<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 02:40:28 +0000</lastBuildDate>
    <item>
      <title>0cf3456a-8561-4fe9-91f6-54a033d3693e</title>
      <link>https://vulnerability.circl.lu/sighting/0cf3456a-8561-4fe9-91f6-54a033d3693e/export</link>
      <description>{"uuid": "0cf3456a-8561-4fe9-91f6-54a033d3693e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47774", "type": "seen", "source": "https://github.blog/security/vulnerability-research/uncovering-gstreamer-secrets/", "content": "", "creation_timestamp": "2024-12-17T12:51:51.000000Z"}</description>
      <content:encoded>{"uuid": "0cf3456a-8561-4fe9-91f6-54a033d3693e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47774", "type": "seen", "source": "https://github.blog/security/vulnerability-research/uncovering-gstreamer-secrets/", "content": "", "creation_timestamp": "2024-12-17T12:51:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0cf3456a-8561-4fe9-91f6-54a033d3693e/export</guid>
      <pubDate>Tue, 17 Dec 2024 12:51:51 +0000</pubDate>
    </item>
    <item>
      <title>39e6ab89-f069-4c66-8faf-11abe9dcdd13</title>
      <link>https://vulnerability.circl.lu/sighting/39e6ab89-f069-4c66-8faf-11abe9dcdd13/export</link>
      <description>{"uuid": "39e6ab89-f069-4c66-8faf-11abe9dcdd13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47775", "type": "seen", "source": "https://github.blog/security/vulnerability-research/uncovering-gstreamer-secrets/", "content": "", "creation_timestamp": "2024-12-17T12:51:51.000000Z"}</description>
      <content:encoded>{"uuid": "39e6ab89-f069-4c66-8faf-11abe9dcdd13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47775", "type": "seen", "source": "https://github.blog/security/vulnerability-research/uncovering-gstreamer-secrets/", "content": "", "creation_timestamp": "2024-12-17T12:51:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/39e6ab89-f069-4c66-8faf-11abe9dcdd13/export</guid>
      <pubDate>Tue, 17 Dec 2024 12:51:51 +0000</pubDate>
    </item>
    <item>
      <title>7390fb23-b7c6-4e6a-8cb0-03a2b40d2d60</title>
      <link>https://vulnerability.circl.lu/sighting/7390fb23-b7c6-4e6a-8cb0-03a2b40d2d60/export</link>
      <description>{"uuid": "7390fb23-b7c6-4e6a-8cb0-03a2b40d2d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47776", "type": "seen", "source": "https://github.blog/security/vulnerability-research/uncovering-gstreamer-secrets/", "content": "", "creation_timestamp": "2024-12-17T12:51:51.000000Z"}</description>
      <content:encoded>{"uuid": "7390fb23-b7c6-4e6a-8cb0-03a2b40d2d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47776", "type": "seen", "source": "https://github.blog/security/vulnerability-research/uncovering-gstreamer-secrets/", "content": "", "creation_timestamp": "2024-12-17T12:51:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7390fb23-b7c6-4e6a-8cb0-03a2b40d2d60/export</guid>
      <pubDate>Tue, 17 Dec 2024 12:51:51 +0000</pubDate>
    </item>
    <item>
      <title>ab1d0522-eeab-4910-8056-a9b1aafe8d29</title>
      <link>https://vulnerability.circl.lu/sighting/ab1d0522-eeab-4910-8056-a9b1aafe8d29/export</link>
      <description>{"uuid": "ab1d0522-eeab-4910-8056-a9b1aafe8d29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47770", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113942353419505369", "content": "", "creation_timestamp": "2025-02-03T22:38:56.774965Z"}</description>
      <content:encoded>{"uuid": "ab1d0522-eeab-4910-8056-a9b1aafe8d29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47770", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113942353419505369", "content": "", "creation_timestamp": "2025-02-03T22:38:56.774965Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ab1d0522-eeab-4910-8056-a9b1aafe8d29/export</guid>
      <pubDate>Mon, 03 Feb 2025 22:38:56 +0000</pubDate>
    </item>
    <item>
      <title>993298bd-276f-4193-b1d2-abad750361a9</title>
      <link>https://vulnerability.circl.lu/sighting/993298bd-276f-4193-b1d2-abad750361a9/export</link>
      <description>{"uuid": "993298bd-276f-4193-b1d2-abad750361a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47770", "type": "seen", "source": "https://t.me/cvedetector/17131", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47770 - \"Apache Wazuh Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-47770 \nPublished : Feb. 3, 2025, 10:15 p.m. | 23\u00a0minutes ago \nDescription : Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. This vulnerability occurs when the system has weak privilege access, that allows an attacker to do privilege escalation. In this case the attacker is able to view agent list on Wazuh dashboard with no privilege access. This issue has been addressed in release version 4.9.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T23:40:57.000000Z"}</description>
