<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 16:41:51 +0000</lastBuildDate>
    <item>
      <title>99ac1501-ba60-4cd9-872f-49bb386ef3a9</title>
      <link>https://vulnerability.circl.lu/sighting/99ac1501-ba60-4cd9-872f-49bb386ef3a9/export</link>
      <description>{"uuid": "99ac1501-ba60-4cd9-872f-49bb386ef3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50312", "type": "seen", "source": "https://t.me/cvedetector/8607", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50312 - \"GraphQL Introspection Query Information Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2024-50312 \nPublished : Oct. 22, 2024, 2:15 p.m. | 46\u00a0minutes ago \nDescription : A vulnerability was found in GraphQL due to improper access controls on the GraphQL introspection query. This flaw allows unauthorized users to retrieve a comprehensive list of available queries and mutations. Exposure to this flaw increases the attack surface, as it can facilitate the discovery of flaws or errors specific to the application's GraphQL implementation. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-22T17:07:36.000000Z"}</description>
      <content:encoded>{"uuid": "99ac1501-ba60-4cd9-872f-49bb386ef3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50312", "type": "seen", "source": "https://t.me/cvedetector/8607", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50312 - \"GraphQL Introspection Query Information Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2024-50312 \nPublished : Oct. 22, 2024, 2:15 p.m. | 46\u00a0minutes ago \nDescription : A vulnerability was found in GraphQL due to improper access controls on the GraphQL introspection query. This flaw allows unauthorized users to retrieve a comprehensive list of available queries and mutations. Exposure to this flaw increases the attack surface, as it can facilitate the discovery of flaws or errors specific to the application's GraphQL implementation. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-22T17:07:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/99ac1501-ba60-4cd9-872f-49bb386ef3a9/export</guid>
      <pubDate>Tue, 22 Oct 2024 17:07:36 +0000</pubDate>
    </item>
    <item>
      <title>f53f774a-1039-4265-bade-ed5f55882a68</title>
      <link>https://vulnerability.circl.lu/sighting/f53f774a-1039-4265-bade-ed5f55882a68/export</link>
      <description>{"uuid": "f53f774a-1039-4265-bade-ed5f55882a68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50312", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1704", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50312\n\ud83d\udd39 Description: A vulnerability was found in GraphQL due to improper access controls on the GraphQL introspection query. This flaw allows unauthorized users to retrieve a comprehensive list of available queries and mutations. Exposure to this flaw increases the attack surface, as it can facilitate the discovery of flaws or errors specific to the application's GraphQL implementation.\n\ud83d\udccf Published: 2024-10-22T13:24:12.165Z\n\ud83d\udccf Modified: 2025-01-15T05:35:38.787Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:0115\n2. https://access.redhat.com/errata/RHSA-2025:0140\n3. https://access.redhat.com/security/cve/CVE-2024-50312\n4. https://bugzilla.redhat.com/show_bug.cgi?id=2319378\n5. https://github.com/openshift/console/pull/14409/files", "creation_timestamp": "2025-01-15T06:10:23.000000Z"}</description>
      <content:encoded>{"uuid": "f53f774a-1039-4265-bade-ed5f55882a68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50312", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1704", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50312\n\ud83d\udd39 Description: A vulnerability was found in GraphQL due to improper access controls on the GraphQL introspection query. This flaw allows unauthorized users to retrieve a comprehensive list of available queries and mutations. Exposure to this flaw increases the attack surface, as it can facilitate the discovery of flaws or errors specific to the application's GraphQL implementation.\n\ud83d\udccf Published: 2024-10-22T13:24:12.165Z\n\ud83d\udccf Modified: 2025-01-15T05:35:38.787Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:0115\n2. https://access.redhat.com/errata/RHSA-2025:0140\n3. https://access.redhat.com/security/cve/CVE-2024-50312\n4. https://bugzilla.redhat.com/show_bug.cgi?id=2319378\n5. https://github.com/openshift/console/pull/14409/files", "creation_timestamp": "2025-01-15T06:10:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f53f774a-1039-4265-bade-ed5f55882a68/export</guid>
      <pubDate>Wed, 15 Jan 2025 06:10:23 +0000</pubDate>
    </item>
  </channel>
</rss>
