<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 02:41:01 +0000</lastBuildDate>
    <item>
      <title>01090e40-989f-4db3-8ae6-81e3359d9697</title>
      <link>https://vulnerability.circl.lu/sighting/01090e40-989f-4db3-8ae6-81e3359d9697/export</link>
      <description>{"uuid": "01090e40-989f-4db3-8ae6-81e3359d9697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3452", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10309\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Tracking Code Manager WordPress plugin before 2.4.0 does not sanitise and escape some of its metabox settings when outputing them in the page, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.\n\ud83d\udccf Published: 2025-01-30T06:30:49Z\n\ud83d\udccf Modified: 2025-01-30T06:30:49Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10309\n2. https://wpscan.com/vulnerability/9eb21250-34bd-4600-a0a5-7c5117f69f04", "creation_timestamp": "2025-01-30T07:11:30.000000Z"}</description>
      <content:encoded>{"uuid": "01090e40-989f-4db3-8ae6-81e3359d9697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3452", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10309\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Tracking Code Manager WordPress plugin before 2.4.0 does not sanitise and escape some of its metabox settings when outputing them in the page, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.\n\ud83d\udccf Published: 2025-01-30T06:30:49Z\n\ud83d\udccf Modified: 2025-01-30T06:30:49Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10309\n2. https://wpscan.com/vulnerability/9eb21250-34bd-4600-a0a5-7c5117f69f04", "creation_timestamp": "2025-01-30T07:11:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/01090e40-989f-4db3-8ae6-81e3359d9697/export</guid>
      <pubDate>Thu, 30 Jan 2025 07:11:30 +0000</pubDate>
    </item>
    <item>
      <title>977823fe-cbd2-4d5f-80eb-09f60a08d56c</title>
      <link>https://vulnerability.circl.lu/sighting/977823fe-cbd2-4d5f-80eb-09f60a08d56c/export</link>
      <description>{"uuid": "977823fe-cbd2-4d5f-80eb-09f60a08d56c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3463", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10309\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-30T06:15:28.827\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/9eb21250-34bd-4600-a0a5-7c5117f69f04/", "creation_timestamp": "2025-01-30T07:18:56.000000Z"}</description>
      <content:encoded>{"uuid": "977823fe-cbd2-4d5f-80eb-09f60a08d56c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3463", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10309\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-30T06:15:28.827\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/9eb21250-34bd-4600-a0a5-7c5117f69f04/", "creation_timestamp": "2025-01-30T07:18:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/977823fe-cbd2-4d5f-80eb-09f60a08d56c/export</guid>
      <pubDate>Thu, 30 Jan 2025 07:18:56 +0000</pubDate>
    </item>
    <item>
      <title>917a1d04-f91d-4ea9-8487-4609b7368ba4</title>
      <link>https://vulnerability.circl.lu/sighting/917a1d04-f91d-4ea9-8487-4609b7368ba4/export</link>
      <description>{"uuid": "917a1d04-f91d-4ea9-8487-4609b7368ba4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "https://t.me/cvedetector/16740", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10309 - WordPress Tracking Code Manager Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10309 \nPublished : Jan. 30, 2025, 6:15 a.m. | 32\u00a0minutes ago \nDescription : The Tracking Code Manager WordPress plugin before 2.4.0 does not sanitise and escape some of its metabox settings when outputing them in the page, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T08:24:43.000000Z"}</description>
      <content:encoded>{"uuid": "917a1d04-f91d-4ea9-8487-4609b7368ba4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "https://t.me/cvedetector/16740", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10309 - WordPress Tracking Code Manager Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10309 \nPublished : Jan. 30, 2025, 6:15 a.m. | 32\u00a0minutes ago \nDescription : The Tracking Code Manager WordPress plugin before 2.4.0 does not sanitise and escape some of its metabox settings when outputing them in the page, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T08:24:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/917a1d04-f91d-4ea9-8487-4609b7368ba4/export</guid>
