<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T06:08:32.941764+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d761b0d3-d33d-46aa-9941-fdc23978bb9c/export</id>
    <title>d761b0d3-d33d-46aa-9941-fdc23978bb9c</title>
    <updated>2026-05-09T06:08:33.287056+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d761b0d3-d33d-46aa-9941-fdc23978bb9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://t.me/cvedetector/17372", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51547 - ABB ASPECT-Enterprise/NEXUS Series/MATRIX Series Hard-coded Credentials Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51547 \nPublished : Feb. 6, 2025, 5:15 a.m. | 3\u00a0hours, 15\u00a0minutes ago \nDescription : Use of Hard-coded Credentials vulnerability in ABB ASPECT-Enterprise, ABB NEXUS Series, ABB MATRIX Series.This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T10:12:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d761b0d3-d33d-46aa-9941-fdc23978bb9c/export"/>
    <published>2025-02-06T10:12:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4d707c7e-0bbe-4f6e-8660-55a474e54fb4/export</id>
    <title>4d707c7e-0bbe-4f6e-8660-55a474e54fb4</title>
    <updated>2026-05-09T06:08:33.286916+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4d707c7e-0bbe-4f6e-8660-55a474e54fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhjpvbt4kq2w", "content": "", "creation_timestamp": "2025-02-06T18:32:24.910777Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4d707c7e-0bbe-4f6e-8660-55a474e54fb4/export"/>
    <published>2025-02-06T18:32:24.910777+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5d6f8f4a-84f0-4489-b170-a2919862f5b0/export</id>
    <title>5d6f8f4a-84f0-4489-b170-a2919862f5b0</title>
    <updated>2026-05-09T06:08:33.286782+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5d6f8f4a-84f0-4489-b170-a2919862f5b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lhppg5jkdc27", "content": "", "creation_timestamp": "2025-02-09T03:40:02.150982Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5d6f8f4a-84f0-4489-b170-a2919862f5b0/export"/>
    <published>2025-02-09T03:40:02.150982+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a8cbfea6-7539-432b-960c-c1b971b67f7f/export</id>
    <title>a8cbfea6-7539-432b-960c-c1b971b67f7f</title>
    <updated>2026-05-09T06:08:33.286616+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a8cbfea6-7539-432b-960c-c1b971b67f7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://t.me/ics_cert/1015", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u06a9\u0646\u062a\u0631\u0644 \u0641\u0631\u0622\u06cc\u0646\u062f ABB ASPECT-Enterprise \u0648 \u0633\u06cc\u0633\u062a\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u062f\u0631 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc ABB MATRIX \u0648 NEXUS \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0647\u0627\u0631\u062f\u06a9\u062f \u0627\u0633\u062a.  \n\u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u067e\u06cc\u0634 \u0641\u0631\u0636 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\n BDU: 2025-01311\n CVE-2024-51547\n\n \u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f   \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631.  - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0644\u06cc\u0633\u062a \u0633\u0641\u06cc\u062f \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647:\n https://search.abb.com/library/Download.aspx?DocumentID=9AKK108470A6775&amp;amp;LanguageCode=en&amp;amp;DocumentPartId=pdf%20-%20Public%20Advisory&amp;amp;Action=Launch\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-02-11T18:14:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a8cbfea6-7539-432b-960c-c1b971b67f7f/export"/>
    <published>2025-02-11T18:14:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9e2ad2c2-b7e4-4118-91c6-052d8154c03b/export</id>
    <title>9e2ad2c2-b7e4-4118-91c6-052d8154c03b</title>
    <updated>2026-05-09T06:08:33.286464+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9e2ad2c2-b7e4-4118-91c6-052d8154c03b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://t.me/CyberBulletin/2297", "content": "\u26a1CVE-2024-51547 (CVSS 9.8): Hard-Coded Credentials in ABB ASPECT.\n\n#CyberBulletin", "creation_timestamp": "2025-02-12T04:32:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9e2ad2c2-b7e4-4118-91c6-052d8154c03b/export"/>
    <published>2025-02-12T04:32:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/99421483-7b79-468c-be46-383b7db0cd99/export</id>
    <title>99421483-7b79-468c-be46-383b7db0cd99</title>
    <updated>2026-05-09T06:08:33.286314+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "99421483-7b79-468c-be46-383b7db0cd99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-051-01", "content": "", "creation_timestamp": "2025-02-20T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/99421483-7b79-468c-be46-383b7db0cd99/export"/>
    <published>2025-02-20T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/278f8b90-1b48-4995-8fb2-90daf18577a8/export</id>
    <title>278f8b90-1b48-4995-8fb2-90daf18577a8</title>
    <updated>2026-05-09T06:08:33.286136+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "278f8b90-1b48-4995-8fb2-90daf18577a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://t.me/ics_cert/1032", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u06a9\u0646\u062a\u0631\u0644 \u0641\u0631\u0622\u06cc\u0646\u062f ABB ASPECT-Enterprise \u0648 \u0645\u06cc\u0627\u0646\u200c\u0627\u0641\u0632\u0627\u0631 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc \u0633\u0631\u06cc ABB MATRIX \u0648 NEXUS \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0631\u0645\u0632\u06af\u0630\u0627\u0631\u06cc\u200c\u0634\u062f\u0647 \u0633\u062e\u062a \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u067e\u06cc\u0634 \u0641\u0631\u0636 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nBDU: 2025-01311\nCVE-2024-51547\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f\u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u06a9\u0647 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631. - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0644\u06cc\u0633\u062a \"\u0633\u0641\u06cc\u062f\" \u0627\u0632 \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u06cc\u062f:\nhttps://search.abb.com/library/Download.aspx?DocumentID=9AKK108470A6775&amp;amp;LanguageCode=en&amp;amp;DocumentPartId=pdf%20-%20Public%20Advisory&amp;amp;Action=Launch\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-02-28T13:35:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/278f8b90-1b48-4995-8fb2-90daf18577a8/export"/>
    <published>2025-02-28T13:35:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6d8e5dae-995f-41f8-8c48-e9acfad4ba6e/export</id>
    <title>6d8e5dae-995f-41f8-8c48-e9acfad4ba6e</title>
    <updated>2026-05-09T06:08:33.285976+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6d8e5dae-995f-41f8-8c48-e9acfad4ba6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lm5xwjx67r2f", "content": "", "creation_timestamp": "2025-04-06T17:30:18.293074Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6d8e5dae-995f-41f8-8c48-e9acfad4ba6e/export"/>
    <published>2025-04-06T17:30:18.293074+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/64d3aff1-b7ae-465e-b6f2-14469601dfd0/export</id>
    <title>64d3aff1-b7ae-465e-b6f2-14469601dfd0</title>
    <updated>2026-05-09T06:08:33.285787+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "64d3aff1-b7ae-465e-b6f2-14469601dfd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lm6vavccoe2z", "content": "", "creation_timestamp": "2025-04-07T02:15:02.516853Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/64d3aff1-b7ae-465e-b6f2-14469601dfd0/export"/>
    <published>2025-04-07T02:15:02.516853+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ad3596c0-dda2-46ce-9d38-8475bac497ec/export</id>
    <title>ad3596c0-dda2-46ce-9d38-8475bac497ec</title>
    <updated>2026-05-09T06:08:33.282049+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ad3596c0-dda2-46ce-9d38-8475bac497ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51546", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmxigzehlj2c", "content": "", "creation_timestamp": "2025-04-16T21:02:28.977487Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ad3596c0-dda2-46ce-9d38-8475bac497ec/export"/>
    <published>2025-04-16T21:02:28.977487+00:00</published>
  </entry>
</feed>
