<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T23:08:44.832174+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/50756d89-a7e2-4217-bd37-8c0c38f0d732/export</id>
    <title>50756d89-a7e2-4217-bd37-8c0c38f0d732</title>
    <updated>2026-05-05T23:08:45.265586+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "50756d89-a7e2-4217-bd37-8c0c38f0d732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "seen", "source": "https://t.me/cvedetector/1213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41107 - CloudStack SAML Authentication Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41107 \nPublished : July 19, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account.\u00a0In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.  \n  \nAffected users are recommended to disable the SAML authentication plugin by setting the\u00a0\"saml2.enabled\" global setting to \"false\", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T13:42:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/50756d89-a7e2-4217-bd37-8c0c38f0d732/export"/>
    <published>2024-07-19T13:42:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ee9d461d-dffb-4fe3-831a-d4f0638d2a84/export</id>
    <title>ee9d461d-dffb-4fe3-831a-d4f0638d2a84</title>
    <updated>2026-05-05T23:08:45.265518+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ee9d461d-dffb-4fe3-831a-d4f0638d2a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/6891", "content": "\u200aCVE-2024-41107: Apache CloudStack Vulnerability Exposes User Accounts to Compromise\n\nhttps://securityonline.info/cve-2024-41107-apache-cloudstack-vulnerability-exposes-user-accounts-to-compromise/", "creation_timestamp": "2024-07-22T10:18:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ee9d461d-dffb-4fe3-831a-d4f0638d2a84/export"/>
    <published>2024-07-22T10:18:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/50400824-f130-4943-b40a-b1bf3403248c/export</id>
    <title>50400824-f130-4943-b40a-b1bf3403248c</title>
    <updated>2026-05-05T23:08:45.265453+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "50400824-f130-4943-b40a-b1bf3403248c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8060", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aThis repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack\nURL\uff1ahttps://github.com/d0rb/CVE-2024-41107\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-23T09:46:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/50400824-f130-4943-b40a-b1bf3403248c/export"/>
    <published>2024-07-23T09:46:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d5bad6c3-e866-4ff1-8d08-afab183a8ff1/export</id>
    <title>d5bad6c3-e866-4ff1-8d08-afab183a8ff1</title>
    <updated>2026-05-05T23:08:45.265385+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d5bad6c3-e866-4ff1-8d08-afab183a8ff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2176", "content": "CVE-2024-41107\n*\nApache CloudStack \n*\n\u0412\u0435\u0440\u0441\u0438\u0438 \u0441 4.5.0 \u043f\u043e 4.18.2.1 \u0438 \u0441 4.19.0.0 \u043f\u043e 4.19.0.2.\n*\n\u0414\u044b\u0440\u043a\u0430 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 SAML\n*\n\u0414\u043b\u044f \u0430\u0434\u043c\u0438\u043d\u043e\u0432\\white:  saml2.enabled \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043d\u0430 saml2.false \u0431\u0433\u0433))\n\n#apache #saml", "creation_timestamp": "2024-07-23T17:36:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d5bad6c3-e866-4ff1-8d08-afab183a8ff1/export"/>
    <published>2024-07-23T17:36:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9330841a-1eab-4735-864e-c1f4d78f5bc8/export</id>
    <title>9330841a-1eab-4735-864e-c1f4d78f5bc8</title>
    <updated>2026-05-05T23:08:45.265316+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9330841a-1eab-4735-864e-c1f4d78f5bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/70", "content": "CVE-2024-41107\n*\nApache CloudStack \n*\n\u0412\u0435\u0440\u0441\u0438\u0438 \u0441 4.5.0 \u043f\u043e 4.18.2.1 \u0438 \u0441 4.19.0.0 \u043f\u043e 4.19.0.2.\n*\n\u0414\u044b\u0440\u043a\u0430 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 SAML\n*\n\u0414\u043b\u044f \u0430\u0434\u043c\u0438\u043d\u043e\u0432\\white:  saml2.enabled \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043d\u0430 saml2.false \u0431\u0433\u0433))\n\n#apache #saml", "creation_timestamp": "2024-07-30T04:20:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9330841a-1eab-4735-864e-c1f4d78f5bc8/export"/>
    <published>2024-07-30T04:20:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/517c9fa1-4e0d-4efb-b69b-3cc9aa6336a9/export</id>
    <title>517c9fa1-4e0d-4efb-b69b-3cc9aa6336a9</title>
    <updated>2026-05-05T23:08:45.265242+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "517c9fa1-4e0d-4efb-b69b-3cc9aa6336a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41109", "type": "seen", "source": "https://t.me/cvedetector/2039", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41109 - Pimcore Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41109 \nPublished : July 30, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Navigating to `/admin/index/statistics` with a logged in Pimcore user exposes information about the Pimcore installation, PHP version, MYSQL version, installed bundles and all database tables and their row count in the system.  This vulnerability is fixed in 1.5.2, 1.4.6, and 1.3.10. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T18:15:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/517c9fa1-4e0d-4efb-b69b-3cc9aa6336a9/export"/>
    <published>2024-07-30T18:15:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fde5f196-4f63-43d7-ba5d-c4575c0b29ea/export</id>
    <title>fde5f196-4f63-43d7-ba5d-c4575c0b29ea</title>
    <updated>2026-05-05T23:08:45.265124+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fde5f196-4f63-43d7-ba5d-c4575c0b29ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41108", "type": "seen", "source": "https://t.me/cvedetector/2164", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41108 - FOG Hostinfo Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41108 \nPublished : July 31, 2024, 7:15 p.m. | 32\u00a0minutes ago \nDescription : FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host.\u00a0Otherwise, an error message containing \"Invalid tasking!\" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings.  This vulnerability is fixed in 1.5.10.41. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T21:51:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fde5f196-4f63-43d7-ba5d-c4575c0b29ea/export"/>
    <published>2024-07-31T21:51:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eda819aa-3dfb-4b9c-9bcc-cc3ddbba832d/export</id>
    <title>eda819aa-3dfb-4b9c-9bcc-cc3ddbba832d</title>
    <updated>2026-05-05T23:08:45.264903+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eda819aa-3dfb-4b9c-9bcc-cc3ddbba832d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4302", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41107\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-07-19T11:15:03.323\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. http://www.openwall.com/lists/oss-security/2024/07/19/1\n2. http://www.openwall.com/lists/oss-security/2024/07/19/2\n3. https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107\n4. https://github.com/apache/cloudstack/issues/4519\n5. https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3\n6. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107\n7. http://www.openwall.com/lists/oss-security/2024/07/19/1\n8. http://www.openwall.com/lists/oss-security/2024/07/19/2\n9. https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107\n10. https://github.com/apache/cloudstack/issues/4519\n11. https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3\n12. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107", "creation_timestamp": "2025-02-13T19:10:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eda819aa-3dfb-4b9c-9bcc-cc3ddbba832d/export"/>
    <published>2025-02-13T19:10:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3f43025e-717e-46e4-bf8b-48c789258194/export</id>
    <title>3f43025e-717e-46e4-bf8b-48c789258194</title>
    <updated>2026-05-05T23:08:45.261708+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3f43025e-717e-46e4-bf8b-48c789258194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "seen", "source": "Telegram/wU-S_9jya7RZ2wvc-X65k6zed65yLtdSpRsjHNh-iDDt7Fu6", "content": "", "creation_timestamp": "2025-02-21T22:10:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3f43025e-717e-46e4-bf8b-48c789258194/export"/>
    <published>2025-02-21T22:10:26+00:00</published>
  </entry>
</feed>
