<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T20:35:26.401645+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f8edea22-a820-4c80-a799-af7583f555d2/export</id>
    <title>f8edea22-a820-4c80-a799-af7583f555d2</title>
    <updated>2026-05-09T20:35:26.794155+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f8edea22-a820-4c80-a799-af7583f555d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12124", "type": "seen", "source": "https://t.me/cibsecurity/10588", "content": "ATENTION\u203c New - CVE-2019-12124\n\nAn issue was discovered in ONAP APPC before Dublin. By using an exposed unprotected Jolokia interface, an unauthenticated attacker can read or overwrite an arbitrary file. All APPC setups are affected.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-18T21:31:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f8edea22-a820-4c80-a799-af7583f555d2/export"/>
    <published>2020-03-18T21:31:10+00:00</published>
  </entry>
</feed>
