<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 17:33:33 +0000</lastBuildDate>
    <item>
      <title>c0e81cd8-26a7-4f14-b5e4-c94cadb657f4</title>
      <link>https://vulnerability.circl.lu/sighting/c0e81cd8-26a7-4f14-b5e4-c94cadb657f4/export</link>
      <description>{"uuid": "c0e81cd8-26a7-4f14-b5e4-c94cadb657f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56441", "type": "seen", "source": "https://t.me/cvedetector/14624", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56441 - Bastet Race Condition Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56441 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Race condition vulnerability in the Bastet module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:22.000000Z"}</description>
      <content:encoded>{"uuid": "c0e81cd8-26a7-4f14-b5e4-c94cadb657f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56441", "type": "seen", "source": "https://t.me/cvedetector/14624", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56441 - Bastet Race Condition Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56441 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Race condition vulnerability in the Bastet module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c0e81cd8-26a7-4f14-b5e4-c94cadb657f4/export</guid>
      <pubDate>Wed, 08 Jan 2025 04:56:22 +0000</pubDate>
    </item>
    <item>
      <title>75dbe78f-dd14-4ccd-97fa-f212165987b3</title>
      <link>https://vulnerability.circl.lu/sighting/75dbe78f-dd14-4ccd-97fa-f212165987b3/export</link>
      <description>{"uuid": "75dbe78f-dd14-4ccd-97fa-f212165987b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56440", "type": "seen", "source": "https://t.me/cvedetector/14623", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56440 - FortiGate Network Access Permission Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56440 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Permission control vulnerability in the Connectivity module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:22.000000Z"}</description>
      <content:encoded>{"uuid": "75dbe78f-dd14-4ccd-97fa-f212165987b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56440", "type": "seen", "source": "https://t.me/cvedetector/14623", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56440 - FortiGate Network Access Permission Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56440 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Permission control vulnerability in the Connectivity module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/75dbe78f-dd14-4ccd-97fa-f212165987b3/export</guid>
      <pubDate>Wed, 08 Jan 2025 04:56:22 +0000</pubDate>
    </item>
    <item>
      <title>5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb</title>
      <link>https://vulnerability.circl.lu/sighting/5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb/export</link>
      <description>{"uuid": "5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56442", "type": "seen", "source": "https://t.me/cvedetector/14625", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56442 - NFC Service Unauthorized API Use Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56442 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Vulnerability of native APIs not being implemented in the NFC service module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:26.000000Z"}</description>
      <content:encoded>{"uuid": "5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56442", "type": "seen", "source": "https://t.me/cvedetector/14625", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56442 - NFC Service Unauthorized API Use Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56442 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Vulnerability of native APIs not being implemented in the NFC service module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb/export</guid>
      <pubDate>Wed, 08 Jan 2025 04:56:26 +0000</pubDate>
    </item>
    <item>
      <title>001d479f-1736-4a79-a15b-95be02304e80</title>
      <link>https://vulnerability.circl.lu/sighting/001d479f-1736-4a79-a15b-95be02304e80/export</link>
      <description>{"uuid": "001d479f-1736-4a79-a15b-95be02304e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56444", "type": "seen", "source": "https://t.me/cvedetector/14627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56444 - Adobe Creative Cloud Cross-Process Screen Stack UIExtension Confidentiality Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56444 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:27.000000Z"}</description>
      <content:encoded>{"uuid": "001d479f-1736-4a79-a15b-95be02304e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56444", "type": "seen", "source": "https://t.me/cvedetector/14627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56444 - Adobe Creative Cloud Cross-Process Screen Stack UIExtension Confidentiality Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56444 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/001d479f-1736-4a79-a15b-95be02304e80/export</guid>
      <pubDate>Wed, 08 Jan 2025 04:56:27 +0000</pubDate>
    </item>
    <item>
      <title>717cf36d-d56f-44ea-af40-46eaa300c639</title>
      <link>https://vulnerability.circl.lu/sighting/717cf36d-d56f-44ea-af40-46eaa300c639/export</link>
      <description>{"uuid": "717cf36d-d56f-44ea-af40-46eaa300c639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56443", "type": "seen", "source": "https://t.me/cvedetector/14626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56443 - Adobe Acrobat UIExtension Cross-Process Screen Stack Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56443 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:27.000000Z"}</description>
