<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 22:35:38 +0000</lastBuildDate>
    <item>
      <title>dd57f0e6-1771-4b1d-bcc0-c7fb4766740c</title>
      <link>https://vulnerability.circl.lu/sighting/dd57f0e6-1771-4b1d-bcc0-c7fb4766740c/export</link>
      <description>{"uuid": "dd57f0e6-1771-4b1d-bcc0-c7fb4766740c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44117", "type": "seen", "source": "https://t.me/cvedetector/5172", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44117 - Apache WebSense Unauthorized Functionality Execution\", \n  \"Content\": \"CVE ID : CVE-2024-44117 \nPublished : Sept. 10, 2024, 5:15 a.m. | 15\u00a0minutes ago \nDescription : The RFC enabled function module allows a low privileged user to perform various actions, such as modifying the URLs of any user's favourite nodes and workbook ID. There is low impact on integrity and availability of the application. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T07:32:32.000000Z"}</description>
      <content:encoded>{"uuid": "dd57f0e6-1771-4b1d-bcc0-c7fb4766740c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44117", "type": "seen", "source": "https://t.me/cvedetector/5172", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44117 - Apache WebSense Unauthorized Functionality Execution\", \n  \"Content\": \"CVE ID : CVE-2024-44117 \nPublished : Sept. 10, 2024, 5:15 a.m. | 15\u00a0minutes ago \nDescription : The RFC enabled function module allows a low privileged user to perform various actions, such as modifying the URLs of any user's favourite nodes and workbook ID. There is low impact on integrity and availability of the application. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T07:32:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dd57f0e6-1771-4b1d-bcc0-c7fb4766740c/export</guid>
      <pubDate>Tue, 10 Sep 2024 07:32:32 +0000</pubDate>
    </item>
  </channel>
</rss>
