<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:05:25.408940+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/07ee0359-5a4e-4be1-8f5b-f5e31969e997/export</id>
    <title>07ee0359-5a4e-4be1-8f5b-f5e31969e997</title>
    <updated>2026-05-04T14:05:25.803446+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "07ee0359-5a4e-4be1-8f5b-f5e31969e997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7079", "type": "seen", "source": "https://t.me/cvedetector/1573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7079 - OpenShift Helm Chart Unauthenticated Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7079 \nPublished : July 24, 2024, 4:15 p.m. | 35\u00a0minutes ago \nDescription : A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T19:09:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/07ee0359-5a4e-4be1-8f5b-f5e31969e997/export"/>
    <published>2024-07-24T19:09:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2b6fc4e1-1425-48b5-9b9a-0d908e4f7e44/export</id>
    <title>2b6fc4e1-1425-48b5-9b9a-0d908e4f7e44</title>
    <updated>2026-05-04T14:05:25.772455+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2b6fc4e1-1425-48b5-9b9a-0d908e4f7e44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7079", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17684", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-7079\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.\n\ud83d\udccf Published: 2024-07-24T15:51:36.331Z\n\ud83d\udccf Modified: 2025-05-27T17:32:03.599Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-7079\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2299678", "creation_timestamp": "2025-05-27T17:48:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2b6fc4e1-1425-48b5-9b9a-0d908e4f7e44/export"/>
    <published>2025-05-27T17:48:50+00:00</published>
  </entry>
</feed>
