<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 21:54:50 +0000</lastBuildDate>
    <item>
      <title>fda61860-cbd7-4817-8a09-b93d391aa01c</title>
      <link>https://vulnerability.circl.lu/sighting/fda61860-cbd7-4817-8a09-b93d391aa01c/export</link>
      <description>{"uuid": "fda61860-cbd7-4817-8a09-b93d391aa01c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9802", "type": "seen", "source": "https://t.me/cvedetector/7570", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9802 - Apache ServiceConformance Validation Exposes Service Information Giving Away Deployment Details\", \n  \"Content\": \"CVE ID : CVE-2024-9802 \nPublished : Oct. 10, 2024, 8:15 a.m. | 37\u00a0minutes ago \nDescription : The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-10T10:54:01.000000Z"}</description>
      <content:encoded>{"uuid": "fda61860-cbd7-4817-8a09-b93d391aa01c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9802", "type": "seen", "source": "https://t.me/cvedetector/7570", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9802 - Apache ServiceConformance Validation Exposes Service Information Giving Away Deployment Details\", \n  \"Content\": \"CVE ID : CVE-2024-9802 \nPublished : Oct. 10, 2024, 8:15 a.m. | 37\u00a0minutes ago \nDescription : The conformance validation endpoint is public so everybody can verify the conformance of onboarded services. The response could contain specific information about the service, including available endpoints, and swagger. It could advise about the running version of a service to an attacker. The attacker could also check if a service is running. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-10T10:54:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fda61860-cbd7-4817-8a09-b93d391aa01c/export</guid>
      <pubDate>Thu, 10 Oct 2024 10:54:01 +0000</pubDate>
    </item>
  </channel>
</rss>
