<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:54:57 +0000</lastBuildDate>
    <item>
      <title>7872d9bb-843e-4781-92a6-3b3b0a237e3b</title>
      <link>https://vulnerability.circl.lu/sighting/7872d9bb-843e-4781-92a6-3b3b0a237e3b/export</link>
      <description>{"uuid": "7872d9bb-843e-4781-92a6-3b3b0a237e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42483", "type": "seen", "source": "https://t.me/cvedetector/5490", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42483 - Espressif Systems ESP-NOW Replay Attacks Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42483 \nPublished : Sept. 12, 2024, 3:18 p.m. | 17\u00a0minutes ago \nDescription : ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T17:42:42.000000Z"}</description>
      <content:encoded>{"uuid": "7872d9bb-843e-4781-92a6-3b3b0a237e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42483", "type": "seen", "source": "https://t.me/cvedetector/5490", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42483 - Espressif Systems ESP-NOW Replay Attacks Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42483 \nPublished : Sept. 12, 2024, 3:18 p.m. | 17\u00a0minutes ago \nDescription : ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T17:42:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7872d9bb-843e-4781-92a6-3b3b0a237e3b/export</guid>
      <pubDate>Thu, 12 Sep 2024 17:42:42 +0000</pubDate>
    </item>
  </channel>
</rss>
