<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:29:59.081082+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d5a2dbc7-444d-4d38-b23a-28f76ea0aa9a/export</id>
    <title>d5a2dbc7-444d-4d38-b23a-28f76ea0aa9a</title>
    <updated>2026-05-04T10:29:59.565178+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d5a2dbc7-444d-4d38-b23a-28f76ea0aa9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46465", "type": "seen", "source": "https://t.me/cvedetector/11139", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46465 - \"IBM CRYHOD Windows Privilege Escalation\"\", \n  \"Content\": \"CVE ID : CVE-2024-46465 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : By default, dedicated folders of CRYHOD for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of CRYHOD has to be modified to prevent this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d5a2dbc7-444d-4d38-b23a-28f76ea0aa9a/export"/>
    <published>2024-11-15T19:58:15+00:00</published>
  </entry>
</feed>