      <content:encoded>{"uuid": "717cf36d-d56f-44ea-af40-46eaa300c639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56443", "type": "seen", "source": "https://t.me/cvedetector/14626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56443 - Adobe Acrobat UIExtension Cross-Process Screen Stack Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56443 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/717cf36d-d56f-44ea-af40-46eaa300c639/export</guid>
      <pubDate>Wed, 08 Jan 2025 04:56:27 +0000</pubDate>
    </item>
    <item>
      <title>52396431-26f7-4e9d-b168-531ec4fa8b04</title>
      <link>https://vulnerability.circl.lu/sighting/52396431-26f7-4e9d-b168-531ec4fa8b04/export</link>
      <description>{"uuid": "52396431-26f7-4e9d-b168-531ec4fa8b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56445", "type": "seen", "source": "https://t.me/cvedetector/14628", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56445 - Fortinet FortiOS authentication bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56445 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Instruction authentication bypass vulnerability in the Findnetwork module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:28.000000Z"}</description>
      <content:encoded>{"uuid": "52396431-26f7-4e9d-b168-531ec4fa8b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56445", "type": "seen", "source": "https://t.me/cvedetector/14628", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56445 - Fortinet FortiOS authentication bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56445 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Instruction authentication bypass vulnerability in the Findnetwork module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/52396431-26f7-4e9d-b168-531ec4fa8b04/export</guid>
      <pubDate>Wed, 08 Jan 2025 04:56:28 +0000</pubDate>
    </item>
    <item>
      <title>08577259-778c-4481-96a0-f50153b8e562</title>
      <link>https://vulnerability.circl.lu/sighting/08577259-778c-4481-96a0-f50153b8e562/export</link>
      <description>{"uuid": "08577259-778c-4481-96a0-f50153b8e562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4nkdzg2w", "content": "", "creation_timestamp": "2025-01-08T05:38:26.872487Z"}</description>
      <content:encoded>{"uuid": "08577259-778c-4481-96a0-f50153b8e562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4nkdzg2w", "content": "", "creation_timestamp": "2025-01-08T05:38:26.872487Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/08577259-778c-4481-96a0-f50153b8e562/export</guid>
      <pubDate>Wed, 08 Jan 2025 05:38:26 +0000</pubDate>
    </item>
    <item>
      <title>a42f61c0-0e3a-47a0-b9af-17c502e9307f</title>
      <link>https://vulnerability.circl.lu/sighting/a42f61c0-0e3a-47a0-b9af-17c502e9307f/export</link>
      <description>{"uuid": "a42f61c0-0e3a-47a0-b9af-17c502e9307f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4o6sh42e", "content": "", "creation_timestamp": "2025-01-08T05:38:29.394151Z"}</description>
      <content:encoded>{"uuid": "a42f61c0-0e3a-47a0-b9af-17c502e9307f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4o6sh42e", "content": "", "creation_timestamp": "2025-01-08T05:38:29.394151Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a42f61c0-0e3a-47a0-b9af-17c502e9307f/export</guid>
      <pubDate>Wed, 08 Jan 2025 05:38:29 +0000</pubDate>
    </item>
    <item>
      <title>7c72976a-d8d7-481d-8954-bcd34ad67523</title>
      <link>https://vulnerability.circl.lu/sighting/7c72976a-d8d7-481d-8954-bcd34ad67523/export</link>
      <description>{"uuid": "7c72976a-d8d7-481d-8954-bcd34ad67523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://t.me/cvedetector/14643", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56449 - Acquia Drupal Account Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-56449 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Privilege escalation vulnerability in the Account module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:49.000000Z"}</description>
      <content:encoded>{"uuid": "7c72976a-d8d7-481d-8954-bcd34ad67523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://t.me/cvedetector/14643", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56449 - Acquia Drupal Account Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-56449 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Privilege escalation vulnerability in the Account module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c72976a-d8d7-481d-8954-bcd34ad67523/export</guid>
      <pubDate>Wed, 08 Jan 2025 05:46:49 +0000</pubDate>
    </item>
    <item>
      <title>3216dd84-ab1e-445c-aac1-8d8400d5231c</title>
      <link>https://vulnerability.circl.lu/sighting/3216dd84-ab1e-445c-aac1-8d8400d5231c/export</link>
      <description>{"uuid": "3216dd84-ab1e-445c-aac1-8d8400d5231c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://t.me/cvedetector/14642", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56448 - Netflix Home Screen Widget Module Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56448 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Vulnerability of improper access control in the home screen widget module  \nImpact: Successful exploitation of this vulnerability may affect availability. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:49.000000Z"}</description>
      <content:encoded>{"uuid": "3216dd84-ab1e-445c-aac1-8d8400d5231c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://t.me/cvedetector/14642", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56448 - Netflix Home Screen Widget Module Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56448 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Vulnerability of improper access control in the home screen widget module  \nImpact: Successful exploitation of this vulnerability may affect availability. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3216dd84-ab1e-445c-aac1-8d8400d5231c/export</guid>
      <pubDate>Wed, 08 Jan 2025 05:46:49 +0000</pubDate>
    </item>
  </channel>
</rss>
