<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 19:14:38 +0000</lastBuildDate>
    <item>
      <title>fce7a33c-f63d-4954-afb1-02186736eb11</title>
      <link>https://vulnerability.circl.lu/sighting/fce7a33c-f63d-4954-afb1-02186736eb11/export</link>
      <description>{"uuid": "fce7a33c-f63d-4954-afb1-02186736eb11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq6kjbgs2o", "content": "", "creation_timestamp": "2025-01-03T04:15:57.192949Z"}</description>
      <content:encoded>{"uuid": "fce7a33c-f63d-4954-afb1-02186736eb11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq6kjbgs2o", "content": "", "creation_timestamp": "2025-01-03T04:15:57.192949Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fce7a33c-f63d-4954-afb1-02186736eb11/export</guid>
      <pubDate>Fri, 03 Jan 2025 04:15:57 +0000</pubDate>
    </item>
    <item>
      <title>6752a815-3911-450b-afef-286d53235118</title>
      <link>https://vulnerability.circl.lu/sighting/6752a815-3911-450b-afef-286d53235118/export</link>
      <description>{"uuid": "6752a815-3911-450b-afef-286d53235118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrodvbx52q", "content": "", "creation_timestamp": "2025-01-03T04:42:40.717221Z"}</description>
      <content:encoded>{"uuid": "6752a815-3911-450b-afef-286d53235118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrodvbx52q", "content": "", "creation_timestamp": "2025-01-03T04:42:40.717221Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6752a815-3911-450b-afef-286d53235118/export</guid>
      <pubDate>Fri, 03 Jan 2025 04:42:40 +0000</pubDate>
    </item>
    <item>
      <title>efa48a32-73c7-4b20-8edf-d4944a7f3d3b</title>
      <link>https://vulnerability.circl.lu/sighting/efa48a32-73c7-4b20-8edf-d4944a7f3d3b/export</link>
      <description>{"uuid": "efa48a32-73c7-4b20-8edf-d4944a7f3d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesroeofh62e", "content": "", "creation_timestamp": "2025-01-03T04:42:42.994307Z"}</description>
      <content:encoded>{"uuid": "efa48a32-73c7-4b20-8edf-d4944a7f3d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesroeofh62e", "content": "", "creation_timestamp": "2025-01-03T04:42:42.994307Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/efa48a32-73c7-4b20-8edf-d4944a7f3d3b/export</guid>
      <pubDate>Fri, 03 Jan 2025 04:42:42 +0000</pubDate>
    </item>
    <item>
      <title>a3e9ae47-d628-4efd-828b-d4955e9aa023</title>
      <link>https://vulnerability.circl.lu/sighting/a3e9ae47-d628-4efd-828b-d4955e9aa023/export</link>
      <description>{"uuid": "a3e9ae47-d628-4efd-828b-d4955e9aa023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrof626o2k", "content": "", "creation_timestamp": "2025-01-03T04:42:45.037502Z"}</description>
      <content:encoded>{"uuid": "a3e9ae47-d628-4efd-828b-d4955e9aa023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrof626o2k", "content": "", "creation_timestamp": "2025-01-03T04:42:45.037502Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a3e9ae47-d628-4efd-828b-d4955e9aa023/export</guid>
      <pubDate>Fri, 03 Jan 2025 04:42:45 +0000</pubDate>
    </item>
    <item>
      <title>779a4e27-9d1b-403f-bf99-9c357b19595b</title>
      <link>https://vulnerability.circl.lu/sighting/779a4e27-9d1b-403f-bf99-9c357b19595b/export</link>
      <description>{"uuid": "779a4e27-9d1b-403f-bf99-9c357b19595b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113762797652955807", "content": "", "creation_timestamp": "2025-01-03T05:35:33.030470Z"}</description>
      <content:encoded>{"uuid": "779a4e27-9d1b-403f-bf99-9c357b19595b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113762797652955807", "content": "", "creation_timestamp": "2025-01-03T05:35:33.030470Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/779a4e27-9d1b-403f-bf99-9c357b19595b/export</guid>
      <pubDate>Fri, 03 Jan 2025 05:35:33 +0000</pubDate>
    </item>
    <item>
      <title>d38ecabd-636f-43b4-be3a-3a650e39fc3c</title>
      <link>https://vulnerability.circl.lu/sighting/d38ecabd-636f-43b4-be3a-3a650e39fc3c/export</link>
