<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 19:56:33 +0000</lastBuildDate>
    <item>
      <title>0bf42c19-2313-4bdd-884b-15ee04405815</title>
      <link>https://vulnerability.circl.lu/sighting/0bf42c19-2313-4bdd-884b-15ee04405815/export</link>
      <description>{"uuid": "0bf42c19-2313-4bdd-884b-15ee04405815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52534", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le5e72pfqy2f", "content": "", "creation_timestamp": "2024-12-25T16:15:34.632295Z"}</description>
      <content:encoded>{"uuid": "0bf42c19-2313-4bdd-884b-15ee04405815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52534", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le5e72pfqy2f", "content": "", "creation_timestamp": "2024-12-25T16:15:34.632295Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0bf42c19-2313-4bdd-884b-15ee04405815/export</guid>
      <pubDate>Wed, 25 Dec 2024 16:15:34 +0000</pubDate>
    </item>
    <item>
      <title>c7a9428f-9760-4c86-92c8-defb6e7b7766</title>
      <link>https://vulnerability.circl.lu/sighting/c7a9428f-9760-4c86-92c8-defb6e7b7766/export</link>
      <description>{"uuid": "c7a9428f-9760-4c86-92c8-defb6e7b7766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52535", "type": "seen", "source": "https://t.me/cvedetector/13626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52535 - \"Dell SupportAssist Symlink Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-52535 \nPublished : Dec. 25, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:09:26.000000Z"}</description>
      <content:encoded>{"uuid": "c7a9428f-9760-4c86-92c8-defb6e7b7766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52535", "type": "seen", "source": "https://t.me/cvedetector/13626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52535 - \"Dell SupportAssist Symlink Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-52535 \nPublished : Dec. 25, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:09:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c7a9428f-9760-4c86-92c8-defb6e7b7766/export</guid>
      <pubDate>Wed, 25 Dec 2024 17:09:26 +0000</pubDate>
    </item>
    <item>
      <title>cd814a38-e7c9-4df9-8d29-9d6428aef0db</title>
      <link>https://vulnerability.circl.lu/sighting/cd814a38-e7c9-4df9-8d29-9d6428aef0db/export</link>
      <description>{"uuid": "cd814a38-e7c9-4df9-8d29-9d6428aef0db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52534", "type": "seen", "source": "https://t.me/cvedetector/13633", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52534 - Dell ECS Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52534 \nPublished : Dec. 25, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : Dell ECS, version(s) prior to ECS 3.8.1.3, contain(s) an Authentication Bypass by Capture-replay vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Session theft. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:59:42.000000Z"}</description>
      <content:encoded>{"uuid": "cd814a38-e7c9-4df9-8d29-9d6428aef0db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52534", "type": "seen", "source": "https://t.me/cvedetector/13633", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52534 - Dell ECS Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52534 \nPublished : Dec. 25, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : Dell ECS, version(s) prior to ECS 3.8.1.3, contain(s) an Authentication Bypass by Capture-replay vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Session theft. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:59:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cd814a38-e7c9-4df9-8d29-9d6428aef0db/export</guid>
      <pubDate>Wed, 25 Dec 2024 17:59:42 +0000</pubDate>
    </item>
    <item>
      <title>c42b3a31-b181-46ad-9758-fb84bfcc93f7</title>
      <link>https://vulnerability.circl.lu/sighting/c42b3a31-b181-46ad-9758-fb84bfcc93f7/export</link>
      <description>{"uuid": "c42b3a31-b181-46ad-9758-fb84bfcc93f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52534", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113718159851574023", "content": "", "creation_timestamp": "2024-12-26T08:23:34.203710Z"}</description>
      <content:encoded>{"uuid": "c42b3a31-b181-46ad-9758-fb84bfcc93f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52534", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113718159851574023", "content": "", "creation_timestamp": "2024-12-26T08:23:34.203710Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c42b3a31-b181-46ad-9758-fb84bfcc93f7/export</guid>
      <pubDate>Thu, 26 Dec 2024 08:23:34 +0000</pubDate>
    </item>
    <item>
      <title>1da5a451-33f1-4460-bfb0-c66ce5a00ea0</title>
