<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T14:57:05.864558+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d1ca5315-5b5c-4a1d-9b50-ffed164e5e9d/export</id>
    <title>d1ca5315-5b5c-4a1d-9b50-ffed164e5e9d</title>
    <updated>2026-05-06T14:57:06.068437+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d1ca5315-5b5c-4a1d-9b50-ffed164e5e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52542", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113667976394605872", "content": "", "creation_timestamp": "2024-12-17T11:41:15.502163Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d1ca5315-5b5c-4a1d-9b50-ffed164e5e9d/export"/>
    <published>2024-12-17T11:41:15.502163+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/31c25e30-9e5a-498a-a3bb-af8107957bc5/export</id>
    <title>31c25e30-9e5a-498a-a3bb-af8107957bc5</title>
    <updated>2026-05-06T14:57:06.068358+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "31c25e30-9e5a-498a-a3bb-af8107957bc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52542", "type": "seen", "source": "https://t.me/cvedetector/13086", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52542 - Dell AppSync Symlink Following Information Tampering Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52542 \nPublished : Dec. 17, 2024, 12:15 p.m. | 43\u00a0minutes ago \nDescription : Dell AppSync, version 4.6.0.x, contain a Symbolic Link (Symlink) Following vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information tampering. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T14:16:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/31c25e30-9e5a-498a-a3bb-af8107957bc5/export"/>
    <published>2024-12-17T14:16:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bf722504-e26e-4100-8aaf-13dbcb78c098/export</id>
    <title>bf722504-e26e-4100-8aaf-13dbcb78c098</title>
    <updated>2026-05-06T14:57:06.068291+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bf722504-e26e-4100-8aaf-13dbcb78c098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52543", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113714136812107054", "content": "", "creation_timestamp": "2024-12-25T15:20:27.552190Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bf722504-e26e-4100-8aaf-13dbcb78c098/export"/>
    <published>2024-12-25T15:20:27.552190+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ae0898c6-b68b-498f-a7ac-7f30a53510d8/export</id>
    <title>ae0898c6-b68b-498f-a7ac-7f30a53510d8</title>
    <updated>2026-05-06T14:57:06.068219+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ae0898c6-b68b-498f-a7ac-7f30a53510d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52543", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le5e75h5xj2m", "content": "", "creation_timestamp": "2024-12-25T16:15:37.297905Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ae0898c6-b68b-498f-a7ac-7f30a53510d8/export"/>
    <published>2024-12-25T16:15:37.297905+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e73a3d07-54ca-4779-afb3-cb3870a45175/export</id>
    <title>e73a3d07-54ca-4779-afb3-cb3870a45175</title>
    <updated>2026-05-06T14:57:06.068127+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e73a3d07-54ca-4779-afb3-cb3870a45175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52543", "type": "seen", "source": "https://t.me/cvedetector/13632", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52543 - Dell NativeEdge Local Information Disclosure (Temporary File Insecure Permissions)\", \n  \"Content\": \"CVE ID : CVE-2024-52543 \nPublished : Dec. 25, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : Dell NativeEdge, version(s) 2.1.0.0, contain(s) a Creation of Temporary File With Insecure Permissions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:59:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e73a3d07-54ca-4779-afb3-cb3870a45175/export"/>
    <published>2024-12-25T17:59:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/aa2021fd-3c30-4009-84cc-5da074c5441c/export</id>
    <title>aa2021fd-3c30-4009-84cc-5da074c5441c</title>
    <updated>2026-05-06T14:57:06.068054+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "aa2021fd-3c30-4009-84cc-5da074c5441c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likeja4ipd2v", "content": "", "creation_timestamp": "2025-02-19T18:06:44.790723Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/aa2021fd-3c30-4009-84cc-5da074c5441c/export"/>
    <published>2025-02-19T18:06:44.790723+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1678e5b4-c91c-4be5-af09-a62022d0c781/export</id>
    <title>1678e5b4-c91c-4be5-af09-a62022d0c781</title>
    <updated>2026-05-06T14:57:06.067979+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1678e5b4-c91c-4be5-af09-a62022d0c781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114032281469424192", "content": "", "creation_timestamp": "2025-02-19T19:48:50.129678Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1678e5b4-c91c-4be5-af09-a62022d0c781/export"/>
    <published>2025-02-19T19:48:50.129678+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b1182c4a-5136-4388-b9e7-52e8311c8690/export</id>
    <title>b1182c4a-5136-4388-b9e7-52e8311c8690</title>
    <updated>2026-05-06T14:57:06.067889+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b1182c4a-5136-4388-b9e7-52e8311c8690", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "https://t.me/cvedetector/18458", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52541 - Dell Client Platform BIOS Weak Authentication Elevation of Privilege Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52541 \nPublished : Feb. 19, 2025, 5:15 p.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:25:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b1182c4a-5136-4388-b9e7-52e8311c8690/export"/>
    <published>2025-02-19T20:25:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d7ba2227-ec0f-4cc3-865b-68c21f66040b/export</id>
    <title>d7ba2227-ec0f-4cc3-865b-68c21f66040b</title>
    <updated>2026-05-06T14:57:06.067787+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d7ba2227-ec0f-4cc3-865b-68c21f66040b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52544", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-731/", "content": "", "creation_timestamp": "2025-07-30T03:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d7ba2227-ec0f-4cc3-865b-68c21f66040b/export"/>
    <published>2025-07-30T03:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/688fee9d-1dcc-4eaa-a117-17a37ff9a31f/export</id>
    <title>688fee9d-1dcc-4eaa-a117-17a37ff9a31f</title>
    <updated>2026-05-06T14:57:06.065428+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "688fee9d-1dcc-4eaa-a117-17a37ff9a31f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/688fee9d-1dcc-4eaa-a117-17a37ff9a31f/export"/>
    <published>2025-08-25T13:32:05+00:00</published>
  </entry>
</feed>