      <pubDate>Thu, 30 Jan 2025 08:24:43 +0000</pubDate>
    </item>
    <item>
      <title>b582a9a7-a9fb-4263-9e5f-308244ba57d7</title>
      <link>https://vulnerability.circl.lu/sighting/b582a9a7-a9fb-4263-9e5f-308244ba57d7/export</link>
      <description>{"uuid": "b582a9a7-a9fb-4263-9e5f-308244ba57d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgxeq2ruxd2e", "content": "", "creation_timestamp": "2025-01-30T11:24:43.779312Z"}</description>
      <content:encoded>{"uuid": "b582a9a7-a9fb-4263-9e5f-308244ba57d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgxeq2ruxd2e", "content": "", "creation_timestamp": "2025-01-30T11:24:43.779312Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b582a9a7-a9fb-4263-9e5f-308244ba57d7/export</guid>
      <pubDate>Thu, 30 Jan 2025 11:24:43 +0000</pubDate>
    </item>
    <item>
      <title>9b5a6d15-e0b5-4c01-a607-41ff9df461da</title>
      <link>https://vulnerability.circl.lu/sighting/9b5a6d15-e0b5-4c01-a607-41ff9df461da/export</link>
      <description>{"uuid": "9b5a6d15-e0b5-4c01-a607-41ff9df461da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10305", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulqqtez52x", "content": "", "creation_timestamp": "2025-02-11T02:17:33.051586Z"}</description>
      <content:encoded>{"uuid": "9b5a6d15-e0b5-4c01-a607-41ff9df461da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10305", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulqqtez52x", "content": "", "creation_timestamp": "2025-02-11T02:17:33.051586Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9b5a6d15-e0b5-4c01-a607-41ff9df461da/export</guid>
      <pubDate>Tue, 11 Feb 2025 02:17:33 +0000</pubDate>
    </item>
    <item>
      <title>5b35b04b-4703-4435-9a28-d1b52c6f072c</title>
      <link>https://vulnerability.circl.lu/sighting/5b35b04b-4703-4435-9a28-d1b52c6f072c/export</link>
      <description>{"uuid": "5b35b04b-4703-4435-9a28-d1b52c6f072c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10307", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9298", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10307\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: An issue has been discovered in GitLab EE/CE affecting all versions from 12.10 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. A maliciously crafted file can cause uncontrolled CPU consumption when viewing the associated merge request.\n\ud83d\udccf Published: 2025-03-28T10:02:23.294Z\n\ud83d\udccf Modified: 2025-03-28T10:02:23.294Z\n\ud83d\udd17 References:\n1. https://gitlab.com/gitlab-org/gitlab/-/issues/500497\n2. https://hackerone.com/reports/2775113", "creation_timestamp": "2025-03-28T10:28:09.000000Z"}</description>
      <content:encoded>{"uuid": "5b35b04b-4703-4435-9a28-d1b52c6f072c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10307", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9298", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10307\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: An issue has been discovered in GitLab EE/CE affecting all versions from 12.10 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. A maliciously crafted file can cause uncontrolled CPU consumption when viewing the associated merge request.\n\ud83d\udccf Published: 2025-03-28T10:02:23.294Z\n\ud83d\udccf Modified: 2025-03-28T10:02:23.294Z\n\ud83d\udd17 References:\n1. https://gitlab.com/gitlab-org/gitlab/-/issues/500497\n2. https://hackerone.com/reports/2775113", "creation_timestamp": "2025-03-28T10:28:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5b35b04b-4703-4435-9a28-d1b52c6f072c/export</guid>
      <pubDate>Fri, 28 Mar 2025 10:28:09 +0000</pubDate>
    </item>
    <item>
      <title>30502fad-c67b-4a09-b36a-2e99e51b6e2a</title>
      <link>https://vulnerability.circl.lu/sighting/30502fad-c67b-4a09-b36a-2e99e51b6e2a/export</link>
      <description>{"uuid": "30502fad-c67b-4a09-b36a-2e99e51b6e2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10307", "type": "seen", "source": "https://t.me/cvedetector/21409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10307 - GitLab CPU Consumption DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10307 \nPublished : March 28, 2025, 10:15 a.m. | 2\u00a0hours, 4\u00a0minutes ago \nDescription : An issue has been discovered in GitLab EE/CE affecting all versions from 12.10 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. A maliciously crafted file can cause uncontrolled CPU consumption when viewing the associated merge request. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T13:34:09.000000Z"}</description>
