<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T00:36:22.967136+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fad3764d-26ac-4f57-b919-72df2bdc3e90/export</id>
    <title>fad3764d-26ac-4f57-b919-72df2bdc3e90</title>
    <updated>2026-05-06T00:36:23.186181+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fad3764d-26ac-4f57-b919-72df2bdc3e90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44188", "type": "seen", "source": "https://t.me/cvedetector/5778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44188 - Apple macOS Sequoia Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-44188 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15. An app may be able to access protected user data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fad3764d-26ac-4f57-b919-72df2bdc3e90/export"/>
    <published>2024-09-17T03:04:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/099b0598-5aa0-4c78-ae8c-a9fd0aaf68b4/export</id>
    <title>099b0598-5aa0-4c78-ae8c-a9fd0aaf68b4</title>
    <updated>2026-05-06T00:36:23.186115+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "099b0598-5aa0-4c78-ae8c-a9fd0aaf68b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44187", "type": "seen", "source": "https://t.me/cvedetector/5779", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44187 - Safari Cross-Origin Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-44187 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : A cross-origin issue existed with \"iframe\" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/099b0598-5aa0-4c78-ae8c-a9fd0aaf68b4/export"/>
    <published>2024-09-17T03:04:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/61a2d921-4c9f-4d9c-85a0-2b78912e5e73/export</id>
    <title>61a2d921-4c9f-4d9c-85a0-2b78912e5e73</title>
    <updated>2026-05-06T00:36:23.186050+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "61a2d921-4c9f-4d9c-85a0-2b78912e5e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44180", "type": "seen", "source": "https://t.me/cvedetector/5784", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44180 - Apple iOS Lock Screen Contacts Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44180 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18. An attacker with physical access may be able to access contacts from the lock screen. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/61a2d921-4c9f-4d9c-85a0-2b78912e5e73/export"/>
    <published>2024-09-17T03:04:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3ef85d92-6dbd-475e-82b9-fb1378420a85/export</id>
    <title>3ef85d92-6dbd-475e-82b9-fb1378420a85</title>
    <updated>2026-05-06T00:36:23.185986+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3ef85d92-6dbd-475e-82b9-fb1378420a85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44181", "type": "seen", "source": "https://t.me/cvedetector/5785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44181 - Apple macOS Temporary File Handling Memory Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-44181 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to read sensitive location information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3ef85d92-6dbd-475e-82b9-fb1378420a85/export"/>
    <published>2024-09-17T03:04:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/044e1dae-86f3-463d-b69b-fad911646a0b/export</id>
    <title>044e1dae-86f3-463d-b69b-fad911646a0b</title>
    <updated>2026-05-06T00:36:23.185917+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "044e1dae-86f3-463d-b69b-fad911646a0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44186", "type": "seen", "source": "https://t.me/cvedetector/5791", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44186 - Apple macOS Sequoia Data Access Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-44186 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15. An app may be able to access protected user data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/044e1dae-86f3-463d-b69b-fad911646a0b/export"/>
    <published>2024-09-17T03:04:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5474ea07-8d7d-457b-bf6a-57516292ad76/export</id>
    <title>5474ea07-8d7d-457b-bf6a-57516292ad76</title>
    <updated>2026-05-06T00:36:23.185849+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5474ea07-8d7d-457b-bf6a-57516292ad76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44185", "type": "seen", "source": "https://t.me/cvedetector/8819", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44185 - Safari Web Content Crash\", \n  \"Content\": \"CVE ID : CVE-2024-44185 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in tvOS 17.6, visionOS 1.3, Safari 17.6, watchOS 10.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:10:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5474ea07-8d7d-457b-bf6a-57516292ad76/export"/>
    <published>2024-10-24T20:10:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/aaf1d1bb-abe7-464e-a9da-a82d479f735d/export</id>
    <title>aaf1d1bb-abe7-464e-a9da-a82d479f735d</title>
    <updated>2026-05-06T00:36:23.185781+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "aaf1d1bb-abe7-464e-a9da-a82d479f735d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44184", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7588", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44184\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7, iOS 17.7 and iPadOS 17.7, iOS 18 and iPadOS 18, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access user-sensitive data.\n\ud83d\udccf Published: 2024-09-16T23:22:22.803Z\n\ud83d\udccf Modified: 2025-03-14T16:28:40.292Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121234\n2. https://support.apple.com/en-us/121238\n3. https://support.apple.com/en-us/121246\n4. https://support.apple.com/en-us/121250\n5. https://support.apple.com/en-us/121247", "creation_timestamp": "2025-03-14T16:44:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/aaf1d1bb-abe7-464e-a9da-a82d479f735d/export"/>
    <published>2025-03-14T16:44:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d03372e4-2c8b-42a2-9f0a-6924841f1125/export</id>
    <title>d03372e4-2c8b-42a2-9f0a-6924841f1125</title>
    <updated>2026-05-06T00:36:23.185710+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d03372e4-2c8b-42a2-9f0a-6924841f1125", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44188", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8095", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44188\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15. An app may be able to access protected user data.\n\ud83d\udccf Published: 2024-09-16T23:22:24.814Z\n\ud83d\udccf Modified: 2025-03-19T17:03:15.649Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121238", "creation_timestamp": "2025-03-19T17:20:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d03372e4-2c8b-42a2-9f0a-6924841f1125/export"/>
    <published>2025-03-19T17:20:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f9524f65-d3d8-4890-8e02-94ab1d046de2/export</id>
    <title>f9524f65-d3d8-4890-8e02-94ab1d046de2</title>
    <updated>2026-05-06T00:36:23.185607+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f9524f65-d3d8-4890-8e02-94ab1d046de2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44181", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8210", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44181\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to read sensitive location information.\n\ud83d\udccf Published: 2024-09-16T23:22:53.686Z\n\ud83d\udccf Modified: 2025-03-20T14:37:10.088Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121234\n2. https://support.apple.com/en-us/121238\n3. https://support.apple.com/en-us/121247", "creation_timestamp": "2025-03-20T15:18:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f9524f65-d3d8-4890-8e02-94ab1d046de2/export"/>
    <published>2025-03-20T15:18:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/41a4b41e-3148-4be0-8b38-f8551f474195/export</id>
    <title>41a4b41e-3148-4be0-8b38-f8551f474195</title>
    <updated>2026-05-06T00:36:23.183683+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "41a4b41e-3148-4be0-8b38-f8551f474195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4418", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11502", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4418\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being \"freed\" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.\n\ud83d\udccf Published: 2024-05-08T03:03:05.135Z\n\ud83d\udccf Modified: 2025-04-11T22:03:18.932Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:4351\n2. https://access.redhat.com/errata/RHSA-2024:4432\n3. https://access.redhat.com/errata/RHSA-2024:4757\n4. https://access.redhat.com/security/cve/CVE-2024-4418\n5. https://bugzilla.redhat.com/show_bug.cgi?id=2278616", "creation_timestamp": "2025-04-11T22:51:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/41a4b41e-3148-4be0-8b38-f8551f474195/export"/>
    <published>2025-04-11T22:51:32+00:00</published>
  </entry>
</feed>
