<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:25:07.508399+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0bf42c19-2313-4bdd-884b-15ee04405815/export</id>
    <title>0bf42c19-2313-4bdd-884b-15ee04405815</title>
    <updated>2026-05-04T09:25:07.734621+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0bf42c19-2313-4bdd-884b-15ee04405815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52534", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le5e72pfqy2f", "content": "", "creation_timestamp": "2024-12-25T16:15:34.632295Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0bf42c19-2313-4bdd-884b-15ee04405815/export"/>
    <published>2024-12-25T16:15:34.632295+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c7a9428f-9760-4c86-92c8-defb6e7b7766/export</id>
    <title>c7a9428f-9760-4c86-92c8-defb6e7b7766</title>
    <updated>2026-05-04T09:25:07.734528+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c7a9428f-9760-4c86-92c8-defb6e7b7766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52535", "type": "seen", "source": "https://t.me/cvedetector/13626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52535 - \"Dell SupportAssist Symlink Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-52535 \nPublished : Dec. 25, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:09:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c7a9428f-9760-4c86-92c8-defb6e7b7766/export"/>
    <published>2024-12-25T17:09:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cd814a38-e7c9-4df9-8d29-9d6428aef0db/export</id>
    <title>cd814a38-e7c9-4df9-8d29-9d6428aef0db</title>
    <updated>2026-05-04T09:25:07.734439+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cd814a38-e7c9-4df9-8d29-9d6428aef0db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52534", "type": "seen", "source": "https://t.me/cvedetector/13633", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52534 - Dell ECS Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52534 \nPublished : Dec. 25, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : Dell ECS, version(s) prior to ECS 3.8.1.3, contain(s) an Authentication Bypass by Capture-replay vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Session theft. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:59:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cd814a38-e7c9-4df9-8d29-9d6428aef0db/export"/>
    <published>2024-12-25T17:59:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c42b3a31-b181-46ad-9758-fb84bfcc93f7/export</id>
    <title>c42b3a31-b181-46ad-9758-fb84bfcc93f7</title>
    <updated>2026-05-04T09:25:07.734354+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c42b3a31-b181-46ad-9758-fb84bfcc93f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52534", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113718159851574023", "content": "", "creation_timestamp": "2024-12-26T08:23:34.203710Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c42b3a31-b181-46ad-9758-fb84bfcc93f7/export"/>
    <published>2024-12-26T08:23:34.203710+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1da5a451-33f1-4460-bfb0-c66ce5a00ea0/export</id>
    <title>1da5a451-33f1-4460-bfb0-c66ce5a00ea0</title>
    <updated>2026-05-04T09:25:07.734274+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1da5a451-33f1-4460-bfb0-c66ce5a00ea0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52535", "type": "seen", "source": "https://bsky.app/profile/cybermaterial.bsky.social/post/3le7mzaa5kl2a", "content": "", "creation_timestamp": "2024-12-26T13:58:43.149002Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1da5a451-33f1-4460-bfb0-c66ce5a00ea0/export"/>
    <published>2024-12-26T13:58:43.149002+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/095cc0c8-5a39-48b6-a69f-2ebda3e4b502/export</id>
    <title>095cc0c8-5a39-48b6-a69f-2ebda3e4b502</title>
    <updated>2026-05-04T09:25:07.734188+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "095cc0c8-5a39-48b6-a69f-2ebda3e4b502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52533", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:38.563189Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/095cc0c8-5a39-48b6-a69f-2ebda3e4b502/export"/>
    <published>2025-07-08T07:10:38.563189+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/19e543fc-bde6-4d64-a428-f47120ab052a/export</id>
    <title>19e543fc-bde6-4d64-a428-f47120ab052a</title>
    <updated>2026-05-04T09:25:07.734095+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "19e543fc-bde6-4d64-a428-f47120ab052a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52533", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3ltgqoa3tmza2", "content": "", "creation_timestamp": "2025-07-08T07:10:48.577590Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/19e543fc-bde6-4d64-a428-f47120ab052a/export"/>
    <published>2025-07-08T07:10:48.577590+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c55467d7-45a0-4e3f-b1eb-ef876b37f346/export</id>
    <title>c55467d7-45a0-4e3f-b1eb-ef876b37f346</title>
    <updated>2026-05-04T09:25:07.733978+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c55467d7-45a0-4e3f-b1eb-ef876b37f346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52537", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c55467d7-45a0-4e3f-b1eb-ef876b37f346/export"/>
    <published>2025-09-16T23:16:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ba00125d-70b3-44e3-9432-94273c7af603/export</id>
    <title>ba00125d-70b3-44e3-9432-94273c7af603</title>
    <updated>2026-05-04T09:25:07.733803+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ba00125d-70b3-44e3-9432-94273c7af603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52537", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ba00125d-70b3-44e3-9432-94273c7af603/export"/>
    <published>2025-09-18T16:44:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3e35de5d-ad35-4e09-b14f-ffe64b6b8c51/export</id>
    <title>3e35de5d-ad35-4e09-b14f-ffe64b6b8c51</title>
    <updated>2026-05-04T09:25:07.730367+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3e35de5d-ad35-4e09-b14f-ffe64b6b8c51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52533", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-06", "content": "", "creation_timestamp": "2026-02-12T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3e35de5d-ad35-4e09-b14f-ffe64b6b8c51/export"/>
    <published>2026-02-12T11:00:00+00:00</published>
  </entry>
</feed>
