<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 23:08:44 +0000</lastBuildDate>
    <item>
      <title>50756d89-a7e2-4217-bd37-8c0c38f0d732</title>
      <link>https://vulnerability.circl.lu/sighting/50756d89-a7e2-4217-bd37-8c0c38f0d732/export</link>
      <description>{"uuid": "50756d89-a7e2-4217-bd37-8c0c38f0d732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "seen", "source": "https://t.me/cvedetector/1213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41107 - CloudStack SAML Authentication Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41107 \nPublished : July 19, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account.\u00a0In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.  \n  \nAffected users are recommended to disable the SAML authentication plugin by setting the\u00a0\"saml2.enabled\" global setting to \"false\", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T13:42:10.000000Z"}</description>
      <content:encoded>{"uuid": "50756d89-a7e2-4217-bd37-8c0c38f0d732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "seen", "source": "https://t.me/cvedetector/1213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41107 - CloudStack SAML Authentication Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41107 \nPublished : July 19, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account.\u00a0In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account.  \n  \nAffected users are recommended to disable the SAML authentication plugin by setting the\u00a0\"saml2.enabled\" global setting to \"false\", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T13:42:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/50756d89-a7e2-4217-bd37-8c0c38f0d732/export</guid>
      <pubDate>Fri, 19 Jul 2024 13:42:10 +0000</pubDate>
    </item>
    <item>
      <title>ee9d461d-dffb-4fe3-831a-d4f0638d2a84</title>
      <link>https://vulnerability.circl.lu/sighting/ee9d461d-dffb-4fe3-831a-d4f0638d2a84/export</link>
      <description>{"uuid": "ee9d461d-dffb-4fe3-831a-d4f0638d2a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/6891", "content": "\u200aCVE-2024-41107: Apache CloudStack Vulnerability Exposes User Accounts to Compromise\n\nhttps://securityonline.info/cve-2024-41107-apache-cloudstack-vulnerability-exposes-user-accounts-to-compromise/", "creation_timestamp": "2024-07-22T10:18:14.000000Z"}</description>
      <content:encoded>{"uuid": "ee9d461d-dffb-4fe3-831a-d4f0638d2a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/6891", "content": "\u200aCVE-2024-41107: Apache CloudStack Vulnerability Exposes User Accounts to Compromise\n\nhttps://securityonline.info/cve-2024-41107-apache-cloudstack-vulnerability-exposes-user-accounts-to-compromise/", "creation_timestamp": "2024-07-22T10:18:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ee9d461d-dffb-4fe3-831a-d4f0638d2a84/export</guid>
      <pubDate>Mon, 22 Jul 2024 10:18:14 +0000</pubDate>
    </item>
    <item>
      <title>50400824-f130-4943-b40a-b1bf3403248c</title>
      <link>https://vulnerability.circl.lu/sighting/50400824-f130-4943-b40a-b1bf3403248c/export</link>
      <description>{"uuid": "50400824-f130-4943-b40a-b1bf3403248c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8060", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aThis repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack\nURL\uff1ahttps://github.com/d0rb/CVE-2024-41107\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-23T09:46:37.000000Z"}</description>
      <content:encoded>{"uuid": "50400824-f130-4943-b40a-b1bf3403248c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8060", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aThis repository contains an PoC for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack\nURL\uff1ahttps://github.com/d0rb/CVE-2024-41107\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-23T09:46:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/50400824-f130-4943-b40a-b1bf3403248c/export</guid>
      <pubDate>Tue, 23 Jul 2024 09:46:37 +0000</pubDate>
    </item>
    <item>
      <title>d5bad6c3-e866-4ff1-8d08-afab183a8ff1</title>
      <link>https://vulnerability.circl.lu/sighting/d5bad6c3-e866-4ff1-8d08-afab183a8ff1/export</link>
      <description>{"uuid": "d5bad6c3-e866-4ff1-8d08-afab183a8ff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2176", "content": "CVE-2024-41107\n*\nApache CloudStack \n*\n\u0412\u0435\u0440\u0441\u0438\u0438 \u0441 4.5.0 \u043f\u043e 4.18.2.1 \u0438 \u0441 4.19.0.0 \u043f\u043e 4.19.0.2.\n*\n\u0414\u044b\u0440\u043a\u0430 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 SAML\n*\n\u0414\u043b\u044f \u0430\u0434\u043c\u0438\u043d\u043e\u0432\\white:  saml2.enabled \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043d\u0430 saml2.false \u0431\u0433\u0433))\n\n#apache #saml", "creation_timestamp": "2024-07-23T17:36:44.000000Z"}</description>
