<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 10:59:20 +0000</lastBuildDate>
    <item>
      <title>4c34ad82-5e06-4694-acec-02937ed0eb4b</title>
      <link>https://vulnerability.circl.lu/sighting/4c34ad82-5e06-4694-acec-02937ed0eb4b/export</link>
      <description>{"uuid": "4c34ad82-5e06-4694-acec-02937ed0eb4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7553", "type": "seen", "source": "https://t.me/cvedetector/2677", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7553 - MongoDB Windows Local File System Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-7553 \nPublished : Aug. 7, 2024, 10:15 a.m. | 24\u00a0minutes ago \nDescription : Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.  \n  \nRequired Configuration:  \n  \nOnly environments with Windows as the underlying operating system is affected by this issue \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T12:47:24.000000Z"}</description>
      <content:encoded>{"uuid": "4c34ad82-5e06-4694-acec-02937ed0eb4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7553", "type": "seen", "source": "https://t.me/cvedetector/2677", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7553 - MongoDB Windows Local File System Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-7553 \nPublished : Aug. 7, 2024, 10:15 a.m. | 24\u00a0minutes ago \nDescription : Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.  \n  \nRequired Configuration:  \n  \nOnly environments with Windows as the underlying operating system is affected by this issue \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T12:47:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4c34ad82-5e06-4694-acec-02937ed0eb4b/export</guid>
      <pubDate>Wed, 07 Aug 2024 12:47:24 +0000</pubDate>
    </item>
    <item>
      <title>b9cc629d-a212-465c-9a90-76669038de48</title>
      <link>https://vulnerability.circl.lu/sighting/b9cc629d-a212-465c-9a90-76669038de48/export</link>
      <description>{"uuid": "b9cc629d-a212-465c-9a90-76669038de48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7553", "type": "seen", "source": "https://t.me/HackingInsights/9239", "content": "\u200aMongoDB Patches High-Severity Windows Vulnerability (CVE-2024-7553) in Multiple Products\n\nhttps://securityonline.info/mongodb-patches-high-severity-windows-vulnerability-cve-2024-7553-in-multiple-products/", "creation_timestamp": "2024-08-10T21:41:30.000000Z"}</description>
      <content:encoded>{"uuid": "b9cc629d-a212-465c-9a90-76669038de48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7553", "type": "seen", "source": "https://t.me/HackingInsights/9239", "content": "\u200aMongoDB Patches High-Severity Windows Vulnerability (CVE-2024-7553) in Multiple Products\n\nhttps://securityonline.info/mongodb-patches-high-severity-windows-vulnerability-cve-2024-7553-in-multiple-products/", "creation_timestamp": "2024-08-10T21:41:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b9cc629d-a212-465c-9a90-76669038de48/export</guid>
      <pubDate>Sat, 10 Aug 2024 21:41:30 +0000</pubDate>
    </item>
  </channel>
</rss>
