<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 04:20:16 +0000</lastBuildDate>
    <item>
      <title>fcf6499f-947f-482b-bfd4-d86456a79089</title>
      <link>https://vulnerability.circl.lu/sighting/fcf6499f-947f-482b-bfd4-d86456a79089/export</link>
      <description>{"uuid": "fcf6499f-947f-482b-bfd4-d86456a79089", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47187", "type": "seen", "source": "https://t.me/cvedetector/8116", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47187 - Suricata Predictable \"thash\" Hash Table Behavior\", \n  \"Content\": \"CVE ID : CVE-2024-47187 \nPublished : Oct. 16, 2024, 7:15 p.m. | 36\u00a0minutes ago \nDescription : Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, missing initialization of the random seed for \"thash\" leads to datasets having predictable hash table behavior. This can lead to dataset file loading to use excessive time to load, as well as runtime performance issues during traffic handling. This issue has been addressed in 7.0.7. As a workaround, avoid loading datasets from untrusted sources. Avoid dataset rules that track traffic in rules. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T22:14:54.000000Z"}</description>
      <content:encoded>{"uuid": "fcf6499f-947f-482b-bfd4-d86456a79089", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47187", "type": "seen", "source": "https://t.me/cvedetector/8116", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47187 - Suricata Predictable \"thash\" Hash Table Behavior\", \n  \"Content\": \"CVE ID : CVE-2024-47187 \nPublished : Oct. 16, 2024, 7:15 p.m. | 36\u00a0minutes ago \nDescription : Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, missing initialization of the random seed for \"thash\" leads to datasets having predictable hash table behavior. This can lead to dataset file loading to use excessive time to load, as well as runtime performance issues during traffic handling. This issue has been addressed in 7.0.7. As a workaround, avoid loading datasets from untrusted sources. Avoid dataset rules that track traffic in rules. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T22:14:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fcf6499f-947f-482b-bfd4-d86456a79089/export</guid>
      <pubDate>Wed, 16 Oct 2024 22:14:54 +0000</pubDate>
    </item>
  </channel>
</rss>
