<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T05:16:10.630688+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0c51e2ca-5e74-40b5-8653-5b90d172abf5/export</id>
    <title>0c51e2ca-5e74-40b5-8653-5b90d172abf5</title>
    <updated>2026-05-07T05:16:11.086005+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0c51e2ca-5e74-40b5-8653-5b90d172abf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10526", "type": "seen", "source": "https://t.me/cvedetector/10083", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10526 - Rapid7 Velociraptor Privilege Escalation &amp;amp; Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10526 \nPublished : Nov. 7, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : Rapid7 Velociraptor MSI Installer versions below 0.73.3 suffer from a vulnerability whereby it creates the installation directory with WRITE_DACL permission to the BUILTIN\\\\Users group. This allows local users who are not administrators to grant themselves the Full Control permission on Velociraptor's files. By modifying Velociraptor's files, local users can subvert the binary and cause the Velociraptor service to execute arbitrary code as the SYSTEM user, or to replace the Velociraptor binary completely.\u00a0 This issue is fixed in version 0.73.3. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T12:45:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0c51e2ca-5e74-40b5-8653-5b90d172abf5/export"/>
    <published>2024-11-07T12:45:21+00:00</published>
  </entry>
</feed>
