<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 13:10:45 +0000</lastBuildDate>
    <item>
      <title>07ee0359-5a4e-4be1-8f5b-f5e31969e997</title>
      <link>https://vulnerability.circl.lu/sighting/07ee0359-5a4e-4be1-8f5b-f5e31969e997/export</link>
      <description>{"uuid": "07ee0359-5a4e-4be1-8f5b-f5e31969e997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7079", "type": "seen", "source": "https://t.me/cvedetector/1573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7079 - OpenShift Helm Chart Unauthenticated Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7079 \nPublished : July 24, 2024, 4:15 p.m. | 35\u00a0minutes ago \nDescription : A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T19:09:31.000000Z"}</description>
      <content:encoded>{"uuid": "07ee0359-5a4e-4be1-8f5b-f5e31969e997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7079", "type": "seen", "source": "https://t.me/cvedetector/1573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7079 - OpenShift Helm Chart Unauthenticated Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7079 \nPublished : July 24, 2024, 4:15 p.m. | 35\u00a0minutes ago \nDescription : A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T19:09:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/07ee0359-5a4e-4be1-8f5b-f5e31969e997/export</guid>
      <pubDate>Wed, 24 Jul 2024 19:09:31 +0000</pubDate>
    </item>
    <item>
      <title>2b6fc4e1-1425-48b5-9b9a-0d908e4f7e44</title>
      <link>https://vulnerability.circl.lu/sighting/2b6fc4e1-1425-48b5-9b9a-0d908e4f7e44/export</link>
      <description>{"uuid": "2b6fc4e1-1425-48b5-9b9a-0d908e4f7e44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7079", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17684", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-7079\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.\n\ud83d\udccf Published: 2024-07-24T15:51:36.331Z\n\ud83d\udccf Modified: 2025-05-27T17:32:03.599Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-7079\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2299678", "creation_timestamp": "2025-05-27T17:48:50.000000Z"}</description>
      <content:encoded>{"uuid": "2b6fc4e1-1425-48b5-9b9a-0d908e4f7e44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7079", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17684", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-7079\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.\n\ud83d\udccf Published: 2024-07-24T15:51:36.331Z\n\ud83d\udccf Modified: 2025-05-27T17:32:03.599Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-7079\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2299678", "creation_timestamp": "2025-05-27T17:48:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2b6fc4e1-1425-48b5-9b9a-0d908e4f7e44/export</guid>
      <pubDate>Tue, 27 May 2025 17:48:50 +0000</pubDate>
    </item>
  </channel>
</rss>
