<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 14:27:25 +0000</lastBuildDate>
    <item>
      <title>040fb25e-9a2c-4801-a448-bfc68df5df85</title>
      <link>https://vulnerability.circl.lu/sighting/040fb25e-9a2c-4801-a448-bfc68df5df85/export</link>
      <description>{"uuid": "040fb25e-9a2c-4801-a448-bfc68df5df85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34689", "type": "seen", "source": "https://t.me/cvedetector/251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34689 - WebFlow Services of SAP Business Workflow allows a\", \n  \"Content\": \"CVE ID : CVE-2024-34689 \nPublished : July 9, 2024, 5:15 a.m. | 19\u00a0minutes ago \nDescription : WebFlow Services of SAP Business Workflow allows  \nan authenticated attacker to enumerate accessible HTTP endpoints in the  \ninternal network by specially crafting HTTP requests. On successful  \nexploitation this can result in information disclosure. It has no impact on  \nintegrity and availability of the application. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T07:38:40.000000Z"}</description>
      <content:encoded>{"uuid": "040fb25e-9a2c-4801-a448-bfc68df5df85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34689", "type": "seen", "source": "https://t.me/cvedetector/251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34689 - WebFlow Services of SAP Business Workflow allows a\", \n  \"Content\": \"CVE ID : CVE-2024-34689 \nPublished : July 9, 2024, 5:15 a.m. | 19\u00a0minutes ago \nDescription : WebFlow Services of SAP Business Workflow allows  \nan authenticated attacker to enumerate accessible HTTP endpoints in the  \ninternal network by specially crafting HTTP requests. On successful  \nexploitation this can result in information disclosure. It has no impact on  \nintegrity and availability of the application. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T07:38:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/040fb25e-9a2c-4801-a448-bfc68df5df85/export</guid>
      <pubDate>Tue, 09 Jul 2024 07:38:40 +0000</pubDate>
    </item>
  </channel>
</rss>
