<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 06:40:19 +0000</lastBuildDate>
    <item>
      <title>c48c14c1-bba4-493a-9fcf-394a84a3cb1e</title>
      <link>https://vulnerability.circl.lu/sighting/c48c14c1-bba4-493a-9fcf-394a84a3cb1e/export</link>
      <description>{"uuid": "c48c14c1-bba4-493a-9fcf-394a84a3cb1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41871", "type": "seen", "source": "https://t.me/cvedetector/5572", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41871 - Adobe Media Encoder Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41871 \nPublished : Sept. 13, 2024, 7:15 a.m. | 19\u00a0minutes ago \nDescription : Media Encoder versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T09:36:15.000000Z"}</description>
      <content:encoded>{"uuid": "c48c14c1-bba4-493a-9fcf-394a84a3cb1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41871", "type": "seen", "source": "https://t.me/cvedetector/5572", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41871 - Adobe Media Encoder Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41871 \nPublished : Sept. 13, 2024, 7:15 a.m. | 19\u00a0minutes ago \nDescription : Media Encoder versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T09:36:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c48c14c1-bba4-493a-9fcf-394a84a3cb1e/export</guid>
      <pubDate>Fri, 13 Sep 2024 09:36:15 +0000</pubDate>
    </item>
  </channel>
</rss>
