<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 16:36:43 +0000</lastBuildDate>
    <item>
      <title>d1ca5315-5b5c-4a1d-9b50-ffed164e5e9d</title>
      <link>https://vulnerability.circl.lu/sighting/d1ca5315-5b5c-4a1d-9b50-ffed164e5e9d/export</link>
      <description>{"uuid": "d1ca5315-5b5c-4a1d-9b50-ffed164e5e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52542", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113667976394605872", "content": "", "creation_timestamp": "2024-12-17T11:41:15.502163Z"}</description>
      <content:encoded>{"uuid": "d1ca5315-5b5c-4a1d-9b50-ffed164e5e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52542", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113667976394605872", "content": "", "creation_timestamp": "2024-12-17T11:41:15.502163Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d1ca5315-5b5c-4a1d-9b50-ffed164e5e9d/export</guid>
      <pubDate>Tue, 17 Dec 2024 11:41:15 +0000</pubDate>
    </item>
    <item>
      <title>31c25e30-9e5a-498a-a3bb-af8107957bc5</title>
      <link>https://vulnerability.circl.lu/sighting/31c25e30-9e5a-498a-a3bb-af8107957bc5/export</link>
      <description>{"uuid": "31c25e30-9e5a-498a-a3bb-af8107957bc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52542", "type": "seen", "source": "https://t.me/cvedetector/13086", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52542 - Dell AppSync Symlink Following Information Tampering Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52542 \nPublished : Dec. 17, 2024, 12:15 p.m. | 43\u00a0minutes ago \nDescription : Dell AppSync, version 4.6.0.x, contain a Symbolic Link (Symlink) Following vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information tampering. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T14:16:00.000000Z"}</description>
      <content:encoded>{"uuid": "31c25e30-9e5a-498a-a3bb-af8107957bc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52542", "type": "seen", "source": "https://t.me/cvedetector/13086", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52542 - Dell AppSync Symlink Following Information Tampering Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52542 \nPublished : Dec. 17, 2024, 12:15 p.m. | 43\u00a0minutes ago \nDescription : Dell AppSync, version 4.6.0.x, contain a Symbolic Link (Symlink) Following vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information tampering. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T14:16:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/31c25e30-9e5a-498a-a3bb-af8107957bc5/export</guid>
      <pubDate>Tue, 17 Dec 2024 14:16:00 +0000</pubDate>
    </item>
    <item>
      <title>bf722504-e26e-4100-8aaf-13dbcb78c098</title>
      <link>https://vulnerability.circl.lu/sighting/bf722504-e26e-4100-8aaf-13dbcb78c098/export</link>
      <description>{"uuid": "bf722504-e26e-4100-8aaf-13dbcb78c098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52543", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113714136812107054", "content": "", "creation_timestamp": "2024-12-25T15:20:27.552190Z"}</description>
      <content:encoded>{"uuid": "bf722504-e26e-4100-8aaf-13dbcb78c098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52543", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113714136812107054", "content": "", "creation_timestamp": "2024-12-25T15:20:27.552190Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bf722504-e26e-4100-8aaf-13dbcb78c098/export</guid>
      <pubDate>Wed, 25 Dec 2024 15:20:27 +0000</pubDate>
    </item>
    <item>
      <title>ae0898c6-b68b-498f-a7ac-7f30a53510d8</title>
      <link>https://vulnerability.circl.lu/sighting/ae0898c6-b68b-498f-a7ac-7f30a53510d8/export</link>
      <description>{"uuid": "ae0898c6-b68b-498f-a7ac-7f30a53510d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52543", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le5e75h5xj2m", "content": "", "creation_timestamp": "2024-12-25T16:15:37.297905Z"}</description>
      <content:encoded>{"uuid": "ae0898c6-b68b-498f-a7ac-7f30a53510d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52543", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le5e75h5xj2m", "content": "", "creation_timestamp": "2024-12-25T16:15:37.297905Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ae0898c6-b68b-498f-a7ac-7f30a53510d8/export</guid>
      <pubDate>Wed, 25 Dec 2024 16:15:37 +0000</pubDate>
    </item>
    <item>
      <title>e73a3d07-54ca-4779-afb3-cb3870a45175</title>
      <link>https://vulnerability.circl.lu/sighting/e73a3d07-54ca-4779-afb3-cb3870a45175/export</link>
      <description>{"uuid": "e73a3d07-54ca-4779-afb3-cb3870a45175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52543", "type": "seen", "source": "https://t.me/cvedetector/13632", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52543 - Dell NativeEdge Local Information Disclosure (Temporary File Insecure Permissions)\", \n  \"Content\": \"CVE ID : CVE-2024-52543 \nPublished : Dec. 25, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : Dell NativeEdge, version(s) 2.1.0.0, contain(s) a Creation of Temporary File With Insecure Permissions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:59:41.000000Z"}</description>