      <link>https://vulnerability.circl.lu/sighting/1da5a451-33f1-4460-bfb0-c66ce5a00ea0/export</link>
      <description>{"uuid": "1da5a451-33f1-4460-bfb0-c66ce5a00ea0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52535", "type": "seen", "source": "https://bsky.app/profile/cybermaterial.bsky.social/post/3le7mzaa5kl2a", "content": "", "creation_timestamp": "2024-12-26T13:58:43.149002Z"}</description>
      <content:encoded>{"uuid": "1da5a451-33f1-4460-bfb0-c66ce5a00ea0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52535", "type": "seen", "source": "https://bsky.app/profile/cybermaterial.bsky.social/post/3le7mzaa5kl2a", "content": "", "creation_timestamp": "2024-12-26T13:58:43.149002Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1da5a451-33f1-4460-bfb0-c66ce5a00ea0/export</guid>
      <pubDate>Thu, 26 Dec 2024 13:58:43 +0000</pubDate>
    </item>
    <item>
      <title>095cc0c8-5a39-48b6-a69f-2ebda3e4b502</title>
      <link>https://vulnerability.circl.lu/sighting/095cc0c8-5a39-48b6-a69f-2ebda3e4b502/export</link>
      <description>{"uuid": "095cc0c8-5a39-48b6-a69f-2ebda3e4b502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52533", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:38.563189Z"}</description>
      <content:encoded>{"uuid": "095cc0c8-5a39-48b6-a69f-2ebda3e4b502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52533", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:38.563189Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/095cc0c8-5a39-48b6-a69f-2ebda3e4b502/export</guid>
      <pubDate>Tue, 08 Jul 2025 07:10:38 +0000</pubDate>
    </item>
    <item>
      <title>19e543fc-bde6-4d64-a428-f47120ab052a</title>
      <link>https://vulnerability.circl.lu/sighting/19e543fc-bde6-4d64-a428-f47120ab052a/export</link>
      <description>{"uuid": "19e543fc-bde6-4d64-a428-f47120ab052a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52533", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3ltgqoa3tmza2", "content": "", "creation_timestamp": "2025-07-08T07:10:48.577590Z"}</description>
      <content:encoded>{"uuid": "19e543fc-bde6-4d64-a428-f47120ab052a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52533", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3ltgqoa3tmza2", "content": "", "creation_timestamp": "2025-07-08T07:10:48.577590Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/19e543fc-bde6-4d64-a428-f47120ab052a/export</guid>
      <pubDate>Tue, 08 Jul 2025 07:10:48 +0000</pubDate>
    </item>
    <item>
      <title>c55467d7-45a0-4e3f-b1eb-ef876b37f346</title>
      <link>https://vulnerability.circl.lu/sighting/c55467d7-45a0-4e3f-b1eb-ef876b37f346/export</link>
      <description>{"uuid": "c55467d7-45a0-4e3f-b1eb-ef876b37f346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52537", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</description>
      <content:encoded>{"uuid": "c55467d7-45a0-4e3f-b1eb-ef876b37f346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52537", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c55467d7-45a0-4e3f-b1eb-ef876b37f346/export</guid>
      <pubDate>Tue, 16 Sep 2025 23:16:38 +0000</pubDate>
    </item>
    <item>
      <title>ba00125d-70b3-44e3-9432-94273c7af603</title>
      <link>https://vulnerability.circl.lu/sighting/ba00125d-70b3-44e3-9432-94273c7af603/export</link>
      <description>{"uuid": "ba00125d-70b3-44e3-9432-94273c7af603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52537", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:34.000000Z"}</description>
      <content:encoded>{"uuid": "ba00125d-70b3-44e3-9432-94273c7af603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52537", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ba00125d-70b3-44e3-9432-94273c7af603/export</guid>
      <pubDate>Thu, 18 Sep 2025 16:44:34 +0000</pubDate>
    </item>
    <item>
      <title>3e35de5d-ad35-4e09-b14f-ffe64b6b8c51</title>
      <link>https://vulnerability.circl.lu/sighting/3e35de5d-ad35-4e09-b14f-ffe64b6b8c51/export</link>
      <description>{"uuid": "3e35de5d-ad35-4e09-b14f-ffe64b6b8c51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52533", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-06", "content": "", "creation_timestamp": "2026-02-12T11:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "3e35de5d-ad35-4e09-b14f-ffe64b6b8c51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52533", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-06", "content": "", "creation_timestamp": "2026-02-12T11:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3e35de5d-ad35-4e09-b14f-ffe64b6b8c51/export</guid>
      <pubDate>Thu, 12 Feb 2026 11:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
