<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 12:52:01 +0000</lastBuildDate>
    <item>
      <title>892b605e-f6b0-4ae6-89ee-fd84e7139fd5</title>
      <link>https://vulnerability.circl.lu/sighting/892b605e-f6b0-4ae6-89ee-fd84e7139fd5/export</link>
      <description>{"uuid": "892b605e-f6b0-4ae6-89ee-fd84e7139fd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/3973", "content": "The Hacker News\nVeeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues\n\nVeeam has shipped security updates to address a total of 18 security flaws impacting its software products, including five critical vulnerabilities that could result in remote code execution.\nThe list of shortcomings is below -\n\nCVE-2024-40711 (CVSS score: 9.8) - A vulnerability in Veeam Backup &amp;amp; Replication that allows unauthenticated remote code execution.\n\n\nCVE-2024-42024 (CVSS score: 9.1", "creation_timestamp": "2024-09-05T22:40:17.000000Z"}</description>
      <content:encoded>{"uuid": "892b605e-f6b0-4ae6-89ee-fd84e7139fd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/3973", "content": "The Hacker News\nVeeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues\n\nVeeam has shipped security updates to address a total of 18 security flaws impacting its software products, including five critical vulnerabilities that could result in remote code execution.\nThe list of shortcomings is below -\n\nCVE-2024-40711 (CVSS score: 9.8) - A vulnerability in Veeam Backup &amp;amp; Replication that allows unauthenticated remote code execution.\n\n\nCVE-2024-42024 (CVSS score: 9.1", "creation_timestamp": "2024-09-05T22:40:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/892b605e-f6b0-4ae6-89ee-fd84e7139fd5/export</guid>
      <pubDate>Thu, 05 Sep 2024 22:40:17 +0000</pubDate>
    </item>
    <item>
      <title>0de6755b-10ac-41b8-9ed9-86029085c014</title>
      <link>https://vulnerability.circl.lu/sighting/0de6755b-10ac-41b8-9ed9-86029085c014/export</link>
      <description>{"uuid": "0de6755b-10ac-41b8-9ed9-86029085c014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "Telegram/2paEDeP02FonhasdWZ5DOTlSfP9HXbNaBwWkCheKZVeaUA", "content": "", "creation_timestamp": "2024-09-05T22:40:17.000000Z"}</description>
      <content:encoded>{"uuid": "0de6755b-10ac-41b8-9ed9-86029085c014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "Telegram/2paEDeP02FonhasdWZ5DOTlSfP9HXbNaBwWkCheKZVeaUA", "content": "", "creation_timestamp": "2024-09-05T22:40:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0de6755b-10ac-41b8-9ed9-86029085c014/export</guid>
      <pubDate>Thu, 05 Sep 2024 22:40:17 +0000</pubDate>
    </item>
    <item>
      <title>86bcaf6f-c25c-49f6-a9d0-7978eef6492a</title>
      <link>https://vulnerability.circl.lu/sighting/86bcaf6f-c25c-49f6-a9d0-7978eef6492a/export</link>
      <description>{"uuid": "86bcaf6f-c25c-49f6-a9d0-7978eef6492a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "Telegram/H0bymnaDZsjBJZbbufohqYE3SBtAIPDM1Sz-s9D2SdUOEA", "content": "", "creation_timestamp": "2024-09-06T00:26:00.000000Z"}</description>
      <content:encoded>{"uuid": "86bcaf6f-c25c-49f6-a9d0-7978eef6492a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "Telegram/H0bymnaDZsjBJZbbufohqYE3SBtAIPDM1Sz-s9D2SdUOEA", "content": "", "creation_timestamp": "2024-09-06T00:26:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/86bcaf6f-c25c-49f6-a9d0-7978eef6492a/export</guid>
      <pubDate>Fri, 06 Sep 2024 00:26:00 +0000</pubDate>
    </item>
    <item>
      <title>4e31ea18-b9f6-45ce-b24d-c375a2865482</title>
      <link>https://vulnerability.circl.lu/sighting/4e31ea18-b9f6-45ce-b24d-c375a2865482/export</link>
      <description>{"uuid": "4e31ea18-b9f6-45ce-b24d-c375a2865482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/KomunitiSiber/2520", "content": "Veeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues\nhttps://thehackernews.com/2024/09/veeam-releases-security-updates-to-fix.html\n\nVeeam has shipped security updates to address a total of 18 security flaws impacting its software products, including five critical vulnerabilities that could result in remote code execution.\nThe list of shortcomings is below -\n\nCVE-2024-40711 (CVSS score: 9.8) - A vulnerability in Veeam Backup &amp;amp; Replication that allows unauthenticated remote code execution.\n\n\nCVE-2024-42024 (CVSS score: 9.1", "creation_timestamp": "2024-09-06T04:50:52.000000Z"}</description>
