<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T00:25:22.201885+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0bbc5c04-bd3a-4dc2-8061-3cd9e08b3ad5/export</id>
    <title>0bbc5c04-bd3a-4dc2-8061-3cd9e08b3ad5</title>
    <updated>2026-05-08T00:25:22.590060+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0bbc5c04-bd3a-4dc2-8061-3cd9e08b3ad5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40620", "type": "seen", "source": "https://t.me/cvedetector/3204", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40620 - Fleetmanager Console\u0e2a\u0e32\u0e27 Dashboard Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-40620 \nPublished : Aug. 14, 2024, 8:15 p.m. | 40\u00a0minutes ago \nDescription : CVE-2024-40620 IMPACT  \n  \nA vulnerability exists in the affected product due to lack of encryption of sensitive information. The vulnerability results in data being sent between the Console and the Dashboard without encryption, which can be seen in the logs of proxy servers, potentially impacting the data's confidentiality. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T23:15:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0bbc5c04-bd3a-4dc2-8061-3cd9e08b3ad5/export"/>
    <published>2024-08-14T23:15:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d7210102-c1d1-44be-9bbb-4c2fb2614a11/export</id>
    <title>d7210102-c1d1-44be-9bbb-4c2fb2614a11</title>
    <updated>2026-05-08T00:25:22.587557+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d7210102-c1d1-44be-9bbb-4c2fb2614a11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40620", "type": "seen", "source": "Telegram/7sDNxOWL8aFRgQuu_lWA_yTPVg4MtdQnjHb22Nw28EUeiiYu", "content": "", "creation_timestamp": "2025-02-01T17:28:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d7210102-c1d1-44be-9bbb-4c2fb2614a11/export"/>
    <published>2025-02-01T17:28:09+00:00</published>
  </entry>
</feed>
