<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 18:14:32 +0000</lastBuildDate>
    <item>
      <title>6783dd36-1fd9-4a1b-b992-486ce4f2ad6c</title>
      <link>https://vulnerability.circl.lu/sighting/6783dd36-1fd9-4a1b-b992-486ce4f2ad6c/export</link>
      <description>{"uuid": "6783dd36-1fd9-4a1b-b992-486ce4f2ad6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6472", "type": "seen", "source": "https://t.me/cvedetector/2445", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6472 - LibreOffice Certificate Validation Vulnerability (Insufficient Warning)\", \n  \"Content\": \"CVE ID : CVE-2024-6472 \nPublished : Aug. 5, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : Certificate Validation user interface in LibreOffice allows potential vulnerability.  \n  \n  \n  \n  \nSigned macros are scripts that have been digitally signed by the   \ndeveloper using a cryptographic signature. When a document with a signed  \n macro is opened a warning is displayed by LibreOffice before the macro   \nis executed.  \n  \nPreviously if verification failed the user could fail to understand the failure and choose to enable the macros anyway.  \n  \n  \nThis issue affects LibreOffice: from 24.2 before 24.2.5. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T16:24:53.000000Z"}</description>
      <content:encoded>{"uuid": "6783dd36-1fd9-4a1b-b992-486ce4f2ad6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6472", "type": "seen", "source": "https://t.me/cvedetector/2445", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6472 - LibreOffice Certificate Validation Vulnerability (Insufficient Warning)\", \n  \"Content\": \"CVE ID : CVE-2024-6472 \nPublished : Aug. 5, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : Certificate Validation user interface in LibreOffice allows potential vulnerability.  \n  \n  \n  \n  \nSigned macros are scripts that have been digitally signed by the   \ndeveloper using a cryptographic signature. When a document with a signed  \n macro is opened a warning is displayed by LibreOffice before the macro   \nis executed.  \n  \nPreviously if verification failed the user could fail to understand the failure and choose to enable the macros anyway.  \n  \n  \nThis issue affects LibreOffice: from 24.2 before 24.2.5. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T16:24:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6783dd36-1fd9-4a1b-b992-486ce4f2ad6c/export</guid>
      <pubDate>Mon, 05 Aug 2024 16:24:53 +0000</pubDate>
    </item>
  </channel>
</rss>
