<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T23:28:18.797219+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ba247bfb-be61-4272-9ee4-e1a5eabe0e22/export</id>
    <title>ba247bfb-be61-4272-9ee4-e1a5eabe0e22</title>
    <updated>2026-05-09T23:28:19.020463+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ba247bfb-be61-4272-9ee4-e1a5eabe0e22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29967", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lp5wa3nzc22u", "content": "", "creation_timestamp": "2025-05-14T21:15:29.582923Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ba247bfb-be61-4272-9ee4-e1a5eabe0e22/export"/>
    <published>2025-05-14T21:15:29.582923+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2f025988-61b6-4e02-b817-7f97a12f5a23/export</id>
    <title>2f025988-61b6-4e02-b817-7f97a12f5a23</title>
    <updated>2026-05-09T23:28:19.020372+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2f025988-61b6-4e02-b817-7f97a12f5a23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29966", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17099", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29966\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:30.904Z\n\ud83d\udccf Modified: 2025-05-21T02:17:56.053Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29966", "creation_timestamp": "2025-05-21T02:50:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2f025988-61b6-4e02-b817-7f97a12f5a23/export"/>
    <published>2025-05-21T02:50:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0eb76c04-6151-42d5-b801-df74ffc35e35/export</id>
    <title>0eb76c04-6151-42d5-b801-df74ffc35e35</title>
    <updated>2026-05-09T23:28:19.020295+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0eb76c04-6151-42d5-b801-df74ffc35e35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29969", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/116099035255751023", "content": "", "creation_timestamp": "2026-02-19T19:51:32.419494Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0eb76c04-6151-42d5-b801-df74ffc35e35/export"/>
    <published>2026-02-19T19:51:32.419494+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8d4187c4-0201-4b30-a554-6e7328f24d03/export</id>
    <title>8d4187c4-0201-4b30-a554-6e7328f24d03</title>
    <updated>2026-05-09T23:28:19.020217+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8d4187c4-0201-4b30-a554-6e7328f24d03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29969", "type": "seen", "source": "https://bsky.app/profile/warthogtk.bsky.social/post/3mfan6p2bg52y", "content": "", "creation_timestamp": "2026-02-19T22:25:49.464149Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8d4187c4-0201-4b30-a554-6e7328f24d03/export"/>
    <published>2026-02-19T22:25:49.464149+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2f1316bc-e34e-47ab-856e-7760aef8b55b/export</id>
    <title>2f1316bc-e34e-47ab-856e-7760aef8b55b</title>
    <updated>2026-05-09T23:28:19.020135+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2f1316bc-e34e-47ab-856e-7760aef8b55b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29969", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3mfbfg3ridy2a", "content": "", "creation_timestamp": "2026-02-20T05:39:27.352473Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2f1316bc-e34e-47ab-856e-7760aef8b55b/export"/>
    <published>2026-02-20T05:39:27.352473+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/18de3c78-fbb4-4317-8286-b889cfa4f691/export</id>
    <title>18de3c78-fbb4-4317-8286-b889cfa4f691</title>
    <updated>2026-05-09T23:28:19.020048+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "18de3c78-fbb4-4317-8286-b889cfa4f691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29969", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mfbgbrtltf2d", "content": "", "creation_timestamp": "2026-02-20T05:54:57.431940Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/18de3c78-fbb4-4317-8286-b889cfa4f691/export"/>
    <published>2026-02-20T05:54:57.431940+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7dd03465-543e-4804-bf60-235cac78306d/export</id>
    <title>7dd03465-543e-4804-bf60-235cac78306d</title>
    <updated>2026-05-09T23:28:19.019963+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7dd03465-543e-4804-bf60-235cac78306d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29969", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3mfc3g3kpxa2d", "content": "", "creation_timestamp": "2026-02-20T12:13:09.384991Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7dd03465-543e-4804-bf60-235cac78306d/export"/>
    <published>2026-02-20T12:13:09.384991+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9744854a-d782-4025-bedf-a5c69a9843eb/export</id>
    <title>9744854a-d782-4025-bedf-a5c69a9843eb</title>
    <updated>2026-05-09T23:28:19.019872+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9744854a-d782-4025-bedf-a5c69a9843eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29969", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3mfcrf5y5wp2i", "content": "", "creation_timestamp": "2026-02-20T18:46:20.733827Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9744854a-d782-4025-bedf-a5c69a9843eb/export"/>
    <published>2026-02-20T18:46:20.733827+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/736bc051-fdc1-4b9e-aac9-f26829be53c5/export</id>
    <title>736bc051-fdc1-4b9e-aac9-f26829be53c5</title>
    <updated>2026-05-09T23:28:19.019743+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "736bc051-fdc1-4b9e-aac9-f26829be53c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29969", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3mfe3qx5q5x2c", "content": "", "creation_timestamp": "2026-02-21T07:24:32.936562Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/736bc051-fdc1-4b9e-aac9-f26829be53c5/export"/>
    <published>2026-02-21T07:24:32.936562+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/efe515b5-3dfa-4670-ae23-2891cb4c7e3b/export</id>
    <title>efe515b5-3dfa-4670-ae23-2891cb4c7e3b</title>
    <updated>2026-05-09T23:28:19.017666+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "efe515b5-3dfa-4670-ae23-2891cb4c7e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29969", "type": "seen", "source": "https://bsky.app/profile/co11ateral.bsky.social/post/3mfepsfvh622s", "content": "", "creation_timestamp": "2026-02-21T13:23:42.693743Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/efe515b5-3dfa-4670-ae23-2891cb4c7e3b/export"/>
    <published>2026-02-21T13:23:42.693743+00:00</published>
  </entry>
</feed>
