<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T04:47:40.578803+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f4a97bac-0de7-4699-a341-bb3e3eed2b2a/export</id>
    <title>f4a97bac-0de7-4699-a341-bb3e3eed2b2a</title>
    <updated>2026-05-10T04:47:40.992763+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f4a97bac-0de7-4699-a341-bb3e3eed2b2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39746", "type": "seen", "source": "https://t.me/cvedetector/3910", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39746 - IBM Sterling Connect:Direct Web Services Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-39746 \nPublished : Aug. 22, 2024, 11:15 a.m. | 44\u00a0minutes ago \nDescription : IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-22T14:21:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f4a97bac-0de7-4699-a341-bb3e3eed2b2a/export"/>
    <published>2024-08-22T14:21:45+00:00</published>
  </entry>
</feed>
