<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 17:37:49 +0000</lastBuildDate>
    <item>
      <title>9832c6c3-75d3-48f4-89b7-9bca70271ab2</title>
      <link>https://vulnerability.circl.lu/sighting/9832c6c3-75d3-48f4-89b7-9bca70271ab2/export</link>
      <description>{"uuid": "9832c6c3-75d3-48f4-89b7-9bca70271ab2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39598", "type": "seen", "source": "https://t.me/cvedetector/229", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39598 - SAP CRM (WebClient UI Framework) allows an authent\", \n  \"Content\": \"CVE ID : CVE-2024-39598 \nPublished : July 9, 2024, 4:15 a.m. | 26\u00a0minutes ago \nDescription : SAP CRM (WebClient UI Framework) allows an  \nauthenticated attacker to enumerate accessible HTTP endpoints in the internal  \nnetwork by specially crafting HTTP requests. On successful exploitation this  \ncan result in information disclosure. It has no impact on integrity and  \navailability of the application. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T06:48:03.000000Z"}</description>
      <content:encoded>{"uuid": "9832c6c3-75d3-48f4-89b7-9bca70271ab2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39598", "type": "seen", "source": "https://t.me/cvedetector/229", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39598 - SAP CRM (WebClient UI Framework) allows an authent\", \n  \"Content\": \"CVE ID : CVE-2024-39598 \nPublished : July 9, 2024, 4:15 a.m. | 26\u00a0minutes ago \nDescription : SAP CRM (WebClient UI Framework) allows an  \nauthenticated attacker to enumerate accessible HTTP endpoints in the internal  \nnetwork by specially crafting HTTP requests. On successful exploitation this  \ncan result in information disclosure. It has no impact on integrity and  \navailability of the application. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T06:48:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9832c6c3-75d3-48f4-89b7-9bca70271ab2/export</guid>
      <pubDate>Tue, 09 Jul 2024 06:48:03 +0000</pubDate>
    </item>
  </channel>
</rss>
