<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T18:25:36.615359+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7ff2c051-8e88-4f28-a559-9f9792d14d63/export</id>
    <title>7ff2c051-8e88-4f28-a559-9f9792d14d63</title>
    <updated>2026-05-04T18:25:36.969636+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7ff2c051-8e88-4f28-a559-9f9792d14d63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113475023940062776", "content": "", "creation_timestamp": "2024-11-13T09:50:55.048724Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7ff2c051-8e88-4f28-a559-9f9792d14d63/export"/>
    <published>2024-11-13T09:50:55.048724+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/73681553-872d-4e1c-a8a0-937f6acd4f28/export</id>
    <title>73681553-872d-4e1c-a8a0-937f6acd4f28</title>
    <updated>2026-05-04T18:25:36.969504+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "73681553-872d-4e1c-a8a0-937f6acd4f28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://t.me/cvedetector/10814", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8001 - VIWIS LMS Print Handler Remote Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-8001 \nPublished : Nov. 13, 2024, 10:15 a.m. | 38\u00a0minutes ago \nDescription : A vulnerability was found in VIWIS LMS 9.11. It has been classified as critical. Affected is an unknown function of the component Print Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. A user with the role learner can use the administrative print function with an active session before and after an exam slot to access the entire exam including solutions in the web application. It is recommended to apply a patch to fix this issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T12:11:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/73681553-872d-4e1c-a8a0-937f6acd4f28/export"/>
    <published>2024-11-13T12:11:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/01269196-f1b9-42f1-b7c3-84bc287aa1f7/export</id>
    <title>01269196-f1b9-42f1-b7c3-84bc287aa1f7</title>
    <updated>2026-05-04T18:25:36.967055+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "01269196-f1b9-42f1-b7c3-84bc287aa1f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/670", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-8001\n\ud83d\udd39 Description: A vulnerability was found in VIWIS LMS 9.11. It has been classified as critical. Affected is an unknown function of the component Print Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. A user with the role learner can use the administrative print function with an active session before and after an exam slot to access the entire exam including solutions in the web application. It is recommended to apply a patch to fix this issue.\n\ud83d\udccf Published: 2024-11-13T09:47:38.973Z\n\ud83d\udccf Modified: 2025-01-08T06:49:21.233Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.284352\n2. https://vuldb.com/?ctiid.284352\n3. https://www.scip.ch/?news.20241203", "creation_timestamp": "2025-01-08T07:38:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/01269196-f1b9-42f1-b7c3-84bc287aa1f7/export"/>
    <published>2025-01-08T07:38:49+00:00</published>
  </entry>
</feed>
