<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:20:43.354516+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/626492f4-fb4b-42c3-8598-0d704b575f31/export</id>
    <title>626492f4-fb4b-42c3-8598-0d704b575f31</title>
    <updated>2026-05-04T19:20:43.758356+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "626492f4-fb4b-42c3-8598-0d704b575f31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-51382", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113431836027378198", "content": "", "creation_timestamp": "2024-11-05T18:47:40.239396Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/626492f4-fb4b-42c3-8598-0d704b575f31/export"/>
    <published>2024-11-05T18:47:40.239396+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ec28a9d5-f601-4492-992b-f09a54ae44b2/export</id>
    <title>ec28a9d5-f601-4492-992b-f09a54ae44b2</title>
    <updated>2026-05-04T19:20:43.756035+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ec28a9d5-f601-4492-992b-f09a54ae44b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51382", "type": "seen", "source": "https://t.me/cvedetector/9940", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51382 - JATOS CSRF Password Reset\", \n  \"Content\": \"CVE ID : CVE-2024-51382 \nPublished : Nov. 5, 2024, 7:15 p.m. | 42\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in JATOS v3.9.3 allows an attacker to reset the administrator's password. This critical security flaw can result in unauthorized access to the platform, enabling attackers to hijack admin accounts and compromise the integrity and security of the system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T21:25:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ec28a9d5-f601-4492-992b-f09a54ae44b2/export"/>
    <published>2024-11-05T21:25:42+00:00</published>
  </entry>
</feed>
