<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T08:43:42.899228+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4bfe35e0-e28b-4a2a-aa81-7fcd6603f014/export</id>
    <title>4bfe35e0-e28b-4a2a-aa81-7fcd6603f014</title>
    <updated>2026-05-07T08:43:43.507724+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4bfe35e0-e28b-4a2a-aa81-7fcd6603f014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5911", "type": "seen", "source": "https://t.me/cvedetector/572", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5911 - An arbitrary file upload vulnerability in Palo Alt\", \n  \"Content\": \"CVE ID : CVE-2024-5911 \nPublished : July 10, 2024, 7:15 p.m. | 26\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T21:49:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4bfe35e0-e28b-4a2a-aa81-7fcd6603f014/export"/>
    <published>2024-07-10T21:49:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a62948ad-38ce-4b49-85c5-c5da6172694f/export</id>
    <title>a62948ad-38ce-4b49-85c5-c5da6172694f</title>
    <updated>2026-05-07T08:43:43.471697+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "a62948ad-38ce-4b49-85c5-c5da6172694f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-5911", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1331", "content": "", "creation_timestamp": "2024-07-12T04:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a62948ad-38ce-4b49-85c5-c5da6172694f/export"/>
    <published>2024-07-12T04:00:00+00:00</published>
  </entry>
</feed>
