<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 07:36:46 +0000</lastBuildDate>
    <item>
      <title>416bf44e-b317-4bc0-83ce-67ae1234dc9d</title>
      <link>https://vulnerability.circl.lu/sighting/416bf44e-b317-4bc0-83ce-67ae1234dc9d/export</link>
      <description>{"uuid": "416bf44e-b317-4bc0-83ce-67ae1234dc9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42222", "type": "seen", "source": "https://t.me/cvedetector/2675", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42222 - Apache CloudStack Network List API Unauthorised Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42222 \nPublished : Aug. 7, 2024, 8:16 a.m. | 33\u00a0minutes ago \nDescription : In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data.  \n  \nAffected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T11:07:02.000000Z"}</description>
      <content:encoded>{"uuid": "416bf44e-b317-4bc0-83ce-67ae1234dc9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42222", "type": "seen", "source": "https://t.me/cvedetector/2675", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42222 - Apache CloudStack Network List API Unauthorised Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42222 \nPublished : Aug. 7, 2024, 8:16 a.m. | 33\u00a0minutes ago \nDescription : In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data.  \n  \nAffected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T11:07:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/416bf44e-b317-4bc0-83ce-67ae1234dc9d/export</guid>
      <pubDate>Wed, 07 Aug 2024 11:07:02 +0000</pubDate>
    </item>
  </channel>
</rss>
