<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T12:56:36.905479+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c7497ce4-ab12-4361-beb4-a5084c4b4022/export</id>
    <title>c7497ce4-ab12-4361-beb4-a5084c4b4022</title>
    <updated>2026-05-10T12:56:36.967827+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c7497ce4-ab12-4361-beb4-a5084c4b4022", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24838", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mdh6hveufm2r", "content": "", "creation_timestamp": "2026-01-28T02:00:46.746055Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c7497ce4-ab12-4361-beb4-a5084c4b4022/export"/>
    <published>2026-01-28T02:00:46.746055+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/73f70ba3-182d-4cdd-8b04-2cf369b14c7b/export</id>
    <title>73f70ba3-182d-4cdd-8b04-2cf369b14c7b</title>
    <updated>2026-05-10T12:56:36.967745+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "73f70ba3-182d-4cdd-8b04-2cf369b14c7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24838", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mdh6jdid452g", "content": "", "creation_timestamp": "2026-01-28T02:01:35.077990Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/73f70ba3-182d-4cdd-8b04-2cf369b14c7b/export"/>
    <published>2026-01-28T02:01:35.077990+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d8a4a902-56ea-460d-bc70-5f7fff3d4892/export</id>
    <title>d8a4a902-56ea-460d-bc70-5f7fff3d4892</title>
    <updated>2026-05-10T12:56:36.967656+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d8a4a902-56ea-460d-bc70-5f7fff3d4892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24835", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mdjbrhyc7l2r", "content": "", "creation_timestamp": "2026-01-28T22:05:09.664973Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d8a4a902-56ea-460d-bc70-5f7fff3d4892/export"/>
    <published>2026-01-28T22:05:09.664973+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d0bdca01-b5d0-4881-a79b-91d17ae01144/export</id>
    <title>d0bdca01-b5d0-4881-a79b-91d17ae01144</title>
    <updated>2026-05-10T12:56:36.967511+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d0bdca01-b5d0-4881-a79b-91d17ae01144", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24835", "type": "published-proof-of-concept", "source": "https://t.me/poxek/5867", "content": "\u041b\u043e\u0432\u0438\u0442\u0435 \u0432\u043a\u0443\u0441\u043d\u044b\u0435 \u0431\u0430\u0433\u0438 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u0439 \u043d\u0435\u0434\u0435\u043b\u0438\n#CVE #RCE #SiliconLabsZigbee #IBM_Db2 #Open5GS #Podman #Apache\n\n\u27a1\ufe0f Open5GS (CVE-2026-1586, CVSS 5.5) \u2014 DoS \u0432 Open5GS, \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0439 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 5G Core Network. \u0411\u0430\u0433 \u0440\u0430\u0441\u043f\u043e\u043b\u043e\u0436\u0435\u043d \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 ogs_gtp2_f_teid_to_ip \u0444\u0430\u0439\u043b\u0430 /sgwc/s11-handler.c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 SGWC \u0438 \u0441\u0432\u044f\u0437\u0430\u043d \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 \u043f\u043e\u043b\u0435\u0439 GTPv2 F-TEID \u043d\u0430 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 S11. \u0423\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043c\u043e\u0436\u0435\u0442 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 GTP-\u043f\u0430\u043a\u0435\u0442 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 bearer modification \u0438\u043b\u0438 context creation, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043a\u0440\u0430\u0448\u0443 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 SGWC \u0438 DoS \u0432\u0441\u0435\u0433\u043e 5G-\u044f\u0434\u0440\u0430. \u0415\u0441\u0442\u044c PoC.\n\n\u27a1\ufe0f Podman Desktop (CVE-2026-24835, CVSS 8.8) \u2014 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 Podman Desktop, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c\u0443 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044e \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c permission checks. \u0424\u0443\u043d\u043a\u0446\u0438\u044f isAccessAllowed() \u0431\u0435\u0437\u0443\u0441\u043b\u043e\u0432\u043d\u043e \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u0435\u0442 true, \u0442\u0435\u043c \u0441\u0430\u043c\u044b\u043c \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a\u043e \u0432\u0441\u0435\u043c authentication sessions \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \u042d\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u0438\u043c\u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0435 \u0442\u043e\u043a\u0435\u043d\u044b \u0438 \u0441\u0435\u0441\u0441\u0438\u0438 \u0438\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0438\u0439, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0432 \u0441\u0440\u0435\u0434\u0435 Podman Desktop. \u0415\u0441\u0442\u044c PoC.\n\n\u27a1\ufe0f Apache bRPC (CVE-2025-60021, CVSS 9.8) \u2014 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441\u043e \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u043c \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u043c heap-\u043f\u0440\u043e\u0444\u0438\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f. HTTP-\u044d\u043d\u0434\u043f\u043e\u0438\u043d\u0442 /pprof/heap?extra_options= \u043d\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442 \u0432\u0430\u043b\u0438\u0434\u0430\u0446\u0438\u044e \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430 extra_options, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u0435\u0440\u0435\u0434\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0438 \u043f\u0440\u043e\u0444\u0430\u0439\u043b\u0435\u0440\u0430. \u042d\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u0430 \u043f\u0440\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0438 \u044d\u043d\u0434\u043f\u043e\u0438\u043d\u0442\u0430.  \u0415\u0441\u0442\u044c PoC.