<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-12T02:13:01.614311+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/52c3e088-835f-4146-92ee-adb15c83c7d9/export</id>
    <title>52c3e088-835f-4146-92ee-adb15c83c7d9</title>
    <updated>2026-05-12T02:13:01.980807+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "52c3e088-835f-4146-92ee-adb15c83c7d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40827", "type": "seen", "source": "https://t.me/cvedetector/1954", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40827 - Apple macOS Arbitrary File Overwrite Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40827 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to overwrite arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/52c3e088-835f-4146-92ee-adb15c83c7d9/export"/>
    <published>2024-07-30T02:21:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d54e6bf5-0679-4c3b-b55d-011882ee9988/export</id>
    <title>d54e6bf5-0679-4c3b-b55d-011882ee9988</title>
    <updated>2026-05-12T02:13:01.978948+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d54e6bf5-0679-4c3b-b55d-011882ee9988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40827", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8702", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40827\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to overwrite arbitrary files.\n\ud83d\udccf Published: 2024-07-29T22:16:41.217Z\n\ud83d\udccf Modified: 2025-03-25T16:10:43.614Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT214120\n2. https://support.apple.com/en-us/HT214119\n3. https://support.apple.com/en-us/HT214118\n4. http://seclists.org/fulldisclosure/2024/Jul/20\n5. http://seclists.org/fulldisclosure/2024/Jul/18\n6. http://seclists.org/fulldisclosure/2024/Jul/19", "creation_timestamp": "2025-03-25T16:25:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d54e6bf5-0679-4c3b-b55d-011882ee9988/export"/>
    <published>2025-03-25T16:25:06+00:00</published>
  </entry>
</feed>
