<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 19:39:25 +0000</lastBuildDate>
    <item>
      <title>4bfe35e0-e28b-4a2a-aa81-7fcd6603f014</title>
      <link>https://vulnerability.circl.lu/sighting/4bfe35e0-e28b-4a2a-aa81-7fcd6603f014/export</link>
      <description>{"uuid": "4bfe35e0-e28b-4a2a-aa81-7fcd6603f014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5911", "type": "seen", "source": "https://t.me/cvedetector/572", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5911 - An arbitrary file upload vulnerability in Palo Alt\", \n  \"Content\": \"CVE ID : CVE-2024-5911 \nPublished : July 10, 2024, 7:15 p.m. | 26\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T21:49:00.000000Z"}</description>
      <content:encoded>{"uuid": "4bfe35e0-e28b-4a2a-aa81-7fcd6603f014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5911", "type": "seen", "source": "https://t.me/cvedetector/572", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5911 - An arbitrary file upload vulnerability in Palo Alt\", \n  \"Content\": \"CVE ID : CVE-2024-5911 \nPublished : July 10, 2024, 7:15 p.m. | 26\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T21:49:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4bfe35e0-e28b-4a2a-aa81-7fcd6603f014/export</guid>
      <pubDate>Wed, 10 Jul 2024 21:49:00 +0000</pubDate>
    </item>
    <item>
      <title>a62948ad-38ce-4b49-85c5-c5da6172694f</title>
      <link>https://vulnerability.circl.lu/sighting/a62948ad-38ce-4b49-85c5-c5da6172694f/export</link>
      <description>{"uuid": "a62948ad-38ce-4b49-85c5-c5da6172694f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-5911", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1331", "content": "", "creation_timestamp": "2024-07-12T04:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "a62948ad-38ce-4b49-85c5-c5da6172694f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-5911", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1331", "content": "", "creation_timestamp": "2024-07-12T04:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a62948ad-38ce-4b49-85c5-c5da6172694f/export</guid>
      <pubDate>Fri, 12 Jul 2024 04:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