\n\n\u27a1\ufe0f Silicon Labs Zigbee (CVE-2025-7964, CVSS 9.2) \u2014 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 802.15.4 MAC Data Request \u043a\u043e\u043e\u0440\u0434\u0438\u043d\u0430\u0442\u043e\u0440\u043e\u043c \u0441\u0435\u0442\u0438. \u041f\u0440\u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e MAC-\u0444\u0440\u0435\u0439\u043c\u0430 \u043a\u043e\u043e\u0440\u0434\u0438\u043d\u0430\u0442\u043e\u0440 \u043e\u0448\u0438\u0431\u043e\u0447\u043d\u043e \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u0443\u0435\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 network leave \u0434\u043b\u044f \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440 \u0437\u0430\u0432\u0438\u0441\u0430\u0435\u0442 \u0438 \u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u043e \u043f\u0440\u0438\u0441\u043e\u0435\u0434\u0438\u043d\u0438\u0442\u044c\u0441\u044f \u043a \u0441\u0435\u0442\u0438 \u0431\u0435\u0437 \u0440\u0443\u0447\u043d\u043e\u0433\u043e \u0432\u043c\u0435\u0448\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a DoS \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u044b\u0445 \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\u27a1\ufe0f IBM Db2 for Windows (CVE-2025-36384, CVSS 8.4) \u2014 unquoted search path \u0432 IBM Db2 for Windows. \u041b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u0436\u0435\u0442 \u0440\u0430\u0437\u043c\u0435\u0441\u0442\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0439 \u0444\u0430\u0439\u043b \u0432 \u043e\u0434\u043d\u043e\u043c \u0438\u0437 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u043e\u0432, \u0443\u0447\u0430\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0432 \u043d\u0435\u043a\u0430\u0432\u044b\u0447\u0435\u043d\u043d\u043e\u0439 search path, \u0438 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0435\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0438\u0441\u0430 Db2. \u042d\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u0441\u043a\u0430\u043b\u0430\u0446\u0438\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e SYSTEM \u0438 \u0437\u0430\u0445\u0432\u0430\u0442\u0443 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u043d\u0430\u0434 \u0445\u043e\u0441\u0442\u043e\u043c \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u041e\u0421, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0434\u0430\u043d\u043d\u044b\u043c \u0438 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0421\u0423\u0411\u0414 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u0440\u0430\u0432 \u041e\u0421.\n\n\ud83c\udf1a @poxek | \ud83d\udcf2 MAX |\ud83c\udf1a \u0411\u043b\u043e\u0433 | \ud83d\udcfa YT | \ud83d\udcfa RT | \ud83d\udcfa VK", "creation_timestamp": "2026-02-02T06:24:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d0bdca01-b5d0-4881-a79b-91d17ae01144/export"/>
    <published>2026-02-02T06:24:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f4c38143-a14f-4e27-86d9-9084fb6daf48/export</id>
    <title>f4c38143-a14f-4e27-86d9-9084fb6daf48</title>
    <updated>2026-05-10T12:56:36.967421+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f4c38143-a14f-4e27-86d9-9084fb6daf48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24834", "type": "seen", "source": "https://gist.github.com/alon710/190b52f5cf2955da46507c2a49f7b03c", "content": "", "creation_timestamp": "2026-02-19T16:10:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f4c38143-a14f-4e27-86d9-9084fb6daf48/export"/>
    <published>2026-02-19T16:10:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/deda0e11-6f26-40b9-aaab-097966eac517/export</id>
    <title>deda0e11-6f26-40b9-aaab-097966eac517</title>
    <updated>2026-05-10T12:56:36.967324+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "deda0e11-6f26-40b9-aaab-097966eac517", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24834", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfa6h34cr625", "content": "", "creation_timestamp": "2026-02-19T18:02:04.034779Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/deda0e11-6f26-40b9-aaab-097966eac517/export"/>
    <published>2026-02-19T18:02:04.034779+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/588c4139-1170-439e-b779-1a0b4b709388/export</id>
    <title>588c4139-1170-439e-b779-1a0b4b709388</title>
    <updated>2026-05-10T12:56:36.967231+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "588c4139-1170-439e-b779-1a0b4b709388", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24834", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfa6hxaxz72c", "content": "", "creation_timestamp": "2026-02-19T18:02:33.563266Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/588c4139-1170-439e-b779-1a0b4b709388/export"/>
    <published>2026-02-19T18:02:33.563266+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/143e82a9-6886-4425-8915-deddeacd52e4/export</id>
    <title>143e82a9-6886-4425-8915-deddeacd52e4</title>
    <updated>2026-05-10T12:56:36.967132+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "143e82a9-6886-4425-8915-deddeacd52e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24834", "type": "seen", "source": "https://bsky.app/profile/cyber-news-fi.bsky.social/post/3mfb5zqxncy2a", "content": "", "creation_timestamp": "2026-02-20T03:27:17.817364Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/143e82a9-6886-4425-8915-deddeacd52e4/export"/>
    <published>2026-02-20T03:27:17.817364+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/489adbce-9087-4097-acff-1daa8d53718d/export</id>
    <title>489adbce-9087-4097-acff-1daa8d53718d</title>
    <updated>2026-05-10T12:56:36.966997+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "489adbce-9087-4097-acff-1daa8d53718d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-24834", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mfkkbf4pyu2m", "content": "", "creation_timestamp": "2026-02-23T21:00:15.710820Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/489adbce-9087-4097-acff-1daa8d53718d/export"/>
    <published>2026-02-23T21:00:15.710820+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ad45b543-5fad-4b8f-a1b8-3e8307e1424c/export</id>
    <title>ad45b543-5fad-4b8f-a1b8-3e8307e1424c</title>
    <updated>2026-05-10T12:56:36.964702+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ad45b543-5fad-4b8f-a1b8-3e8307e1424c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-2483", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhwdbcjpbb22", "content": "", "creation_timestamp": "2026-03-26T00:17:16.645860Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ad45b543-5fad-4b8f-a1b8-3e8307e1424c/export"/>
    <published>2026-03-26T00:17:16.645860+00:00</published>
  </entry>
</feed>
