<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:57:25.298156+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f0679f6c-b6e2-4390-8b6e-9ea44fa9d404/export</id>
    <title>f0679f6c-b6e2-4390-8b6e-9ea44fa9d404</title>
    <updated>2026-05-04T14:57:25.646340+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f0679f6c-b6e2-4390-8b6e-9ea44fa9d404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22223", "type": "seen", "source": "https://t.me/ctinow/183379", "content": "https://ift.tt/lIB2HGd\nCVE-2024-22223", "creation_timestamp": "2024-02-12T20:26:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f0679f6c-b6e2-4390-8b6e-9ea44fa9d404/export"/>
    <published>2024-02-12T20:26:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/42b1f243-406b-4982-9d0a-1f6233702bbd/export</id>
    <title>42b1f243-406b-4982-9d0a-1f6233702bbd</title>
    <updated>2026-05-04T14:57:25.644305+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "42b1f243-406b-4982-9d0a-1f6233702bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22223", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15440", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22223\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: \nDell Unity, versions prior to 5.4, contains an OS Command Injection Vulnerability within its svc_cbr utility. An authenticated malicious user with local access could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application.\n\n\n\ud83d\udccf Published: 2024-02-12T19:07:05.811Z\n\ud83d\udccf Modified: 2025-05-07T20:55:48.506Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000222010/dsa-2024-042-dell-unity-dell-unity-vsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities", "creation_timestamp": "2025-05-07T21:22:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/42b1f243-406b-4982-9d0a-1f6233702bbd/export"/>
    <published>2025-05-07T21:22:57+00:00</published>
  </entry>
</feed>
