<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T02:21:21.971951+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a6d1b24e-426b-4eca-8b45-52a35bc421e5/export</id>
    <title>a6d1b24e-426b-4eca-8b45-52a35bc421e5</title>
    <updated>2026-05-08T02:21:22.402136+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a6d1b24e-426b-4eca-8b45-52a35bc421e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40872", "type": "seen", "source": "https://t.me/cvedetector/1636", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40872 - \"Absolute Secure Access Local Privilege Elevation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-40872 \nPublished : July 25, 2024, 5:15 p.m. | 56\u00a0minutes ago \nDescription : There is an elevation of privilege vulnerability in server  \nand client components of Absolute Secure Access prior to version 13.07.  \nAttackers with local access and valid desktop user credentials can elevate  \ntheir privilege to system level by passing invalid address data to the vulnerable  \ncomponent. This could be used to  \nmanipulate process tokens to elevate the privilege of a normal process to  \nSystem. The scope is changed, the impact to system confidentiality and  \nintegrity is high, the impact to the availability of the effected component is  \nnone. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-25T20:15:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a6d1b24e-426b-4eca-8b45-52a35bc421e5/export"/>
    <published>2024-07-25T20:15:44+00:00</published>
  </entry>
</feed>
