<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T19:30:13.790002+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fc44dc30-6ab1-4843-81c1-51e8fbce50fd/export</id>
    <title>fc44dc30-6ab1-4843-81c1-51e8fbce50fd</title>
    <updated>2026-05-09T19:30:13.959943+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fc44dc30-6ab1-4843-81c1-51e8fbce50fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29837", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fc44dc30-6ab1-4843-81c1-51e8fbce50fd/export"/>
    <published>2025-05-13T16:27:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/02e296ca-93ce-471f-92dc-77bb765ab23e/export</id>
    <title>02e296ca-93ce-471f-92dc-77bb765ab23e</title>
    <updated>2026-05-09T19:30:13.959858+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "02e296ca-93ce-471f-92dc-77bb765ab23e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29833", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/02e296ca-93ce-471f-92dc-77bb765ab23e/export"/>
    <published>2025-05-13T16:27:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0764f536-68a8-4c16-b2c1-72b4f1feb7d1/export</id>
    <title>0764f536-68a8-4c16-b2c1-72b4f1feb7d1</title>
    <updated>2026-05-09T19:30:13.959776+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0764f536-68a8-4c16-b2c1-72b4f1feb7d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29838", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0764f536-68a8-4c16-b2c1-72b4f1feb7d1/export"/>
    <published>2025-05-13T16:27:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6bd0cd69-59df-4782-9fdd-fe16bd1f3834/export</id>
    <title>6bd0cd69-59df-4782-9fdd-fe16bd1f3834</title>
    <updated>2026-05-09T19:30:13.959686+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6bd0cd69-59df-4782-9fdd-fe16bd1f3834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29835", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6bd0cd69-59df-4782-9fdd-fe16bd1f3834/export"/>
    <published>2025-05-13T16:27:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/97a273ba-bc0c-4c72-86cb-a60ee9e9fe8e/export</id>
    <title>97a273ba-bc0c-4c72-86cb-a60ee9e9fe8e</title>
    <updated>2026-05-09T19:30:13.959605+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "97a273ba-bc0c-4c72-86cb-a60ee9e9fe8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29831", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114501744986577244", "content": "", "creation_timestamp": "2025-05-13T17:39:34.480765Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/97a273ba-bc0c-4c72-86cb-a60ee9e9fe8e/export"/>
    <published>2025-05-13T17:39:34.480765+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/85f050ab-4dd7-452b-94af-52e7dd6868a3/export</id>
    <title>85f050ab-4dd7-452b-94af-52e7dd6868a3</title>
    <updated>2026-05-09T19:30:13.959509+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "85f050ab-4dd7-452b-94af-52e7dd6868a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29830", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16189", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29830\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:56.830Z\n\ud83d\udccf Modified: 2025-05-13T18:09:02.620Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830", "creation_timestamp": "2025-05-13T18:30:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/85f050ab-4dd7-452b-94af-52e7dd6868a3/export"/>
    <published>2025-05-13T18:30:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f5ba7e41-3d55-4e21-b2bb-db165b24c67c/export</id>
    <title>f5ba7e41-3d55-4e21-b2bb-db165b24c67c</title>
    <updated>2026-05-09T19:30:13.959348+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f5ba7e41-3d55-4e21-b2bb-db165b24c67c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29831", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29831\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:57.400Z\n\ud83d\udccf Modified: 2025-05-13T18:08:39.064Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831", "creation_timestamp": "2025-05-13T18:30:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f5ba7e41-3d55-4e21-b2bb-db165b24c67c/export"/>
    <published>2025-05-13T18:30:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f6eb8947-c368-4525-82fd-7f0971c9f9cf/export</id>
    <title>f6eb8947-c368-4525-82fd-7f0971c9f9cf</title>
    <updated>2026-05-09T19:30:13.959100+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f6eb8947-c368-4525-82fd-7f0971c9f9cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29832", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16191", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29832\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:58.027Z\n\ud83d\udccf Modified: 2025-05-13T18:08:13.561Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832", "creation_timestamp": "2025-05-13T18:31:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f6eb8947-c368-4525-82fd-7f0971c9f9cf/export"/>
    <published>2025-05-13T18:31:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f7e01189-8327-4469-b6e4-015598c58ce4/export</id>
    <title>f7e01189-8327-4469-b6e4-015598c58ce4</title>
    <updated>2026-05-09T19:30:13.958820+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f7e01189-8327-4469-b6e4-015598c58ce4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29831", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpagrncz4c2h", "content": "", "creation_timestamp": "2025-05-15T21:17:00.188039Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f7e01189-8327-4469-b6e4-015598c58ce4/export"/>
    <published>2025-05-15T21:17:00.188039+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a041be54-42d8-4a5b-8d92-79c52cff2038/export</id>
    <title>a041be54-42d8-4a5b-8d92-79c52cff2038</title>
    <updated>2026-05-09T19:30:13.956286+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a041be54-42d8-4a5b-8d92-79c52cff2038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29837", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-293/", "content": "", "creation_timestamp": "2025-05-21T03:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a041be54-42d8-4a5b-8d92-79c52cff2038/export"/>
    <published>2025-05-21T03:00:00+00:00</published>
  </entry>
</feed>