      <content:encoded>{"uuid": "e73a3d07-54ca-4779-afb3-cb3870a45175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52543", "type": "seen", "source": "https://t.me/cvedetector/13632", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52543 - Dell NativeEdge Local Information Disclosure (Temporary File Insecure Permissions)\", \n  \"Content\": \"CVE ID : CVE-2024-52543 \nPublished : Dec. 25, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : Dell NativeEdge, version(s) 2.1.0.0, contain(s) a Creation of Temporary File With Insecure Permissions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:59:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e73a3d07-54ca-4779-afb3-cb3870a45175/export</guid>
      <pubDate>Wed, 25 Dec 2024 17:59:41 +0000</pubDate>
    </item>
    <item>
      <title>aa2021fd-3c30-4009-84cc-5da074c5441c</title>
      <link>https://vulnerability.circl.lu/sighting/aa2021fd-3c30-4009-84cc-5da074c5441c/export</link>
      <description>{"uuid": "aa2021fd-3c30-4009-84cc-5da074c5441c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likeja4ipd2v", "content": "", "creation_timestamp": "2025-02-19T18:06:44.790723Z"}</description>
      <content:encoded>{"uuid": "aa2021fd-3c30-4009-84cc-5da074c5441c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likeja4ipd2v", "content": "", "creation_timestamp": "2025-02-19T18:06:44.790723Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aa2021fd-3c30-4009-84cc-5da074c5441c/export</guid>
      <pubDate>Wed, 19 Feb 2025 18:06:44 +0000</pubDate>
    </item>
    <item>
      <title>1678e5b4-c91c-4be5-af09-a62022d0c781</title>
      <link>https://vulnerability.circl.lu/sighting/1678e5b4-c91c-4be5-af09-a62022d0c781/export</link>
      <description>{"uuid": "1678e5b4-c91c-4be5-af09-a62022d0c781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114032281469424192", "content": "", "creation_timestamp": "2025-02-19T19:48:50.129678Z"}</description>
      <content:encoded>{"uuid": "1678e5b4-c91c-4be5-af09-a62022d0c781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114032281469424192", "content": "", "creation_timestamp": "2025-02-19T19:48:50.129678Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1678e5b4-c91c-4be5-af09-a62022d0c781/export</guid>
      <pubDate>Wed, 19 Feb 2025 19:48:50 +0000</pubDate>
    </item>
    <item>
      <title>b1182c4a-5136-4388-b9e7-52e8311c8690</title>
      <link>https://vulnerability.circl.lu/sighting/b1182c4a-5136-4388-b9e7-52e8311c8690/export</link>
      <description>{"uuid": "b1182c4a-5136-4388-b9e7-52e8311c8690", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "https://t.me/cvedetector/18458", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52541 - Dell Client Platform BIOS Weak Authentication Elevation of Privilege Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52541 \nPublished : Feb. 19, 2025, 5:15 p.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:25:03.000000Z"}</description>
      <content:encoded>{"uuid": "b1182c4a-5136-4388-b9e7-52e8311c8690", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "https://t.me/cvedetector/18458", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52541 - Dell Client Platform BIOS Weak Authentication Elevation of Privilege Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52541 \nPublished : Feb. 19, 2025, 5:15 p.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:25:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b1182c4a-5136-4388-b9e7-52e8311c8690/export</guid>
      <pubDate>Wed, 19 Feb 2025 20:25:03 +0000</pubDate>
    </item>
    <item>
      <title>d7ba2227-ec0f-4cc3-865b-68c21f66040b</title>
      <link>https://vulnerability.circl.lu/sighting/d7ba2227-ec0f-4cc3-865b-68c21f66040b/export</link>
      <description>{"uuid": "d7ba2227-ec0f-4cc3-865b-68c21f66040b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52544", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-731/", "content": "", "creation_timestamp": "2025-07-30T03:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "d7ba2227-ec0f-4cc3-865b-68c21f66040b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52544", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-731/", "content": "", "creation_timestamp": "2025-07-30T03:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d7ba2227-ec0f-4cc3-865b-68c21f66040b/export</guid>
      <pubDate>Wed, 30 Jul 2025 03:00:00 +0000</pubDate>
    </item>
    <item>
      <title>688fee9d-1dcc-4eaa-a117-17a37ff9a31f</title>
      <link>https://vulnerability.circl.lu/sighting/688fee9d-1dcc-4eaa-a117-17a37ff9a31f/export</link>
      <description>{"uuid": "688fee9d-1dcc-4eaa-a117-17a37ff9a31f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}</description>
      <content:encoded>{"uuid": "688fee9d-1dcc-4eaa-a117-17a37ff9a31f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52541", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/688fee9d-1dcc-4eaa-a117-17a37ff9a31f/export</guid>
      <pubDate>Mon, 25 Aug 2025 13:32:05 +0000</pubDate>
    </item>
  </channel>
</rss>
