<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 17:08:55 +0000</lastBuildDate>
    <item>
      <title>46657d9e-68a0-4028-b288-0c6cff83179c</title>
      <link>https://vulnerability.circl.lu/sighting/46657d9e-68a0-4028-b288-0c6cff83179c/export</link>
      <description>{"uuid": "46657d9e-68a0-4028-b288-0c6cff83179c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7477", "type": "seen", "source": "https://t.me/cvedetector/2798", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7477 - Avaya Aura System Manager SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7477 \nPublished : Aug. 8, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the\u00a0Avaya Aura System Manager\u00a0database.\u00a0  \n  \nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T18:54:40.000000Z"}</description>
      <content:encoded>{"uuid": "46657d9e-68a0-4028-b288-0c6cff83179c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7477", "type": "seen", "source": "https://t.me/cvedetector/2798", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7477 - Avaya Aura System Manager SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7477 \nPublished : Aug. 8, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : A SQL injection vulnerability was found which could allow a command line interface (CLI) user with administrative privileges to execute arbitrary queries against the\u00a0Avaya Aura System Manager\u00a0database.\u00a0  \n  \nAffected versions include 10.1.x.x and 10.2.x.x. Versions prior to 10.1 are end of manufacturer support. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T18:54:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/46657d9e-68a0-4028-b288-0c6cff83179c/export</guid>
      <pubDate>Thu, 08 Aug 2024 18:54:40 +0000</pubDate>
    </item>
  </channel>
</rss>
