<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 15:38:50 +0000</lastBuildDate>
    <item>
      <title>2fed75ac-f02b-412d-ba7f-7bb4a8e74581</title>
      <link>https://vulnerability.circl.lu/sighting/2fed75ac-f02b-412d-ba7f-7bb4a8e74581/export</link>
      <description>{"uuid": "2fed75ac-f02b-412d-ba7f-7bb4a8e74581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55542", "type": "seen", "source": "https://t.me/cvedetector/14175", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55542 - Acronis Tray Monitor Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55542 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Local privilege escalation due to excessive permissions assigned to Tray Monitor service. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35895. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:28.000000Z"}</description>
      <content:encoded>{"uuid": "2fed75ac-f02b-412d-ba7f-7bb4a8e74581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55542", "type": "seen", "source": "https://t.me/cvedetector/14175", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55542 - Acronis Tray Monitor Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55542 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Local privilege escalation due to excessive permissions assigned to Tray Monitor service. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35895. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2fed75ac-f02b-412d-ba7f-7bb4a8e74581/export</guid>
      <pubDate>Thu, 02 Jan 2025 17:36:28 +0000</pubDate>
    </item>
    <item>
      <title>304d6eb1-c5f3-44ee-8c1d-79a5e3a7d5d1</title>
      <link>https://vulnerability.circl.lu/sighting/304d6eb1-c5f3-44ee-8c1d-79a5e3a7d5d1/export</link>
      <description>{"uuid": "304d6eb1-c5f3-44ee-8c1d-79a5e3a7d5d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55543", "type": "seen", "source": "https://t.me/cvedetector/14176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55543 - Acronis Cyber Protect DLL Hijacking\", \n  \"Content\": \"CVE ID : CVE-2024-55543 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:29.000000Z"}</description>
      <content:encoded>{"uuid": "304d6eb1-c5f3-44ee-8c1d-79a5e3a7d5d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55543", "type": "seen", "source": "https://t.me/cvedetector/14176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55543 - Acronis Cyber Protect DLL Hijacking\", \n  \"Content\": \"CVE ID : CVE-2024-55543 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/304d6eb1-c5f3-44ee-8c1d-79a5e3a7d5d1/export</guid>
      <pubDate>Thu, 02 Jan 2025 17:36:29 +0000</pubDate>
    </item>
    <item>
      <title>3b3ed6ea-73ab-4aca-ae00-ec9ea2439ade</title>
      <link>https://vulnerability.circl.lu/sighting/3b3ed6ea-73ab-4aca-ae00-ec9ea2439ade/export</link>
      <description>{"uuid": "3b3ed6ea-73ab-4aca-ae00-ec9ea2439ade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55540", "type": "seen", "source": "https://t.me/cvedetector/14182", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55540 - Acronis Cyber Protect DLL Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55540 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:36.000000Z"}</description>
      <content:encoded>{"uuid": "3b3ed6ea-73ab-4aca-ae00-ec9ea2439ade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55540", "type": "seen", "source": "https://t.me/cvedetector/14182", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55540 - Acronis Cyber Protect DLL Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55540 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3b3ed6ea-73ab-4aca-ae00-ec9ea2439ade/export</guid>
      <pubDate>Thu, 02 Jan 2025 17:36:36 +0000</pubDate>
    </item>
    <item>
      <title>9724c405-5749-466a-9bdc-5f55cdef46e0</title>
      <link>https://vulnerability.circl.lu/sighting/9724c405-5749-466a-9bdc-5f55cdef46e0/export</link>
      <description>{"uuid": "9724c405-5749-466a-9bdc-5f55cdef46e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55541", "type": "seen", "source": "https://t.me/cvedetector/14183", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55541 - Acronis Cyber Protect Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55541 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39169. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:37.000000Z"}</description>
      <content:encoded>{"uuid": "9724c405-5749-466a-9bdc-5f55cdef46e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55541", "type": "seen", "source": "https://t.me/cvedetector/14183", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55541 - Acronis Cyber Protect Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55541 \nPublished : Jan. 2, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39169. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T17:36:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9724c405-5749-466a-9bdc-5f55cdef46e0/export</guid>
      <pubDate>Thu, 02 Jan 2025 17:36:37 +0000</pubDate>
    </item>
    <item>
      <title>68ca6e75-bb90-43c7-9d94-50c590185150</title>
      <link>https://vulnerability.circl.lu/sighting/68ca6e75-bb90-43c7-9d94-50c590185150/export</link>
      <description>{"uuid": "68ca6e75-bb90-43c7-9d94-50c590185150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://infosec.exchange/users/wdormann/statuses/114157281792619030", "content": "", "creation_timestamp": "2025-03-13T21:38:03.880305Z"}</description>
      <content:encoded>{"uuid": "68ca6e75-bb90-43c7-9d94-50c590185150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://infosec.exchange/users/wdormann/statuses/114157281792619030", "content": "", "creation_timestamp": "2025-03-13T21:38:03.880305Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/68ca6e75-bb90-43c7-9d94-50c590185150/export</guid>
      <pubDate>Thu, 13 Mar 2025 21:38:03 +0000</pubDate>
    </item>
    <item>
      <title>db4c642e-a2b1-42db-bffe-1452422e3038</title>
      <link>https://vulnerability.circl.lu/sighting/db4c642e-a2b1-42db-bffe-1452422e3038/export</link>