      <content:encoded>{"uuid": "993298bd-276f-4193-b1d2-abad750361a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47770", "type": "seen", "source": "https://t.me/cvedetector/17131", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47770 - \"Apache Wazuh Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-47770 \nPublished : Feb. 3, 2025, 10:15 p.m. | 23\u00a0minutes ago \nDescription : Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. This vulnerability occurs when the system has weak privilege access, that allows an attacker to do privilege escalation. In this case the attacker is able to view agent list on Wazuh dashboard with no privilege access. This issue has been addressed in release version 4.9.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T23:40:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/993298bd-276f-4193-b1d2-abad750361a9/export</guid>
      <pubDate>Mon, 03 Feb 2025 23:40:57 +0000</pubDate>
    </item>
    <item>
      <title>2cf9931d-fe4c-40dd-9c1f-6dba14698d59</title>
      <link>https://vulnerability.circl.lu/sighting/2cf9931d-fe4c-40dd-9c1f-6dba14698d59/export</link>
      <description>{"uuid": "2cf9931d-fe4c-40dd-9c1f-6dba14698d59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47770", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhcxybcipi2e", "content": "", "creation_timestamp": "2025-02-04T02:08:35.004772Z"}</description>
      <content:encoded>{"uuid": "2cf9931d-fe4c-40dd-9c1f-6dba14698d59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47770", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhcxybcipi2e", "content": "", "creation_timestamp": "2025-02-04T02:08:35.004772Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2cf9931d-fe4c-40dd-9c1f-6dba14698d59/export</guid>
      <pubDate>Tue, 04 Feb 2025 02:08:35 +0000</pubDate>
    </item>
    <item>
      <title>8a3a6256-fd4b-441f-b084-ec886e5c37b7</title>
      <link>https://vulnerability.circl.lu/sighting/8a3a6256-fd4b-441f-b084-ec886e5c37b7/export</link>
      <description>{"uuid": "8a3a6256-fd4b-441f-b084-ec886e5c37b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47770", "type": "seen", "source": "Telegram/QUjVvhUeJmWIkRMgVDRen6i9vWmpRZKMojAQ8cq0WZw_kykY", "content": "", "creation_timestamp": "2025-02-06T02:40:20.000000Z"}</description>
      <content:encoded>{"uuid": "8a3a6256-fd4b-441f-b084-ec886e5c37b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47770", "type": "seen", "source": "Telegram/QUjVvhUeJmWIkRMgVDRen6i9vWmpRZKMojAQ8cq0WZw_kykY", "content": "", "creation_timestamp": "2025-02-06T02:40:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8a3a6256-fd4b-441f-b084-ec886e5c37b7/export</guid>
      <pubDate>Thu, 06 Feb 2025 02:40:20 +0000</pubDate>
    </item>
    <item>
      <title>234a6c28-2374-469c-b1bb-5f5127f4a2c3</title>
      <link>https://vulnerability.circl.lu/sighting/234a6c28-2374-469c-b1bb-5f5127f4a2c3/export</link>
      <description>{"uuid": "234a6c28-2374-469c-b1bb-5f5127f4a2c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47773", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lthtj6c3yl2t", "content": "", "creation_timestamp": "2025-07-08T17:34:12.251116Z"}</description>
      <content:encoded>{"uuid": "234a6c28-2374-469c-b1bb-5f5127f4a2c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47773", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lthtj6c3yl2t", "content": "", "creation_timestamp": "2025-07-08T17:34:12.251116Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/234a6c28-2374-469c-b1bb-5f5127f4a2c3/export</guid>
      <pubDate>Tue, 08 Jul 2025 17:34:12 +0000</pubDate>
    </item>
    <item>
      <title>64093e93-4371-4f93-9742-ea0098aaa890</title>
      <link>https://vulnerability.circl.lu/sighting/64093e93-4371-4f93-9742-ea0098aaa890/export</link>
      <description>{"uuid": "64093e93-4371-4f93-9742-ea0098aaa890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47773", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ltkpmaz65o22", "content": "", "creation_timestamp": "2025-07-09T21:02:21.089780Z"}</description>
      <content:encoded>{"uuid": "64093e93-4371-4f93-9742-ea0098aaa890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47773", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ltkpmaz65o22", "content": "", "creation_timestamp": "2025-07-09T21:02:21.089780Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/64093e93-4371-4f93-9742-ea0098aaa890/export</guid>
      <pubDate>Wed, 09 Jul 2025 21:02:21 +0000</pubDate>
    </item>
    <item>
      <title>957dda8e-4e9f-42d4-9779-34d9b4054fa1</title>
      <link>https://vulnerability.circl.lu/sighting/957dda8e-4e9f-42d4-9779-34d9b4054fa1/export</link>
      <description>{"uuid": "957dda8e-4e9f-42d4-9779-34d9b4054fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47778", "type": "seen", "source": "https://bsky.app/profile/euvd-bot.bsky.social/post/3mhr63cyqys2q", "content": "", "creation_timestamp": "2026-03-23T23:01:08.531982Z"}</description>
      <content:encoded>{"uuid": "957dda8e-4e9f-42d4-9779-34d9b4054fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47778", "type": "seen", "source": "https://bsky.app/profile/euvd-bot.bsky.social/post/3mhr63cyqys2q", "content": "", "creation_timestamp": "2026-03-23T23:01:08.531982Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/957dda8e-4e9f-42d4-9779-34d9b4054fa1/export</guid>
      <pubDate>Mon, 23 Mar 2026 23:01:08 +0000</pubDate>
    </item>
  </channel>
</rss>
