<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 01:17:41 +0000</lastBuildDate>
    <item>
      <title>33c85573-87b3-4871-af18-1c0183004c25</title>
      <link>https://vulnerability.circl.lu/sighting/33c85573-87b3-4871-af18-1c0183004c25/export</link>
      <description>{"uuid": "33c85573-87b3-4871-af18-1c0183004c25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31200", "type": "seen", "source": "https://t.me/cvedetector/2145", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31200 - Apache HTTP Server Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31200 \nPublished : July 31, 2024, 2:15 p.m. | 26\u00a0minutes ago \nDescription : A \u201cCWE-201: Insertion of Sensitive Information Into Sent Data\u201d affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext when an administrative session is open in the browser. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T16:50:12.000000Z"}</description>
      <content:encoded>{"uuid": "33c85573-87b3-4871-af18-1c0183004c25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31200", "type": "seen", "source": "https://t.me/cvedetector/2145", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31200 - Apache HTTP Server Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31200 \nPublished : July 31, 2024, 2:15 p.m. | 26\u00a0minutes ago \nDescription : A \u201cCWE-201: Insertion of Sensitive Information Into Sent Data\u201d affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext when an administrative session is open in the browser. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T16:50:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/33c85573-87b3-4871-af18-1c0183004c25/export</guid>
      <pubDate>Wed, 31 Jul 2024 16:50:12 +0000</pubDate>
    </item>
  </channel>
</rss>
