<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 02:39:09 +0000</lastBuildDate>
    <item>
      <title>7ff2c051-8e88-4f28-a559-9f9792d14d63</title>
      <link>https://vulnerability.circl.lu/sighting/7ff2c051-8e88-4f28-a559-9f9792d14d63/export</link>
      <description>{"uuid": "7ff2c051-8e88-4f28-a559-9f9792d14d63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113475023940062776", "content": "", "creation_timestamp": "2024-11-13T09:50:55.048724Z"}</description>
      <content:encoded>{"uuid": "7ff2c051-8e88-4f28-a559-9f9792d14d63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113475023940062776", "content": "", "creation_timestamp": "2024-11-13T09:50:55.048724Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7ff2c051-8e88-4f28-a559-9f9792d14d63/export</guid>
      <pubDate>Wed, 13 Nov 2024 09:50:55 +0000</pubDate>
    </item>
    <item>
      <title>73681553-872d-4e1c-a8a0-937f6acd4f28</title>
      <link>https://vulnerability.circl.lu/sighting/73681553-872d-4e1c-a8a0-937f6acd4f28/export</link>
      <description>{"uuid": "73681553-872d-4e1c-a8a0-937f6acd4f28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://t.me/cvedetector/10814", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8001 - VIWIS LMS Print Handler Remote Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-8001 \nPublished : Nov. 13, 2024, 10:15 a.m. | 38\u00a0minutes ago \nDescription : A vulnerability was found in VIWIS LMS 9.11. It has been classified as critical. Affected is an unknown function of the component Print Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. A user with the role learner can use the administrative print function with an active session before and after an exam slot to access the entire exam including solutions in the web application. It is recommended to apply a patch to fix this issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T12:11:30.000000Z"}</description>
      <content:encoded>{"uuid": "73681553-872d-4e1c-a8a0-937f6acd4f28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://t.me/cvedetector/10814", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8001 - VIWIS LMS Print Handler Remote Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-8001 \nPublished : Nov. 13, 2024, 10:15 a.m. | 38\u00a0minutes ago \nDescription : A vulnerability was found in VIWIS LMS 9.11. It has been classified as critical. Affected is an unknown function of the component Print Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. A user with the role learner can use the administrative print function with an active session before and after an exam slot to access the entire exam including solutions in the web application. It is recommended to apply a patch to fix this issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T12:11:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/73681553-872d-4e1c-a8a0-937f6acd4f28/export</guid>
      <pubDate>Wed, 13 Nov 2024 12:11:30 +0000</pubDate>
    </item>
    <item>
      <title>01269196-f1b9-42f1-b7c3-84bc287aa1f7</title>
      <link>https://vulnerability.circl.lu/sighting/01269196-f1b9-42f1-b7c3-84bc287aa1f7/export</link>
      <description>{"uuid": "01269196-f1b9-42f1-b7c3-84bc287aa1f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/670", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-8001\n\ud83d\udd39 Description: A vulnerability was found in VIWIS LMS 9.11. It has been classified as critical. Affected is an unknown function of the component Print Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. A user with the role learner can use the administrative print function with an active session before and after an exam slot to access the entire exam including solutions in the web application. It is recommended to apply a patch to fix this issue.\n\ud83d\udccf Published: 2024-11-13T09:47:38.973Z\n\ud83d\udccf Modified: 2025-01-08T06:49:21.233Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.284352\n2. https://vuldb.com/?ctiid.284352\n3. https://www.scip.ch/?news.20241203", "creation_timestamp": "2025-01-08T07:38:49.000000Z"}</description>
      <content:encoded>{"uuid": "01269196-f1b9-42f1-b7c3-84bc287aa1f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8001", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/670", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-8001\n\ud83d\udd39 Description: A vulnerability was found in VIWIS LMS 9.11. It has been classified as critical. Affected is an unknown function of the component Print Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. A user with the role learner can use the administrative print function with an active session before and after an exam slot to access the entire exam including solutions in the web application. It is recommended to apply a patch to fix this issue.\n\ud83d\udccf Published: 2024-11-13T09:47:38.973Z\n\ud83d\udccf Modified: 2025-01-08T06:49:21.233Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.284352\n2. https://vuldb.com/?ctiid.284352\n3. https://www.scip.ch/?news.20241203", "creation_timestamp": "2025-01-08T07:38:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/01269196-f1b9-42f1-b7c3-84bc287aa1f7/export</guid>
      <pubDate>Wed, 08 Jan 2025 07:38:49 +0000</pubDate>
    </item>
  </channel>
</rss>
