<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 20:50:31 +0000</lastBuildDate>
    <item>
      <title>fe3c57c9-b5b8-4fa8-81e8-8112872688c0</title>
      <link>https://vulnerability.circl.lu/sighting/fe3c57c9-b5b8-4fa8-81e8-8112872688c0/export</link>
      <description>{"uuid": "fe3c57c9-b5b8-4fa8-81e8-8112872688c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8924", "type": "seen", "source": "https://t.me/cvedetector/9350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8924 - ServiceNow Now Platform Blind SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-8924 \nPublished : Oct. 29, 2024, 5:15 p.m. | 39\u00a0minutes ago \nDescription : ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information.\u00a0ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers.\u00a0Further, the vulnerability is addressed in the listed patches and hot fixes. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T18:57:45.000000Z"}</description>
      <content:encoded>{"uuid": "fe3c57c9-b5b8-4fa8-81e8-8112872688c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8924", "type": "seen", "source": "https://t.me/cvedetector/9350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8924 - ServiceNow Now Platform Blind SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-8924 \nPublished : Oct. 29, 2024, 5:15 p.m. | 39\u00a0minutes ago \nDescription : ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information.\u00a0ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers.\u00a0Further, the vulnerability is addressed in the listed patches and hot fixes. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T18:57:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fe3c57c9-b5b8-4fa8-81e8-8112872688c0/export</guid>
      <pubDate>Tue, 29 Oct 2024 18:57:45 +0000</pubDate>
    </item>
  </channel>
</rss>
