<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 19:48:24 +0000</lastBuildDate>
    <item>
      <title>3bcf780d-8197-4f4b-8963-5580894bc435</title>
      <link>https://vulnerability.circl.lu/sighting/3bcf780d-8197-4f4b-8963-5580894bc435/export</link>
      <description>{"uuid": "3bcf780d-8197-4f4b-8963-5580894bc435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47401", "type": "seen", "source": "https://t.me/cvedetector/9273", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47401 - Mattermost GraphQL Discovery Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47401 \nPublished : Oct. 29, 2024, 9:15 a.m. | 19\u00a0minutes ago \nDescription : Mattermost versions 9.10.x &amp;lt;=&amp;lt;=&amp;lt;=\nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T10:35:22.000000Z"}</description>
      <content:encoded>{"uuid": "3bcf780d-8197-4f4b-8963-5580894bc435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47401", "type": "seen", "source": "https://t.me/cvedetector/9273", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47401 - Mattermost GraphQL Discovery Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47401 \nPublished : Oct. 29, 2024, 9:15 a.m. | 19\u00a0minutes ago \nDescription : Mattermost versions 9.10.x &amp;lt;=&amp;lt;=&amp;lt;=\nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T10:35:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3bcf780d-8197-4f4b-8963-5580894bc435/export</guid>
      <pubDate>Tue, 29 Oct 2024 10:35:22 +0000</pubDate>
    </item>
    <item>
      <title>a37e44a4-c6fe-4f6b-912a-7ac442031d75</title>
      <link>https://vulnerability.circl.lu/sighting/a37e44a4-c6fe-4f6b-912a-7ac442031d75/export</link>
      <description>{"uuid": "a37e44a4-c6fe-4f6b-912a-7ac442031d75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47402", "type": "seen", "source": "https://t.me/cvedetector/9823", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47402 - OpenHarmony Out-of-Bounds Read Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47402 \nPublished : Nov. 5, 2024, 8:15 a.m. | 18\u00a0minutes ago \nDescription : in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T09:40:43.000000Z"}</description>
      <content:encoded>{"uuid": "a37e44a4-c6fe-4f6b-912a-7ac442031d75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47402", "type": "seen", "source": "https://t.me/cvedetector/9823", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47402 - OpenHarmony Out-of-Bounds Read Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47402 \nPublished : Nov. 5, 2024, 8:15 a.m. | 18\u00a0minutes ago \nDescription : in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through out-of-bounds read. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T09:40:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a37e44a4-c6fe-4f6b-912a-7ac442031d75/export</guid>
      <pubDate>Tue, 05 Nov 2024 09:40:43 +0000</pubDate>
    </item>
    <item>
      <title>52154c51-60eb-4428-8d97-d8d5e1cdf484</title>
      <link>https://vulnerability.circl.lu/sighting/52154c51-60eb-4428-8d97-d8d5e1cdf484/export</link>
      <description>{"uuid": "52154c51-60eb-4428-8d97-d8d5e1cdf484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47404", "type": "seen", "source": "https://t.me/cvedetector/9824", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47404 - OpenHarmony Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-47404 \nPublished : Nov. 5, 2024, 8:15 a.m. | 18\u00a0minutes ago \nDescription : in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T09:40:44.000000Z"}</description>
      <content:encoded>{"uuid": "52154c51-60eb-4428-8d97-d8d5e1cdf484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47404", "type": "seen", "source": "https://t.me/cvedetector/9824", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47404 - OpenHarmony Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-47404 \nPublished : Nov. 5, 2024, 8:15 a.m. | 18\u00a0minutes ago \nDescription : in OpenHarmony v4.1.0 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through double free. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T09:40:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/52154c51-60eb-4428-8d97-d8d5e1cdf484/export</guid>
      <pubDate>Tue, 05 Nov 2024 09:40:44 +0000</pubDate>
    </item>
    <item>
      <title>1ce013dd-0578-41f7-a487-f49b6b75b6dd</title>
      <link>https://vulnerability.circl.lu/sighting/1ce013dd-0578-41f7-a487-f49b6b75b6dd/export</link>
      <description>{"uuid": "1ce013dd-0578-41f7-a487-f49b6b75b6dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-326-07", "content": "", "creation_timestamp": "2024-11-21T11:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "1ce013dd-0578-41f7-a487-f49b6b75b6dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-326-07", "content": "", "creation_timestamp": "2024-11-21T11:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1ce013dd-0578-41f7-a487-f49b6b75b6dd/export</guid>
      <pubDate>Thu, 21 Nov 2024 11:00:00 +0000</pubDate>
    </item>
    <item>
      <title>dd158ef2-b108-4e9e-a8bd-47c3d4c10df1</title>
      <link>https://vulnerability.circl.lu/sighting/dd158ef2-b108-4e9e-a8bd-47c3d4c10df1/export</link>