      <description>{"uuid": "db4c642e-a2b1-42db-bffe-1452422e3038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://bsky.app/profile/wdormann.infosec.exchange.ap.brid.gy/post/3lkc2lo4cfmf2", "content": "", "creation_timestamp": "2025-03-13T21:38:24.268800Z"}</description>
      <content:encoded>{"uuid": "db4c642e-a2b1-42db-bffe-1452422e3038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://bsky.app/profile/wdormann.infosec.exchange.ap.brid.gy/post/3lkc2lo4cfmf2", "content": "", "creation_timestamp": "2025-03-13T21:38:24.268800Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/db4c642e-a2b1-42db-bffe-1452422e3038/export</guid>
      <pubDate>Thu, 13 Mar 2025 21:38:24 +0000</pubDate>
    </item>
    <item>
      <title>f9b1c50b-c76a-4aca-8084-db5e6cb717fc</title>
      <link>https://vulnerability.circl.lu/sighting/f9b1c50b-c76a-4aca-8084-db5e6cb717fc/export</link>
      <description>{"uuid": "f9b1c50b-c76a-4aca-8084-db5e6cb717fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7515", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55549\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H)\n\ud83d\udd39 Description: xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.\n\ud83d\udccf Published: 2025-03-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T01:02:10.105Z\n\ud83d\udd17 References:\n1. https://gitlab.gnome.org/GNOME/libxslt/-/issues/127", "creation_timestamp": "2025-03-14T01:48:28.000000Z"}</description>
      <content:encoded>{"uuid": "f9b1c50b-c76a-4aca-8084-db5e6cb717fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7515", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55549\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H)\n\ud83d\udd39 Description: xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.\n\ud83d\udccf Published: 2025-03-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T01:02:10.105Z\n\ud83d\udd17 References:\n1. https://gitlab.gnome.org/GNOME/libxslt/-/issues/127", "creation_timestamp": "2025-03-14T01:48:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f9b1c50b-c76a-4aca-8084-db5e6cb717fc/export</guid>
      <pubDate>Fri, 14 Mar 2025 01:48:28 +0000</pubDate>
    </item>
    <item>
      <title>8f8f91aa-4bb4-40c7-bc16-ce74b41ef513</title>
      <link>https://vulnerability.circl.lu/sighting/8f8f91aa-4bb4-40c7-bc16-ce74b41ef513/export</link>
      <description>{"uuid": "8f8f91aa-4bb4-40c7-bc16-ce74b41ef513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://t.me/cvedetector/20259", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55549 - Libxslt XSLT Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55549 \nPublished : March 14, 2025, 2:15 a.m. | 16\u00a0minutes ago \nDescription : xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T04:09:54.000000Z"}</description>
      <content:encoded>{"uuid": "8f8f91aa-4bb4-40c7-bc16-ce74b41ef513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://t.me/cvedetector/20259", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55549 - Libxslt XSLT Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55549 \nPublished : March 14, 2025, 2:15 a.m. | 16\u00a0minutes ago \nDescription : xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T04:09:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8f8f91aa-4bb4-40c7-bc16-ce74b41ef513/export</guid>
      <pubDate>Fri, 14 Mar 2025 04:09:54 +0000</pubDate>
    </item>
    <item>
      <title>45f863e3-0dc1-4fea-bd29-86c5cf7ce382</title>
      <link>https://vulnerability.circl.lu/sighting/45f863e3-0dc1-4fea-bd29-86c5cf7ce382/export</link>
      <description>{"uuid": "45f863e3-0dc1-4fea-bd29-86c5cf7ce382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkcrxqxd7p2k", "content": "", "creation_timestamp": "2025-03-14T04:36:30.673374Z"}</description>
      <content:encoded>{"uuid": "45f863e3-0dc1-4fea-bd29-86c5cf7ce382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55549", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkcrxqxd7p2k", "content": "", "creation_timestamp": "2025-03-14T04:36:30.673374Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/45f863e3-0dc1-4fea-bd29-86c5cf7ce382/export</guid>
      <pubDate>Fri, 14 Mar 2025 04:36:30 +0000</pubDate>
    </item>
    <item>
      <title>77751148-80ee-4c27-a956-42bffa4ed237</title>
      <link>https://vulnerability.circl.lu/sighting/77751148-80ee-4c27-a956-42bffa4ed237/export</link>
      <description>{"uuid": "77751148-80ee-4c27-a956-42bffa4ed237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55542", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13173", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55542\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Local privilege escalation due to excessive permissions assigned to Tray Monitor service. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35895.\n\ud83d\udccf Published: 2025-01-02T15:26:40.928Z\n\ud83d\udccf Modified: 2025-04-24T03:55:28.346Z\n\ud83d\udd17 References:\n1. https://security-advisory.acronis.com/advisories/SEC-5342", "creation_timestamp": "2025-04-24T04:05:46.000000Z"}</description>
      <content:encoded>{"uuid": "77751148-80ee-4c27-a956-42bffa4ed237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55542", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13173", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55542\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Local privilege escalation due to excessive permissions assigned to Tray Monitor service. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35895.\n\ud83d\udccf Published: 2025-01-02T15:26:40.928Z\n\ud83d\udccf Modified: 2025-04-24T03:55:28.346Z\n\ud83d\udd17 References:\n1. https://security-advisory.acronis.com/advisories/SEC-5342", "creation_timestamp": "2025-04-24T04:05:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/77751148-80ee-4c27-a956-42bffa4ed237/export</guid>
      <pubDate>Thu, 24 Apr 2025 04:05:46 +0000</pubDate>
    </item>
  </channel>
</rss>
