<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 00:43:42 +0000</lastBuildDate>
    <item>
      <title>89b310ee-3647-4e40-8412-5cdf265f5aac</title>
      <link>https://vulnerability.circl.lu/sighting/89b310ee-3647-4e40-8412-5cdf265f5aac/export</link>
      <description>{"uuid": "89b310ee-3647-4e40-8412-5cdf265f5aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10773", "type": "seen", "source": "https://t.me/cvedetector/12210", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10773 - The product is vulnerable to pass-the-hash attacks\", \n  \"Content\": \"CVE ID : CVE-2024-10773 \nPublished : Dec. 6, 2024, 1:15 p.m. | 1\u00a0hour ago \nDescription : The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain  \nfull access to the device. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T15:37:09.000000Z"}</description>
      <content:encoded>{"uuid": "89b310ee-3647-4e40-8412-5cdf265f5aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10773", "type": "seen", "source": "https://t.me/cvedetector/12210", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10773 - The product is vulnerable to pass-the-hash attacks\", \n  \"Content\": \"CVE ID : CVE-2024-10773 \nPublished : Dec. 6, 2024, 1:15 p.m. | 1\u00a0hour ago \nDescription : The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain  \nfull access to the device. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T15:37:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/89b310ee-3647-4e40-8412-5cdf265f5aac/export</guid>
      <pubDate>Fri, 06 Dec 2024 15:37:09 +0000</pubDate>
    </item>
  </channel>
</rss>
