<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T08:14:17.529564+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/973d30b2-3ff6-40a3-8281-917b82743f39/export</id>
    <title>973d30b2-3ff6-40a3-8281-917b82743f39</title>
    <updated>2026-05-11T08:14:17.916757+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "973d30b2-3ff6-40a3-8281-917b82743f39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6598", "type": "seen", "source": "https://t.me/cvedetector/350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6598 - A denial-of-service attack is possible through the\", \n  \"Content\": \"CVE ID : CVE-2024-6598 \nPublished : July 9, 2024, 2:15 p.m. | 26\u00a0minutes ago \nDescription : A denial-of-service attack is possible through the execution functionality of KNIME Business Hub 1.10.0 and 1.10.1. It allows an authenticated attacker with job execution privileges to execute a job that causes internal messages to pile up until there are no more resources available for processing new messages. This leads to an outage of most functionality of KNIME Business Hub. Recovery from the situation is only possible by manual administrator interaction. Please contact our support for instructions in case you have run into this situation.  \n  \n  \nUpdating to KNIME Business Hub 1.10.2 or later solves the problem. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T16:52:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/973d30b2-3ff6-40a3-8281-917b82743f39/export"/>
    <published>2024-07-09T16:52:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3cd8040c-c311-4c09-95da-ea60b9f0c7e1/export</id>
    <title>3cd8040c-c311-4c09-95da-ea60b9f0c7e1</title>
    <updated>2026-05-11T08:14:17.914108+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "3cd8040c-c311-4c09-95da-ea60b9f0c7e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-6598", "type": "seen", "source": "https://www.knime.com/security/advisories#CVE-2026-4649", "content": "", "creation_timestamp": "2026-03-25T03:00:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3cd8040c-c311-4c09-95da-ea60b9f0c7e1/export"/>
    <published>2026-03-25T03:00:10+00:00</published>
  </entry>
</feed>