      <content:encoded>{"uuid": "4e31ea18-b9f6-45ce-b24d-c375a2865482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/KomunitiSiber/2520", "content": "Veeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues\nhttps://thehackernews.com/2024/09/veeam-releases-security-updates-to-fix.html\n\nVeeam has shipped security updates to address a total of 18 security flaws impacting its software products, including five critical vulnerabilities that could result in remote code execution.\nThe list of shortcomings is below -\n\nCVE-2024-40711 (CVSS score: 9.8) - A vulnerability in Veeam Backup &amp;amp; Replication that allows unauthenticated remote code execution.\n\n\nCVE-2024-42024 (CVSS score: 9.1", "creation_timestamp": "2024-09-06T04:50:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4e31ea18-b9f6-45ce-b24d-c375a2865482/export</guid>
      <pubDate>Fri, 06 Sep 2024 04:50:52 +0000</pubDate>
    </item>
    <item>
      <title>cb5b1656-cd44-43ac-9e22-7e50ac1234ba</title>
      <link>https://vulnerability.circl.lu/sighting/cb5b1656-cd44-43ac-9e22-7e50ac1234ba/export</link>
      <description>{"uuid": "cb5b1656-cd44-43ac-9e22-7e50ac1234ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/cvedetector/5041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42024 - Veeam ONE Agent Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42024 \nPublished : Sept. 7, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : A vulnerability that allows an attacker in possession of the Veeam ONE Agent service account credentials to perform remote code execution on the machine where the Veeam ONE Agent is installed. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-07T20:10:49.000000Z"}</description>
      <content:encoded>{"uuid": "cb5b1656-cd44-43ac-9e22-7e50ac1234ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/cvedetector/5041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42024 - Veeam ONE Agent Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42024 \nPublished : Sept. 7, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : A vulnerability that allows an attacker in possession of the Veeam ONE Agent service account credentials to perform remote code execution on the machine where the Veeam ONE Agent is installed. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-07T20:10:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cb5b1656-cd44-43ac-9e22-7e50ac1234ba/export</guid>
      <pubDate>Sat, 07 Sep 2024 20:10:49 +0000</pubDate>
    </item>
    <item>
      <title>e1576776-0ca7-4521-80f7-5401a4f77ed6</title>
      <link>https://vulnerability.circl.lu/sighting/e1576776-0ca7-4521-80f7-5401a4f77ed6/export</link>
      <description>{"uuid": "e1576776-0ca7-4521-80f7-5401a4f77ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/HackingInsights/12473", "content": "\u200aCritical Flaws in Veeam ONE Expose Systems to RCE (CVE-2024-42024) and Credential Theft (CVE-2024-42019)\n\nhttps://securityonline.info/critical-flaws-in-veeam-one-expose-systems-to-rce-cve-2024-42024-and-credential-theft-cve-2024-42019/", "creation_timestamp": "2024-09-08T17:48:02.000000Z"}</description>
      <content:encoded>{"uuid": "e1576776-0ca7-4521-80f7-5401a4f77ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42024", "type": "seen", "source": "https://t.me/HackingInsights/12473", "content": "\u200aCritical Flaws in Veeam ONE Expose Systems to RCE (CVE-2024-42024) and Credential Theft (CVE-2024-42019)\n\nhttps://securityonline.info/critical-flaws-in-veeam-one-expose-systems-to-rce-cve-2024-42024-and-credential-theft-cve-2024-42019/", "creation_timestamp": "2024-09-08T17:48:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e1576776-0ca7-4521-80f7-5401a4f77ed6/export</guid>
      <pubDate>Sun, 08 Sep 2024 17:48:02 +0000</pubDate>
    </item>
    <item>
      <title>47613673-c000-4491-bb55-9afffee0ac86</title>
      <link>https://vulnerability.circl.lu/sighting/47613673-c000-4491-bb55-9afffee0ac86/export</link>
      <description>{"uuid": "47613673-c000-4491-bb55-9afffee0ac86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "cve-2024-42024", "type": "seen", "source": "https://vulnerability.circl.lu/comment/4e36fb63-ef06-4e9d-8f57-7b76aebf7bde", "content": "", "creation_timestamp": "2024-09-09T20:48:43.060182Z"}</description>
      <content:encoded>{"uuid": "47613673-c000-4491-bb55-9afffee0ac86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "cve-2024-42024", "type": "seen", "source": "https://vulnerability.circl.lu/comment/4e36fb63-ef06-4e9d-8f57-7b76aebf7bde", "content": "", "creation_timestamp": "2024-09-09T20:48:43.060182Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/47613673-c000-4491-bb55-9afffee0ac86/export</guid>
      <pubDate>Mon, 09 Sep 2024 20:48:43 +0000</pubDate>
    </item>
  </channel>
</rss>
