<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 14:47:41 +0000</lastBuildDate>
    <item>
      <title>50c011ec-9ca6-4dc8-a79f-56ae3d60106d</title>
      <link>https://vulnerability.circl.lu/sighting/50c011ec-9ca6-4dc8-a79f-56ae3d60106d/export</link>
      <description>{"uuid": "50c011ec-9ca6-4dc8-a79f-56ae3d60106d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24641", "type": "seen", "source": "https://t.me/cKure/16265", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 CVE-2026-24641\nA NULL Pointer Dereference vulnerability [CWE-476] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow an authenticated attacker to crash the HTTP daemon via crafted HTTP requests.", "creation_timestamp": "2026-04-05T18:54:25.000000Z"}</description>
      <content:encoded>{"uuid": "50c011ec-9ca6-4dc8-a79f-56ae3d60106d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24641", "type": "seen", "source": "https://t.me/cKure/16265", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 CVE-2026-24641\nA NULL Pointer Dereference vulnerability [CWE-476] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow an authenticated attacker to crash the HTTP daemon via crafted HTTP requests.", "creation_timestamp": "2026-04-05T18:54:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/50c011ec-9ca6-4dc8-a79f-56ae3d60106d/export</guid>
      <pubDate>Sun, 05 Apr 2026 18:54:25 +0000</pubDate>
    </item>
  </channel>
</rss>
