<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 13:55:47 +0000</lastBuildDate>
    <item>
      <title>3917491e-7146-4a9f-a5f3-82dc9dc82f2c</title>
      <link>https://vulnerability.circl.lu/sighting/3917491e-7146-4a9f-a5f3-82dc9dc82f2c/export</link>
      <description>{"uuid": "3917491e-7146-4a9f-a5f3-82dc9dc82f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6580", "type": "seen", "source": "https://t.me/cvedetector/214", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6580 - The /n software IPWorks SSH library SFTPServer com\", \n  \"Content\": \"CVE ID : CVE-2024-6580 \nPublished : July 8, 2024, 7:15 p.m. | 15\u00a0minutes ago \nDescription : The /n software IPWorks SSH library SFTPServer component can be induced to make unintended filesystem or network path requests when loading a SSH public key or certificate. To be exploitable, an application calling the SFTPServer component must grant user access without verifying the SSH public key or certificate (which would most likely be a separate vulnerability in the calling application).\u00a0IPWorks SSH versions 22.0.8945 and 24.0.8945 were released to address this condition by blocking all filesystem and network path requests for SSH public keys or certificates. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T21:36:18.000000Z"}</description>
      <content:encoded>{"uuid": "3917491e-7146-4a9f-a5f3-82dc9dc82f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6580", "type": "seen", "source": "https://t.me/cvedetector/214", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6580 - The /n software IPWorks SSH library SFTPServer com\", \n  \"Content\": \"CVE ID : CVE-2024-6580 \nPublished : July 8, 2024, 7:15 p.m. | 15\u00a0minutes ago \nDescription : The /n software IPWorks SSH library SFTPServer component can be induced to make unintended filesystem or network path requests when loading a SSH public key or certificate. To be exploitable, an application calling the SFTPServer component must grant user access without verifying the SSH public key or certificate (which would most likely be a separate vulnerability in the calling application).\u00a0IPWorks SSH versions 22.0.8945 and 24.0.8945 were released to address this condition by blocking all filesystem and network path requests for SSH public keys or certificates. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T21:36:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3917491e-7146-4a9f-a5f3-82dc9dc82f2c/export</guid>
      <pubDate>Mon, 08 Jul 2024 21:36:18 +0000</pubDate>
    </item>
  </channel>
</rss>
