<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 07:02:11 +0000</lastBuildDate>
    <item>
      <title>94dfbce3-9550-4d0b-81dc-f4b4824823f7</title>
      <link>https://vulnerability.circl.lu/sighting/94dfbce3-9550-4d0b-81dc-f4b4824823f7/export</link>
      <description>{"uuid": "94dfbce3-9550-4d0b-81dc-f4b4824823f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42480", "type": "seen", "source": "https://t.me/cvedetector/2865", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42480 - Kamaji Kubernetes RBAC Role Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-42480 \nPublished : Aug. 12, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an \"open at the top\" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T19:17:43.000000Z"}</description>
      <content:encoded>{"uuid": "94dfbce3-9550-4d0b-81dc-f4b4824823f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42480", "type": "seen", "source": "https://t.me/cvedetector/2865", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42480 - Kamaji Kubernetes RBAC Role Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-42480 \nPublished : Aug. 12, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an \"open at the top\" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T19:17:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/94dfbce3-9550-4d0b-81dc-f4b4824823f7/export</guid>
      <pubDate>Mon, 12 Aug 2024 19:17:43 +0000</pubDate>
    </item>
  </channel>
</rss>