      <content:encoded>{"uuid": "30502fad-c67b-4a09-b36a-2e99e51b6e2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10307", "type": "seen", "source": "https://t.me/cvedetector/21409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10307 - GitLab CPU Consumption DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10307 \nPublished : March 28, 2025, 10:15 a.m. | 2\u00a0hours, 4\u00a0minutes ago \nDescription : An issue has been discovered in GitLab EE/CE affecting all versions from 12.10 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. A maliciously crafted file can cause uncontrolled CPU consumption when viewing the associated merge request. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T13:34:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/30502fad-c67b-4a09-b36a-2e99e51b6e2a/export</guid>
      <pubDate>Fri, 28 Mar 2025 13:34:09 +0000</pubDate>
    </item>
    <item>
      <title>e956aa0d-664e-471f-b6db-b081edb6b84c</title>
      <link>https://vulnerability.circl.lu/sighting/e956aa0d-664e-471f-b6db-b081edb6b84c/export</link>
      <description>{"uuid": "e956aa0d-664e-471f-b6db-b081edb6b84c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10306", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnibm34hnw2t", "content": "", "creation_timestamp": "2025-04-23T13:15:11.659082Z"}</description>
      <content:encoded>{"uuid": "e956aa0d-664e-471f-b6db-b081edb6b84c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10306", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnibm34hnw2t", "content": "", "creation_timestamp": "2025-04-23T13:15:11.659082Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e956aa0d-664e-471f-b6db-b081edb6b84c/export</guid>
      <pubDate>Wed, 23 Apr 2025 13:15:11 +0000</pubDate>
    </item>
    <item>
      <title>60d2d3d6-d5c8-4961-8db4-02b3b78319a3</title>
      <link>https://vulnerability.circl.lu/sighting/60d2d3d6-d5c8-4961-8db4-02b3b78319a3/export</link>
      <description>{"uuid": "60d2d3d6-d5c8-4961-8db4-02b3b78319a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10306", "type": "seen", "source": "https://t.me/cvedetector/23589", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10306 - Apache mod_proxy_cluster Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10306 \nPublished : April 23, 2025, 10:15 a.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : A vulnerability was found in mod_proxy_cluster. The issue is that the  directive should be replaced by the  directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T14:29:00.000000Z"}</description>
      <content:encoded>{"uuid": "60d2d3d6-d5c8-4961-8db4-02b3b78319a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10306", "type": "seen", "source": "https://t.me/cvedetector/23589", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10306 - Apache mod_proxy_cluster Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10306 \nPublished : April 23, 2025, 10:15 a.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : A vulnerability was found in mod_proxy_cluster. The issue is that the  directive should be replaced by the  directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T14:29:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/60d2d3d6-d5c8-4961-8db4-02b3b78319a3/export</guid>
      <pubDate>Wed, 23 Apr 2025 14:29:00 +0000</pubDate>
    </item>
    <item>
      <title>8caabd4d-c186-4fad-973f-3a2f96d25819</title>
      <link>https://vulnerability.circl.lu/sighting/8caabd4d-c186-4fad-973f-3a2f96d25819/export</link>
      <description>{"uuid": "8caabd4d-c186-4fad-973f-3a2f96d25819", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "MISP/ca7dfd4e-d0b5-4d10-8982-36d9f6e53c8e", "content": "", "creation_timestamp": "2025-09-01T13:53:38.000000Z"}</description>
      <content:encoded>{"uuid": "8caabd4d-c186-4fad-973f-3a2f96d25819", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10309", "type": "seen", "source": "MISP/ca7dfd4e-d0b5-4d10-8982-36d9f6e53c8e", "content": "", "creation_timestamp": "2025-09-01T13:53:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8caabd4d-c186-4fad-973f-3a2f96d25819/export</guid>
      <pubDate>Mon, 01 Sep 2025 13:53:38 +0000</pubDate>
    </item>
  </channel>
</rss>