      <content:encoded>{"uuid": "d5bad6c3-e866-4ff1-8d08-afab183a8ff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2176", "content": "CVE-2024-41107\n*\nApache CloudStack \n*\n\u0412\u0435\u0440\u0441\u0438\u0438 \u0441 4.5.0 \u043f\u043e 4.18.2.1 \u0438 \u0441 4.19.0.0 \u043f\u043e 4.19.0.2.\n*\n\u0414\u044b\u0440\u043a\u0430 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 SAML\n*\n\u0414\u043b\u044f \u0430\u0434\u043c\u0438\u043d\u043e\u0432\\white:  saml2.enabled \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043d\u0430 saml2.false \u0431\u0433\u0433))\n\n#apache #saml", "creation_timestamp": "2024-07-23T17:36:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d5bad6c3-e866-4ff1-8d08-afab183a8ff1/export</guid>
      <pubDate>Tue, 23 Jul 2024 17:36:44 +0000</pubDate>
    </item>
    <item>
      <title>9330841a-1eab-4735-864e-c1f4d78f5bc8</title>
      <link>https://vulnerability.circl.lu/sighting/9330841a-1eab-4735-864e-c1f4d78f5bc8/export</link>
      <description>{"uuid": "9330841a-1eab-4735-864e-c1f4d78f5bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/70", "content": "CVE-2024-41107\n*\nApache CloudStack \n*\n\u0412\u0435\u0440\u0441\u0438\u0438 \u0441 4.5.0 \u043f\u043e 4.18.2.1 \u0438 \u0441 4.19.0.0 \u043f\u043e 4.19.0.2.\n*\n\u0414\u044b\u0440\u043a\u0430 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 SAML\n*\n\u0414\u043b\u044f \u0430\u0434\u043c\u0438\u043d\u043e\u0432\\white:  saml2.enabled \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043d\u0430 saml2.false \u0431\u0433\u0433))\n\n#apache #saml", "creation_timestamp": "2024-07-30T04:20:52.000000Z"}</description>
      <content:encoded>{"uuid": "9330841a-1eab-4735-864e-c1f4d78f5bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/70", "content": "CVE-2024-41107\n*\nApache CloudStack \n*\n\u0412\u0435\u0440\u0441\u0438\u0438 \u0441 4.5.0 \u043f\u043e 4.18.2.1 \u0438 \u0441 4.19.0.0 \u043f\u043e 4.19.0.2.\n*\n\u0414\u044b\u0440\u043a\u0430 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 SAML\n*\n\u0414\u043b\u044f \u0430\u0434\u043c\u0438\u043d\u043e\u0432\\white:  saml2.enabled \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043d\u0430 saml2.false \u0431\u0433\u0433))\n\n#apache #saml", "creation_timestamp": "2024-07-30T04:20:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9330841a-1eab-4735-864e-c1f4d78f5bc8/export</guid>
      <pubDate>Tue, 30 Jul 2024 04:20:52 +0000</pubDate>
    </item>
    <item>
      <title>517c9fa1-4e0d-4efb-b69b-3cc9aa6336a9</title>
      <link>https://vulnerability.circl.lu/sighting/517c9fa1-4e0d-4efb-b69b-3cc9aa6336a9/export</link>
      <description>{"uuid": "517c9fa1-4e0d-4efb-b69b-3cc9aa6336a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41109", "type": "seen", "source": "https://t.me/cvedetector/2039", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41109 - Pimcore Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41109 \nPublished : July 30, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Navigating to `/admin/index/statistics` with a logged in Pimcore user exposes information about the Pimcore installation, PHP version, MYSQL version, installed bundles and all database tables and their row count in the system.  This vulnerability is fixed in 1.5.2, 1.4.6, and 1.3.10. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T18:15:08.000000Z"}</description>
      <content:encoded>{"uuid": "517c9fa1-4e0d-4efb-b69b-3cc9aa6336a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41109", "type": "seen", "source": "https://t.me/cvedetector/2039", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41109 - Pimcore Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41109 \nPublished : July 30, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Navigating to `/admin/index/statistics` with a logged in Pimcore user exposes information about the Pimcore installation, PHP version, MYSQL version, installed bundles and all database tables and their row count in the system.  This vulnerability is fixed in 1.5.2, 1.4.6, and 1.3.10. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T18:15:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/517c9fa1-4e0d-4efb-b69b-3cc9aa6336a9/export</guid>
      <pubDate>Tue, 30 Jul 2024 18:15:08 +0000</pubDate>
    </item>
    <item>
      <title>fde5f196-4f63-43d7-ba5d-c4575c0b29ea</title>
      <link>https://vulnerability.circl.lu/sighting/fde5f196-4f63-43d7-ba5d-c4575c0b29ea/export</link>
