<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 14:25:13 +0000</lastBuildDate>
    <item>
      <title>345db882-65d2-462e-b286-290bb8272f98</title>
      <link>https://vulnerability.circl.lu/sighting/345db882-65d2-462e-b286-290bb8272f98/export</link>
      <description>{"uuid": "345db882-65d2-462e-b286-290bb8272f98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38817", "type": "seen", "source": "https://t.me/cvedetector/7529", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38817 - NSX Edge Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-38817 \nPublished : Oct. 9, 2024, 8:15 p.m. | 44\u00a0minutes ago \nDescription : Mware NSX contains a command injection vulnerability.\u00a0  \n  \nA malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T23:11:15.000000Z"}</description>
      <content:encoded>{"uuid": "345db882-65d2-462e-b286-290bb8272f98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38817", "type": "seen", "source": "https://t.me/cvedetector/7529", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38817 - NSX Edge Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-38817 \nPublished : Oct. 9, 2024, 8:15 p.m. | 44\u00a0minutes ago \nDescription : Mware NSX contains a command injection vulnerability.\u00a0  \n  \nA malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T23:11:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/345db882-65d2-462e-b286-290bb8272f98/export</guid>
      <pubDate>Wed, 09 Oct 2024 23:11:15 +0000</pubDate>
    </item>
  </channel>
</rss>
