<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T12:57:37.643231+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a09c2176-66d4-4d1f-bbf1-33eaffe09f7a/export</id>
    <title>a09c2176-66d4-4d1f-bbf1-33eaffe09f7a</title>
    <updated>2026-05-10T12:57:37.872547+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a09c2176-66d4-4d1f-bbf1-33eaffe09f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56023", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2ruhdyk25", "content": "", "creation_timestamp": "2025-01-02T12:20:23.622748Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a09c2176-66d4-4d1f-bbf1-33eaffe09f7a/export"/>
    <published>2025-01-02T12:20:23.622748+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/55d72ab5-0072-434d-8d49-718dcf6945f9/export</id>
    <title>55d72ab5-0072-434d-8d49-718dcf6945f9</title>
    <updated>2026-05-10T12:57:37.872474+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "55d72ab5-0072-434d-8d49-718dcf6945f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56024", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2rwojy325", "content": "", "creation_timestamp": "2025-01-02T12:20:25.685199Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/55d72ab5-0072-434d-8d49-718dcf6945f9/export"/>
    <published>2025-01-02T12:20:25.685199+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c916cad5-aafa-43c6-85e7-00430fe8a93c/export</id>
    <title>c916cad5-aafa-43c6-85e7-00430fe8a93c</title>
    <updated>2026-05-10T12:57:37.872402+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c916cad5-aafa-43c6-85e7-00430fe8a93c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56025", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2rzabiz2o", "content": "", "creation_timestamp": "2025-01-02T12:20:27.753082Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c916cad5-aafa-43c6-85e7-00430fe8a93c/export"/>
    <published>2025-01-02T12:20:27.753082+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a7395c6e-698b-445f-84ff-d43c5f495c2b/export</id>
    <title>a7395c6e-698b-445f-84ff-d43c5f495c2b</title>
    <updated>2026-05-10T12:57:37.872328+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a7395c6e-698b-445f-84ff-d43c5f495c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56026", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2s3i4es25", "content": "", "creation_timestamp": "2025-01-02T12:20:30.337723Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a7395c6e-698b-445f-84ff-d43c5f495c2b/export"/>
    <published>2025-01-02T12:20:30.337723+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a431cd19-f116-4b16-af79-11f7f29a3969/export</id>
    <title>a431cd19-f116-4b16-af79-11f7f29a3969</title>
    <updated>2026-05-10T12:57:37.872249+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a431cd19-f116-4b16-af79-11f7f29a3969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56022", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760332013809181", "content": "", "creation_timestamp": "2025-01-02T19:08:30.716777Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a431cd19-f116-4b16-af79-11f7f29a3969/export"/>
    <published>2025-01-02T19:08:30.716777+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e541af57-ab10-40d7-95f3-59e71b3141a0/export</id>
    <title>e541af57-ab10-40d7-95f3-59e71b3141a0</title>
    <updated>2026-05-10T12:57:37.872169+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e541af57-ab10-40d7-95f3-59e71b3141a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56023", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760332027706244", "content": "", "creation_timestamp": "2025-01-02T19:08:30.808346Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e541af57-ab10-40d7-95f3-59e71b3141a0/export"/>
    <published>2025-01-02T19:08:30.808346+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6/export</id>
    <title>eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6</title>
    <updated>2026-05-10T12:57:37.872088+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56024", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391024732496", "content": "", "creation_timestamp": "2025-01-02T19:23:30.798423Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6/export"/>
    <published>2025-01-02T19:23:30.798423+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1c8f1bde-2aaa-41b8-9d0b-ff7657aea783/export</id>
    <title>1c8f1bde-2aaa-41b8-9d0b-ff7657aea783</title>
    <updated>2026-05-10T12:57:37.872002+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1c8f1bde-2aaa-41b8-9d0b-ff7657aea783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56025", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391039334070", "content": "", "creation_timestamp": "2025-01-02T19:23:31.104009Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1c8f1bde-2aaa-41b8-9d0b-ff7657aea783/export"/>
    <published>2025-01-02T19:23:31.104009+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9fa88573-a673-4b53-961e-66a694156386/export</id>
    <title>9fa88573-a673-4b53-961e-66a694156386</title>
    <updated>2026-05-10T12:57:37.871890+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9fa88573-a673-4b53-961e-66a694156386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56026", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391053875471", "content": "", "creation_timestamp": "2025-01-02T19:23:31.386758Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9fa88573-a673-4b53-961e-66a694156386/export"/>
    <published>2025-01-02T19:23:31.386758+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1bc741fa-394c-4374-9478-5c83db71452f/export</id>
    <title>1bc741fa-394c-4374-9478-5c83db71452f</title>
    <updated>2026-05-10T12:57:37.869199+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1bc741fa-394c-4374-9478-5c83db71452f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5602", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-5602\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution.  Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.\n\nThe NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.\u202f Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy.\n\ud83d\udccf Published: 2024-07-23T13:15:50.508Z\n\ud83d\udccf Modified: 2025-05-01T03:55:27.855Z\n\ud83d\udd17 References:\n1. https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/stack-based-buffer-overflow-vulnerability-in-ni-io-trace-tool.html", "creation_timestamp": "2025-05-01T04:14:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1bc741fa-394c-4374-9478-5c83db71452f/export"/>
    <published>2025-05-01T04:14:50+00:00</published>
  </entry>
</feed>
