<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T20:11:53.285940+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/892b605e-f6b0-4ae6-89ee-fd84e7139fd5/export</id>
    <title>892b605e-f6b0-4ae6-89ee-fd84e7139fd5</title>
    <updated>2026-05-08T20:11:53.680392+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "892b605e-f6b0-4ae6-89ee-fd84e7139fd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/3973", "content": "The Hacker News\nVeeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues\n\nVeeam has shipped security updates to address a total of 18 security flaws impacting its software products, including five critical vulnerabilities that could result in remote code execution.\nThe list of shortcomings is below -\n\nCVE-2024-40711 (CVSS score: 9.8) - A vulnerability in Veeam Backup &amp;amp; Replication that allows unauthenticated remote code execution.\n\n\nCVE-2024-42024 (CVSS score: 9.1", "creation_timestamp": "2024-09-05T22:40:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/892b605e-f6b0-4ae6-89ee-fd84e7139fd5/export"/>
    <published>2024-09-05T22:40:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0de6755b-10ac-41b8-9ed9-86029085c014/export</id>
    <title>0de6755b-10ac-41b8-9ed9-86029085c014</title>
    <updated>2026-05-08T20:11:53.680305+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0de6755b-10ac-41b8-9ed9-86029085c014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "Telegram/2paEDeP02FonhasdWZ5DOTlSfP9HXbNaBwWkCheKZVeaUA", "content": "", "creation_timestamp": "2024-09-05T22:40:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0de6755b-10ac-41b8-9ed9-86029085c014/export"/>
    <published>2024-09-05T22:40:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/86bcaf6f-c25c-49f6-a9d0-7978eef6492a/export</id>
    <title>86bcaf6f-c25c-49f6-a9d0-7978eef6492a</title>
    <updated>2026-05-08T20:11:53.680220+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "86bcaf6f-c25c-49f6-a9d0-7978eef6492a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "Telegram/H0bymnaDZsjBJZbbufohqYE3SBtAIPDM1Sz-s9D2SdUOEA", "content": "", "creation_timestamp": "2024-09-06T00:26:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/86bcaf6f-c25c-49f6-a9d0-7978eef6492a/export"/>
    <published>2024-09-06T00:26:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4e31ea18-b9f6-45ce-b24d-c375a2865482/export</id>
    <title>4e31ea18-b9f6-45ce-b24d-c375a2865482</title>
    <updated>2026-05-08T20:11:53.680117+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4e31ea18-b9f6-45ce-b24d-c375a2865482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/KomunitiSiber/2520", "content": "Veeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues\nhttps://thehackernews.com/2024/09/veeam-releases-security-updates-to-fix.html\n\nVeeam has shipped security updates to address a total of 18 security flaws impacting its software products, including five critical vulnerabilities that could result in remote code execution.\nThe list of shortcomings is below -\n\nCVE-2024-40711 (CVSS score: 9.8) - A vulnerability in Veeam Backup &amp;amp; Replication that allows unauthenticated remote code execution.\n\n\nCVE-2024-42024 (CVSS score: 9.1", "creation_timestamp": "2024-09-06T04:50:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4e31ea18-b9f6-45ce-b24d-c375a2865482/export"/>
    <published>2024-09-06T04:50:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cb5b1656-cd44-43ac-9e22-7e50ac1234ba/export</id>
    <title>cb5b1656-cd44-43ac-9e22-7e50ac1234ba</title>
    <updated>2026-05-08T20:11:53.679977+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cb5b1656-cd44-43ac-9e22-7e50ac1234ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/cvedetector/5041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42024 - Veeam ONE Agent Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42024 \nPublished : Sept. 7, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : A vulnerability that allows an attacker in possession of the Veeam ONE Agent service account credentials to perform remote code execution on the machine where the Veeam ONE Agent is installed. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-07T20:10:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cb5b1656-cd44-43ac-9e22-7e50ac1234ba/export"/>
    <published>2024-09-07T20:10:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e1576776-0ca7-4521-80f7-5401a4f77ed6/export</id>
    <title>e1576776-0ca7-4521-80f7-5401a4f77ed6</title>
    <updated>2026-05-08T20:11:53.678911+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e1576776-0ca7-4521-80f7-5401a4f77ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/HackingInsights/12473", "content": "\u200aCritical Flaws in Veeam ONE Expose Systems to RCE (CVE-2024-42024) and Credential Theft (CVE-2024-42019)\n\nhttps://securityonline.info/critical-flaws-in-veeam-one-expose-systems-to-rce-cve-2024-42024-and-credential-theft-cve-2024-42019/", "creation_timestamp": "2024-09-08T17:48:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e1576776-0ca7-4521-80f7-5401a4f77ed6/export"/>
    <published>2024-09-08T17:48:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/47613673-c000-4491-bb55-9afffee0ac86/export</id>
    <title>47613673-c000-4491-bb55-9afffee0ac86</title>
    <updated>2026-05-08T20:11:53.676506+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://vulnerability.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "47613673-c000-4491-bb55-9afffee0ac86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "cve-2024-42024", "type": "seen", "source": "https://vulnerability.circl.lu/comment/4e36fb63-ef06-4e9d-8f57-7b76aebf7bde", "content": "", "creation_timestamp": "2024-09-09T20:48:43.060182Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/47613673-c000-4491-bb55-9afffee0ac86/export"/>
    <published>2024-09-09T20:48:43.060182+00:00</published>
  </entry>
</feed>
