a79f-56ae3d60106d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24641", "type": "seen", "source": "https://t.me/cKure/16265", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 CVE-2026-24641\nA NULL Pointer Dereference vulnerability [CWE-476] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow an authenticated attacker to crash the HTTP daemon via crafted HTTP requests.", "creation_timestamp": "2026-04-05T18:54:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/50c011ec-9ca6-4dc8-a79f-56ae3d60106d/export"/>
    <published>2026-04-05T18:54:25+00:00</published>
  </entry>
</feed>
