<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T02:11:17.376839+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/32754c59-0ff2-442f-a1a2-0ff04faec451/export</id>
    <title>32754c59-0ff2-442f-a1a2-0ff04faec451</title>
    <updated>2026-05-11T02:11:17.578300+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "32754c59-0ff2-442f-a1a2-0ff04faec451", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43572", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/32754c59-0ff2-442f-a1a2-0ff04faec451/export"/>
    <published>2025-02-23T02:11:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/caf42546-18a5-4d14-b1ba-aec55984ed35/export</id>
    <title>caf42546-18a5-4d14-b1ba-aec55984ed35</title>
    <updated>2026-05-11T02:11:17.578212+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "caf42546-18a5-4d14-b1ba-aec55984ed35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43572", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lixhi5perj2g", "content": "", "creation_timestamp": "2025-02-24T23:04:20.590443Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/caf42546-18a5-4d14-b1ba-aec55984ed35/export"/>
    <published>2025-02-24T23:04:20.590443+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fda29904-4fd9-44c1-ba39-d8564ace8fe1/export</id>
    <title>fda29904-4fd9-44c1-ba39-d8564ace8fe1</title>
    <updated>2026-05-11T02:11:17.578125+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fda29904-4fd9-44c1-ba39-d8564ace8fe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43572", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-9d1c9d9f-675cdbc3d8f48478", "content": "", "creation_timestamp": "2025-03-01T00:19:17.087441Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fda29904-4fd9-44c1-ba39-d8564ace8fe1/export"/>
    <published>2025-03-01T00:19:17.087441+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3d2a3689-bfe1-459d-97ab-52390be0d4d9/export</id>
    <title>3d2a3689-bfe1-459d-97ab-52390be0d4d9</title>
    <updated>2026-05-11T02:11:17.578039+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3d2a3689-bfe1-459d-97ab-52390be0d4d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43573", "type": "seen", "source": "https://krebsonsecurity.com/2025/04/funding-expires-for-key-cyber-vulnerability-database/", "content": "", "creation_timestamp": "2025-04-16T01:59:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3d2a3689-bfe1-459d-97ab-52390be0d4d9/export"/>
    <published>2025-04-16T01:59:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/53143cb0-93f6-4b43-9654-94c992597920/export</id>
    <title>53143cb0-93f6-4b43-9654-94c992597920</title>
    <updated>2026-05-11T02:11:17.577951+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "53143cb0-93f6-4b43-9654-94c992597920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43577", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18395", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43577\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Edge (Chromium-based) Spoofing Vulnerability\n\ud83d\udccf Published: 2024-10-18T22:14:41.787Z\n\ud83d\udccf Modified: 2025-06-16T02:45:15.948Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43577", "creation_timestamp": "2025-06-16T03:35:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/53143cb0-93f6-4b43-9654-94c992597920/export"/>
    <published>2025-06-16T03:35:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/349c803a-c6f8-4626-9f09-eca4ae732185/export</id>
    <title>349c803a-c6f8-4626-9f09-eca4ae732185</title>
    <updated>2026-05-11T02:11:17.577835+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "349c803a-c6f8-4626-9f09-eca4ae732185", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43579", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18398", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43579\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2024-10-17T22:40:40.168Z\n\ud83d\udccf Modified: 2025-06-16T02:45:14.217Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43579", "creation_timestamp": "2025-06-16T03:35:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/349c803a-c6f8-4626-9f09-eca4ae732185/export"/>
    <published>2025-06-16T03:35:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d2aa6843-37d1-4d27-a0ed-28aa1135cdc6/export</id>
    <title>d2aa6843-37d1-4d27-a0ed-28aa1135cdc6</title>
    <updated>2026-05-11T02:11:17.577708+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d2aa6843-37d1-4d27-a0ed-28aa1135cdc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43578", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18400", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43578\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2024-10-17T22:40:38.971Z\n\ud83d\udccf Modified: 2025-06-16T02:45:12.864Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43578", "creation_timestamp": "2025-06-16T03:35:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d2aa6843-37d1-4d27-a0ed-28aa1135cdc6/export"/>
    <published>2025-06-16T03:35:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/33c94817-5aee-4ec9-85a8-637c55bd0d19/export</id>
    <title>33c94817-5aee-4ec9-85a8-637c55bd0d19</title>
    <updated>2026-05-11T02:11:17.576210+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "33c94817-5aee-4ec9-85a8-637c55bd0d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43570", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ltciwauyqm2a", "content": "", "creation_timestamp": "2025-07-06T14:41:20.824309Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/33c94817-5aee-4ec9-85a8-637c55bd0d19/export"/>
    <published>2025-07-06T14:41:20.824309+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de870aa1-59a6-4f75-8ee6-4b144399e655/export</id>
    <title>de870aa1-59a6-4f75-8ee6-4b144399e655</title>
    <updated>2026-05-11T02:11:17.576077+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://cve.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "de870aa1-59a6-4f75-8ee6-4b144399e655", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-43573", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/50eb3076-92f7-48c0-b998-53480c24982e", "content": "", "creation_timestamp": "2026-02-02T12:26:26.720719Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de870aa1-59a6-4f75-8ee6-4b144399e655/export"/>
    <published>2026-02-02T12:26:26.720719+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5d7ed6df-d5ed-4462-b9f1-68bb42fafb67/export</id>
    <title>5d7ed6df-d5ed-4462-b9f1-68bb42fafb67</title>
    <updated>2026-05-11T02:11:17.573637+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://cve.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "5d7ed6df-d5ed-4462-b9f1-68bb42fafb67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-43572", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/e4802fe1-c167-4b48-86c2-55f0435e76a2", "content": "", "creation_timestamp": "2026-02-02T12:26:26.835718Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5d7ed6df-d5ed-4462-b9f1-68bb42fafb67/export"/>
    <published>2026-02-02T12:26:26.835718+00:00</published>
  </entry>
</feed>
