<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:48:03.086691+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a13ab460-600f-4563-b45a-95fef8814c19/export</id>
    <title>a13ab460-600f-4563-b45a-95fef8814c19</title>
    <updated>2026-05-04T14:48:03.437783+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a13ab460-600f-4563-b45a-95fef8814c19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41811", "type": "seen", "source": "https://t.me/cvedetector/2495", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41811 - Icinga ipl/web CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41811 \nPublished : Aug. 5, 2024, 9:15 p.m. | 40\u00a0minutes ago \nDescription : ipl/web is a set of common web components for php projects. Some of the recent development by Icinga is, under certain circumstances, susceptible to cross site request forgery. (CSRF). All affected products, in any version, will be unaffected by this once `icinga-php-library` is upgraded. Version 0.10.1 includes a fix for this. It will be published as part of the `icinga-php-library` v0.14.1 release. \nSeverity: 3.9 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T23:56:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a13ab460-600f-4563-b45a-95fef8814c19/export"/>
    <published>2024-08-05T23:56:53+00:00</published>
  </entry>
</feed>
