<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 06:42:07 +0000</lastBuildDate>
    <item>
      <title>50778b33-6157-4b3b-a841-b58be007bccf</title>
      <link>https://vulnerability.circl.lu/sighting/50778b33-6157-4b3b-a841-b58be007bccf/export</link>
      <description>{"uuid": "50778b33-6157-4b3b-a841-b58be007bccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44190", "type": "seen", "source": "https://t.me/cvedetector/5773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44190 - macOS Arbitrary File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44190 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to read arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:18.000000Z"}</description>
      <content:encoded>{"uuid": "50778b33-6157-4b3b-a841-b58be007bccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44190", "type": "seen", "source": "https://t.me/cvedetector/5773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44190 - macOS Arbitrary File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44190 \nPublished : Sept. 17, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to read arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T03:04:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/50778b33-6157-4b3b-a841-b58be007bccf/export</guid>
      <pubDate>Tue, 17 Sep 2024 03:04:18 +0000</pubDate>
    </item>
  </channel>
</rss>
