<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 02:42:52 +0000</lastBuildDate>
    <item>
      <title>6ca5988e-5e9c-43ba-8680-64995f28420f</title>
      <link>https://vulnerability.circl.lu/sighting/6ca5988e-5e9c-43ba-8680-64995f28420f/export</link>
      <description>{"uuid": "6ca5988e-5e9c-43ba-8680-64995f28420f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "https://t.me/cvedetector/8033", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45461 - Apache CloudStack Quota Access and Configuration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45461 \nPublished : Oct. 16, 2024, 8:15 a.m. | 37\u00a0minutes ago \nDescription : The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled.  \n  \n  \n  \n  \nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.\u00a0Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting \"quota.enable.service\" to \"false\". \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T11:20:48.000000Z"}</description>
      <content:encoded>{"uuid": "6ca5988e-5e9c-43ba-8680-64995f28420f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "https://t.me/cvedetector/8033", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45461 - Apache CloudStack Quota Access and Configuration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45461 \nPublished : Oct. 16, 2024, 8:15 a.m. | 37\u00a0minutes ago \nDescription : The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled.  \n  \n  \n  \n  \nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.\u00a0Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting \"quota.enable.service\" to \"false\". \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T11:20:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6ca5988e-5e9c-43ba-8680-64995f28420f/export</guid>
      <pubDate>Wed, 16 Oct 2024 11:20:48 +0000</pubDate>
    </item>
    <item>
      <title>5fb29828-8d11-46e0-aa21-eb5987451994</title>
      <link>https://vulnerability.circl.lu/sighting/5fb29828-8d11-46e0-aa21-eb5987451994/export</link>
      <description>{"uuid": "5fb29828-8d11-46e0-aa21-eb5987451994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4064", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45461\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-10-16T08:15:05.717\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n2. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n3. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n4. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n5. https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo\n6. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2/\n7. http://www.openwall.com/lists/oss-security/2024/10/15/3", "creation_timestamp": "2025-02-12T11:09:58.000000Z"}</description>
      <content:encoded>{"uuid": "5fb29828-8d11-46e0-aa21-eb5987451994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4064", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45461\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-10-16T08:15:05.717\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n2. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n3. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n4. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n5. https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo\n6. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2/\n7. http://www.openwall.com/lists/oss-security/2024/10/15/3", "creation_timestamp": "2025-02-12T11:09:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5fb29828-8d11-46e0-aa21-eb5987451994/export</guid>
      <pubDate>Wed, 12 Feb 2025 11:09:58 +0000</pubDate>
    </item>
    <item>
      <title>53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82</title>
      <link>https://vulnerability.circl.lu/sighting/53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82/export</link>
      <description>{"uuid": "53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4102", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45461\n\ud83d\udd25 CVSS Score: 5.6 (CVSS_V3)\n\ud83d\udd39 Description: The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled.\n\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.\u00a0Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting \"quota.enable.service\" to \"false\".\n\ud83d\udccf Published: 2024-10-16T09:30:31Z\n\ud83d\udccf Modified: 2025-02-12T12:30:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-45461\n2. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n3. https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo\n4. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2\n5. http://www.openwall.com/lists/oss-security/2024/10/15/3", "creation_timestamp": "2025-02-12T13:14:13.000000Z"}</description>
      <content:encoded>{"uuid": "53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4102", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45461\n\ud83d\udd25 CVSS Score: 5.6 (CVSS_V3)\n\ud83d\udd39 Description: The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled.\n\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.\u00a0Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting \"quota.enable.service\" to \"false\".\n\ud83d\udccf Published: 2024-10-16T09:30:31Z\n\ud83d\udccf Modified: 2025-02-12T12:30:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-45461\n2. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n3. https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo\n4. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2\n5. http://www.openwall.com/lists/oss-security/2024/10/15/3", "creation_timestamp": "2025-02-12T13:14:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82/export</guid>
      <pubDate>Wed, 12 Feb 2025 13:14:13 +0000</pubDate>
    </item>
    <item>
      <title>f3524b0d-0c63-4bcd-86e1-1db7a60d90a4</title>
      <link>https://vulnerability.circl.lu/sighting/f3524b0d-0c63-4bcd-86e1-1db7a60d90a4/export</link>
      <description>{"uuid": "f3524b0d-0c63-4bcd-86e1-1db7a60d90a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "Telegram/bEpx4hr16v7elHFjBDtLuMdoVY4XrHSqCrH1aJrzFWxZ76kz", "content": "", "creation_timestamp": "2025-02-14T10:04:57.000000Z"}</description>
      <content:encoded>{"uuid": "f3524b0d-0c63-4bcd-86e1-1db7a60d90a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "Telegram/bEpx4hr16v7elHFjBDtLuMdoVY4XrHSqCrH1aJrzFWxZ76kz", "content": "", "creation_timestamp": "2025-02-14T10:04:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f3524b0d-0c63-4bcd-86e1-1db7a60d90a4/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:04:57 +0000</pubDate>
    </item>
  </channel>
</rss>
