<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T11:15:04.926035+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/61cfe3e4-cc9e-4e44-8b61-436a99b70974/export</id>
    <title>61cfe3e4-cc9e-4e44-8b61-436a99b70974</title>
    <updated>2026-04-30T11:15:05.367576+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "61cfe3e4-cc9e-4e44-8b61-436a99b70974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45346", "type": "seen", "source": "https://t.me/cvedetector/4310", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45346 - Xiaomi Security Center Authenticated Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-45346 \nPublished : Aug. 28, 2024, 7:15 a.m. | 37\u00a0minutes ago \nDescription : The Xiaomi Security Center expresses heartfelt thanks to Ken Gannon and Ilyes Beghdadi of NCC Group working with Trend Micro Zero Day Initiative! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-28T10:06:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/61cfe3e4-cc9e-4e44-8b61-436a99b70974/export"/>
    <published>2024-08-28T10:06:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/393a99e0-5fca-4f32-8650-397fec371cdf/export</id>
    <title>393a99e0-5fca-4f32-8650-397fec371cdf</title>
    <updated>2026-04-30T11:15:05.367489+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "393a99e0-5fca-4f32-8650-397fec371cdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45346", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1008", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45346\n\ud83d\udd39 Description: A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code.\n\ud83d\udccf Published: 2024-08-28T06:44:40.297Z\n\ud83d\udccf Modified: 2025-01-09T17:40:39.917Z\n\ud83d\udd17 References:\n1. https://trust.mi.com/misrc/bulletins/advisory?cveId=545", "creation_timestamp": "2025-01-09T18:19:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/393a99e0-5fca-4f32-8650-397fec371cdf/export"/>
    <published>2025-01-09T18:19:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/415e0faa-2fc9-4794-a3ad-141fc64dadc7/export</id>
    <title>415e0faa-2fc9-4794-a3ad-141fc64dadc7</title>
    <updated>2026-04-30T11:15:05.367385+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "415e0faa-2fc9-4794-a3ad-141fc64dadc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45346", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7584", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45346\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A code execution vulnerability exists in the XiaomiGetApps application product. This vulnerability is caused by the verification logic being bypassed, and an attacker can exploit this vulnerability to execute malicious code.\n\ud83d\udccf Published: 2024-08-28T06:44:40.297Z\n\ud83d\udccf Modified: 2025-03-14T16:33:17.948Z\n\ud83d\udd17 References:\n1. https://trust.mi.com/misrc/bulletins/advisory?cveId=545", "creation_timestamp": "2025-03-14T16:43:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/415e0faa-2fc9-4794-a3ad-141fc64dadc7/export"/>
    <published>2025-03-14T16:43:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0faef8d2-6ae5-4625-83cb-ced9a1c114be/export</id>
    <title>0faef8d2-6ae5-4625-83cb-ced9a1c114be</title>
    <updated>2026-04-30T11:15:05.365841+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0faef8d2-6ae5-4625-83cb-ced9a1c114be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45346", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9031", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45346\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Xiaomi Security Center expresses heartfelt thanks to Ken Gannon and Ilyes Beghdadi of NCC Group working with Trend Micro Zero Day Initiative! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Security Center (MiSRC) to jointly ensure the safe access of millions of Xiaomi users worldwide Life.\n\ud83d\udccf Published: 2024-08-28T06:44:40.297Z\n\ud83d\udccf Modified: 2025-03-27T06:53:40.971Z\n\ud83d\udd17 References:\n1. https://trust.mi.com/misrc/bulletins/advisory?cveId=545", "creation_timestamp": "2025-03-27T07:26:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0faef8d2-6ae5-4625-83cb-ced9a1c114be/export"/>
    <published>2025-03-27T07:26:08+00:00</published>
  </entry>
</feed>