      <description>{"uuid": "dd158ef2-b108-4e9e-a8bd-47c3d4c10df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47408", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1314", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47408\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check smcd_v2_ext_offset when receiving proposal msg\n\nWhen receiving proposal msg in server, the field smcd_v2_ext_offset in\nproposal msg is from the remote client and can not be fully trusted.\nOnce the value of smcd_v2_ext_offset exceed the max value, there has\nthe chance to access wrong address, and crash may happen.\n\nThis patch checks the value of smcd_v2_ext_offset before using it.\n\ud83d\udccf Published: 2025-01-11T12:35:35.284Z\n\ud83d\udccf Modified: 2025-01-11T12:35:35.284Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/a36364d8d4fabb105001f992fb8ff2d3546203d6\n2. https://git.kernel.org/stable/c/e1cc8be2a785a8f1ce1f597f3e608602c5fccd46\n3. https://git.kernel.org/stable/c/935caf324b445fe73d7708fae6f7176fb243f357\n4. https://git.kernel.org/stable/c/48d5a8a304a643613dab376a278f29d3e22f7c34\n5. https://git.kernel.org/stable/c/9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad", "creation_timestamp": "2025-01-11T13:06:50.000000Z"}</description>
      <content:encoded>{"uuid": "dd158ef2-b108-4e9e-a8bd-47c3d4c10df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47408", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1314", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47408\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check smcd_v2_ext_offset when receiving proposal msg\n\nWhen receiving proposal msg in server, the field smcd_v2_ext_offset in\nproposal msg is from the remote client and can not be fully trusted.\nOnce the value of smcd_v2_ext_offset exceed the max value, there has\nthe chance to access wrong address, and crash may happen.\n\nThis patch checks the value of smcd_v2_ext_offset before using it.\n\ud83d\udccf Published: 2025-01-11T12:35:35.284Z\n\ud83d\udccf Modified: 2025-01-11T12:35:35.284Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/a36364d8d4fabb105001f992fb8ff2d3546203d6\n2. https://git.kernel.org/stable/c/e1cc8be2a785a8f1ce1f597f3e608602c5fccd46\n3. https://git.kernel.org/stable/c/935caf324b445fe73d7708fae6f7176fb243f357\n4. https://git.kernel.org/stable/c/48d5a8a304a643613dab376a278f29d3e22f7c34\n5. https://git.kernel.org/stable/c/9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad", "creation_timestamp": "2025-01-11T13:06:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dd158ef2-b108-4e9e-a8bd-47c3d4c10df1/export</guid>
      <pubDate>Sat, 11 Jan 2025 13:06:50 +0000</pubDate>
    </item>
    <item>
      <title>d9ffcfdd-faec-4734-a4b8-7a9067d8ef05</title>
      <link>https://vulnerability.circl.lu/sighting/d9ffcfdd-faec-4734-a4b8-7a9067d8ef05/export</link>
      <description>{"uuid": "d9ffcfdd-faec-4734-a4b8-7a9067d8ef05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47408", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs3kejje2i", "content": "", "creation_timestamp": "2025-01-11T13:15:58.217525Z"}</description>
      <content:encoded>{"uuid": "d9ffcfdd-faec-4734-a4b8-7a9067d8ef05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47408", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs3kejje2i", "content": "", "creation_timestamp": "2025-01-11T13:15:58.217525Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d9ffcfdd-faec-4734-a4b8-7a9067d8ef05/export</guid>
      <pubDate>Sat, 11 Jan 2025 13:15:58 +0000</pubDate>
    </item>
    <item>
      <title>988bb048-1cce-464e-a1ac-9c250e9a7533</title>
      <link>https://vulnerability.circl.lu/sighting/988bb048-1cce-464e-a1ac-9c250e9a7533/export</link>
      <description>{"uuid": "988bb048-1cce-464e-a1ac-9c250e9a7533", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/scada/mypro_mgr_cmd.rb", "content": "", "creation_timestamp": "2025-02-11T08:32:04.000000Z"}</description>
      <content:encoded>{"uuid": "988bb048-1cce-464e-a1ac-9c250e9a7533", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/scada/mypro_mgr_cmd.rb", "content": "", "creation_timestamp": "2025-02-11T08:32:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/988bb048-1cce-464e-a1ac-9c250e9a7533/export</guid>
      <pubDate>Tue, 11 Feb 2025 08:32:04 +0000</pubDate>
    </item>
    <item>
      <title>b428f711-402f-4d37-a63c-d6b59ed9f194</title>
      <link>https://vulnerability.circl.lu/sighting/b428f711-402f-4d37-a63c-d6b59ed9f194/export</link>
      <description>{"uuid": "b428f711-402f-4d37-a63c-d6b59ed9f194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhwkli4wkw2k", "content": "", "creation_timestamp": "2025-02-11T21:02:02.612670Z"}</description>
      <content:encoded>{"uuid": "b428f711-402f-4d37-a63c-d6b59ed9f194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhwkli4wkw2k", "content": "", "creation_timestamp": "2025-02-11T21:02:02.612670Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b428f711-402f-4d37-a63c-d6b59ed9f194/export</guid>
      <pubDate>Tue, 11 Feb 2025 21:02:02 +0000</pubDate>
    </item>
    <item>
      <title>895d2cbc-22d0-43cc-bc0e-2950128f542b</title>
      <link>https://vulnerability.circl.lu/sighting/895d2cbc-22d0-43cc-bc0e-2950128f542b/export</link>
      <description>{"uuid": "895d2cbc-22d0-43cc-bc0e-2950128f542b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:06.000000Z"}</description>
      <content:encoded>{"uuid": "895d2cbc-22d0-43cc-bc0e-2950128f542b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/895d2cbc-22d0-43cc-bc0e-2950128f542b/export</guid>
      <pubDate>Sun, 23 Feb 2025 04:11:06 +0000</pubDate>
    </item>
    <item>
      <title>5042ca6e-f66f-42c9-9a58-6d0b423c2d57</title>
      <link>https://vulnerability.circl.lu/sighting/5042ca6e-f66f-42c9-9a58-6d0b423c2d57/export</link>
      <description>{"uuid": "5042ca6e-f66f-42c9-9a58-6d0b423c2d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:03.000000Z"}</description>
      <content:encoded>{"uuid": "5042ca6e-f66f-42c9-9a58-6d0b423c2d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47407", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5042ca6e-f66f-42c9-9a58-6d0b423c2d57/export</guid>
      <pubDate>Thu, 23 Oct 2025 21:13:03 +0000</pubDate>
    </item>
  </channel>
</rss>
