<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 02:20:34 +0000</lastBuildDate>
    <item>
      <title>c4bafbd3-af72-4600-81b4-5f0615926577</title>
      <link>https://vulnerability.circl.lu/sighting/c4bafbd3-af72-4600-81b4-5f0615926577/export</link>
      <description>{"uuid": "c4bafbd3-af72-4600-81b4-5f0615926577", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39546", "type": "seen", "source": "https://t.me/cvedetector/683", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39546 - A Missing Authorization vulnerability in the Socke\", \n  \"Content\": \"CVE ID : CVE-2024-39546 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.\u00a0  \n  \nThis issue affects Junos OS Evolved:\u00a0  \n  \n  \n  \n  *  All versions prior to 21.2R3-S8-EVO,\u00a0  \n  *  21.4 versions prior to\u00a0 21.4R3-S6-EVO,\u00a0  \n  *  22.1 versions prior to 22.1R3-S5-EVO,\u00a0  \n  *  22.2 versions prior to 22.2R3-S3-EVO,\u00a0  \n  *  22.3 versions prior to 22.3R3-S3-EVO,\u00a0  \n  *  22.4 versions prior to 22.4R3-EVO,\u00a0  \n  *  23.2 versions prior to 23.2R2-EVO. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:59:57.000000Z"}</description>
      <content:encoded>{"uuid": "c4bafbd3-af72-4600-81b4-5f0615926577", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39546", "type": "seen", "source": "https://t.me/cvedetector/683", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39546 - A Missing Authorization vulnerability in the Socke\", \n  \"Content\": \"CVE ID : CVE-2024-39546 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.\u00a0  \n  \nThis issue affects Junos OS Evolved:\u00a0  \n  \n  \n  \n  *  All versions prior to 21.2R3-S8-EVO,\u00a0  \n  *  21.4 versions prior to\u00a0 21.4R3-S6-EVO,\u00a0  \n  *  22.1 versions prior to 22.1R3-S5-EVO,\u00a0  \n  *  22.2 versions prior to 22.2R3-S3-EVO,\u00a0  \n  *  22.3 versions prior to 22.3R3-S3-EVO,\u00a0  \n  *  22.4 versions prior to 22.4R3-EVO,\u00a0  \n  *  23.2 versions prior to 23.2R2-EVO. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:59:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c4bafbd3-af72-4600-81b4-5f0615926577/export</guid>
      <pubDate>Thu, 11 Jul 2024 19:59:57 +0000</pubDate>
    </item>
  </channel>
</rss>