      <description>{"uuid": "fde5f196-4f63-43d7-ba5d-c4575c0b29ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41108", "type": "seen", "source": "https://t.me/cvedetector/2164", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41108 - FOG Hostinfo Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41108 \nPublished : July 31, 2024, 7:15 p.m. | 32\u00a0minutes ago \nDescription : FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host.\u00a0Otherwise, an error message containing \"Invalid tasking!\" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings.  This vulnerability is fixed in 1.5.10.41. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T21:51:25.000000Z"}</description>
      <content:encoded>{"uuid": "fde5f196-4f63-43d7-ba5d-c4575c0b29ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41108", "type": "seen", "source": "https://t.me/cvedetector/2164", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41108 - FOG Hostinfo Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41108 \nPublished : July 31, 2024, 7:15 p.m. | 32\u00a0minutes ago \nDescription : FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host.\u00a0Otherwise, an error message containing \"Invalid tasking!\" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings.  This vulnerability is fixed in 1.5.10.41. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T21:51:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fde5f196-4f63-43d7-ba5d-c4575c0b29ea/export</guid>
      <pubDate>Wed, 31 Jul 2024 21:51:25 +0000</pubDate>
    </item>
    <item>
      <title>eda819aa-3dfb-4b9c-9bcc-cc3ddbba832d</title>
      <link>https://vulnerability.circl.lu/sighting/eda819aa-3dfb-4b9c-9bcc-cc3ddbba832d/export</link>
      <description>{"uuid": "eda819aa-3dfb-4b9c-9bcc-cc3ddbba832d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4302", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41107\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-07-19T11:15:03.323\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. http://www.openwall.com/lists/oss-security/2024/07/19/1\n2. http://www.openwall.com/lists/oss-security/2024/07/19/2\n3. https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107\n4. https://github.com/apache/cloudstack/issues/4519\n5. https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3\n6. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107\n7. http://www.openwall.com/lists/oss-security/2024/07/19/1\n8. http://www.openwall.com/lists/oss-security/2024/07/19/2\n9. https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107\n10. https://github.com/apache/cloudstack/issues/4519\n11. https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3\n12. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107", "creation_timestamp": "2025-02-13T19:10:44.000000Z"}</description>
      <content:encoded>{"uuid": "eda819aa-3dfb-4b9c-9bcc-cc3ddbba832d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4302", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41107\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-07-19T11:15:03.323\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. http://www.openwall.com/lists/oss-security/2024/07/19/1\n2. http://www.openwall.com/lists/oss-security/2024/07/19/2\n3. https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107\n4. https://github.com/apache/cloudstack/issues/4519\n5. https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3\n6. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107\n7. http://www.openwall.com/lists/oss-security/2024/07/19/1\n8. http://www.openwall.com/lists/oss-security/2024/07/19/2\n9. https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107\n10. https://github.com/apache/cloudstack/issues/4519\n11. https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3\n12. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107", "creation_timestamp": "2025-02-13T19:10:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eda819aa-3dfb-4b9c-9bcc-cc3ddbba832d/export</guid>
      <pubDate>Thu, 13 Feb 2025 19:10:44 +0000</pubDate>
    </item>
    <item>
      <title>3f43025e-717e-46e4-bf8b-48c789258194</title>
      <link>https://vulnerability.circl.lu/sighting/3f43025e-717e-46e4-bf8b-48c789258194/export</link>
      <description>{"uuid": "3f43025e-717e-46e4-bf8b-48c789258194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "seen", "source": "Telegram/wU-S_9jya7RZ2wvc-X65k6zed65yLtdSpRsjHNh-iDDt7Fu6", "content": "", "creation_timestamp": "2025-02-21T22:10:26.000000Z"}</description>
      <content:encoded>{"uuid": "3f43025e-717e-46e4-bf8b-48c789258194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41107", "type": "seen", "source": "Telegram/wU-S_9jya7RZ2wvc-X65k6zed65yLtdSpRsjHNh-iDDt7Fu6", "content": "", "creation_timestamp": "2025-02-21T22:10:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3f43025e-717e-46e4-bf8b-48c789258194/export</guid>
      <pubDate>Fri, 21 Feb 2025 22:10:26 +0000</pubDate>
    </item>
  </channel>
</rss>
