<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T04:36:42.198194+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/027a95cf-702a-437b-a6a0-e3a49231e33d/export</id>
    <title>027a95cf-702a-437b-a6a0-e3a49231e33d</title>
    <updated>2026-05-09T04:36:42.509931+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "027a95cf-702a-437b-a6a0-e3a49231e33d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://t.me/cvedetector/24059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29906 - Finit TTY Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29906 \nPublished : April 29, 2025, 11:16 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T03:42:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/027a95cf-702a-437b-a6a0-e3a49231e33d/export"/>
    <published>2025-04-30T03:42:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c2f0320b-8a15-4682-9077-2dcef29b7b81/export</id>
    <title>c2f0320b-8a15-4682-9077-2dcef29b7b81</title>
    <updated>2026-05-09T04:36:42.509867+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c2f0320b-8a15-4682-9077-2dcef29b7b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114427071199222062", "content": "", "creation_timestamp": "2025-04-30T13:09:03.064629Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c2f0320b-8a15-4682-9077-2dcef29b7b81/export"/>
    <published>2025-04-30T13:09:03.064629+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2ad97978-dad3-4927-ac70-b1f2755cadeb/export</id>
    <title>2ad97978-dad3-4927-ac70-b1f2755cadeb</title>
    <updated>2026-05-09T04:36:42.509806+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2ad97978-dad3-4927-ac70-b1f2755cadeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lo3f6lra6e23", "content": "", "creation_timestamp": "2025-05-01T03:39:49.856459Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2ad97978-dad3-4927-ac70-b1f2755cadeb/export"/>
    <published>2025-05-01T03:39:49.856459+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0b9f234a-6f92-47be-85b8-f14e3bd01f95/export</id>
    <title>0b9f234a-6f92-47be-85b8-f14e3bd01f95</title>
    <updated>2026-05-09T04:36:42.509743+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0b9f234a-6f92-47be-85b8-f14e3bd01f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lo3zep6x3z2u", "content": "", "creation_timestamp": "2025-05-01T09:41:09.060574Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0b9f234a-6f92-47be-85b8-f14e3bd01f95/export"/>
    <published>2025-05-01T09:41:09.060574+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f1127051-c59c-4c4d-bc27-38a0d913a9e9/export</id>
    <title>f1127051-c59c-4c4d-bc27-38a0d913a9e9</title>
    <updated>2026-05-09T04:36:42.509665+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f1127051-c59c-4c4d-bc27-38a0d913a9e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18286", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29902\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Remote code execution that allows unauthorized users to execute arbitrary code on the server machine.\n\ud83d\udccf Published: 2025-06-13T09:23:49.631Z\n\ud83d\udccf Modified: 2025-06-13T09:23:49.631Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/BOSCH-SA-992447.html", "creation_timestamp": "2025-06-13T09:34:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f1127051-c59c-4c4d-bc27-38a0d913a9e9/export"/>
    <published>2025-06-13T09:34:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2abe452e-b5e3-45a4-bdd7-b807414c54fe/export</id>
    <title>2abe452e-b5e3-45a4-bdd7-b807414c54fe</title>
    <updated>2026-05-09T04:36:42.509596+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2abe452e-b5e3-45a4-bdd7-b807414c54fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "Telegram/nG2kdAsSMNJFnQuBB8eLNRFNXLlpnIS3vQaD1YGco_2LIks", "content": "", "creation_timestamp": "2025-06-13T10:32:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2abe452e-b5e3-45a4-bdd7-b807414c54fe/export"/>
    <published>2025-06-13T10:32:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/02c11e21-e654-4beb-8880-07b0263a2b04/export</id>
    <title>02c11e21-e654-4beb-8880-07b0263a2b04</title>
    <updated>2026-05-09T04:36:42.509525+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "02c11e21-e654-4beb-8880-07b0263a2b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrif4ccs5z2r", "content": "", "creation_timestamp": "2025-06-13T11:58:43.869547Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/02c11e21-e654-4beb-8880-07b0263a2b04/export"/>
    <published>2025-06-13T11:58:43.869547+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9af31f9d-9293-4bc1-a4a1-3f3bf1635445/export</id>
    <title>9af31f9d-9293-4bc1-a4a1-3f3bf1635445</title>
    <updated>2026-05-09T04:36:42.509453+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9af31f9d-9293-4bc1-a4a1-3f3bf1635445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29905", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-385/", "content": "", "creation_timestamp": "2025-06-16T03:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9af31f9d-9293-4bc1-a4a1-3f3bf1635445/export"/>
    <published>2025-06-16T03:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bc3ced8a-34cd-4f09-b291-bb3cd14d9c70/export</id>
    <title>bc3ced8a-34cd-4f09-b291-bb3cd14d9c70</title>
    <updated>2026-05-09T04:36:42.509351+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bc3ced8a-34cd-4f09-b291-bb3cd14d9c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29903", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bc3ced8a-34cd-4f09-b291-bb3cd14d9c70/export"/>
    <published>2025-08-13T13:26:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e66280a8-9013-4599-8898-5527e49d2fdc/export</id>
    <title>e66280a8-9013-4599-8898-5527e49d2fdc</title>
    <updated>2026-05-09T04:36:42.507234+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e66280a8-9013-4599-8898-5527e49d2fdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29904", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e66280a8-9013-4599-8898-5527e49d2fdc/export"/>
    <published>2025-08-13T13:26:34+00:00</published>
  </entry>
</feed>