      <description>{"uuid": "d38ecabd-636f-43b4-be3a-3a650e39fc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://t.me/cvedetector/14211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53840 - Venezuela Biometrics Extractables Fingerprint Extraction\", \n  \"Content\": \"CVE ID : CVE-2024-53840 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:00.000000Z"}</description>
      <content:encoded>{"uuid": "d38ecabd-636f-43b4-be3a-3a650e39fc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://t.me/cvedetector/14211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53840 - Venezuela Biometrics Extractables Fingerprint Extraction\", \n  \"Content\": \"CVE ID : CVE-2024-53840 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d38ecabd-636f-43b4-be3a-3a650e39fc3c/export</guid>
      <pubDate>Fri, 03 Jan 2025 06:09:00 +0000</pubDate>
    </item>
    <item>
      <title>87cd7f50-4ef3-4abb-9bec-0a80153b6e93</title>
      <link>https://vulnerability.circl.lu/sighting/87cd7f50-4ef3-4abb-9bec-0a80153b6e93/export</link>
      <description>{"uuid": "87cd7f50-4ef3-4abb-9bec-0a80153b6e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://t.me/cvedetector/14212", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53841 - Google Android Confused Deputy Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53841 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In startListeningForDeviceStateChanges, there is a possible Permission Bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:03.000000Z"}</description>
      <content:encoded>{"uuid": "87cd7f50-4ef3-4abb-9bec-0a80153b6e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://t.me/cvedetector/14212", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53841 - Google Android Confused Deputy Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53841 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In startListeningForDeviceStateChanges, there is a possible Permission Bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/87cd7f50-4ef3-4abb-9bec-0a80153b6e93/export</guid>
      <pubDate>Fri, 03 Jan 2025 06:09:03 +0000</pubDate>
    </item>
    <item>
      <title>b157a9da-d8f9-4043-afa7-ce255cb598a2</title>
      <link>https://vulnerability.circl.lu/sighting/b157a9da-d8f9-4043-afa7-ce255cb598a2/export</link>
      <description>{"uuid": "b157a9da-d8f9-4043-afa7-ce255cb598a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://t.me/cvedetector/14213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53842 - \"Adobe CC Remote Code Execution via Out-of-Bounds Write\"\", \n  \"Content\": \"CVE ID : CVE-2024-53842 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:04.000000Z"}</description>
      <content:encoded>{"uuid": "b157a9da-d8f9-4043-afa7-ce255cb598a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://t.me/cvedetector/14213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53842 - \"Adobe CC Remote Code Execution via Out-of-Bounds Write\"\", \n  \"Content\": \"CVE ID : CVE-2024-53842 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b157a9da-d8f9-4043-afa7-ce255cb598a2/export</guid>
      <pubDate>Fri, 03 Jan 2025 06:09:04 +0000</pubDate>
    </item>
    <item>
      <title>8fe2181a-136e-4086-b2d4-64109b560e9a</title>
      <link>https://vulnerability.circl.lu/sighting/8fe2181a-136e-4086-b2d4-64109b560e9a/export</link>
      <description>{"uuid": "8fe2181a-136e-4086-b2d4-64109b560e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5384", "type": "seen", "source": "Telegram/PumtoLv5DzWvg5dem_J2gBwiVGKncDY-OEoR-GcC5h0afuLo", "content": "", "creation_timestamp": "2025-02-14T10:03:08.000000Z"}</description>
      <content:encoded>{"uuid": "8fe2181a-136e-4086-b2d4-64109b560e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5384", "type": "seen", "source": "Telegram/PumtoLv5DzWvg5dem_J2gBwiVGKncDY-OEoR-GcC5h0afuLo", "content": "", "creation_timestamp": "2025-02-14T10:03:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8fe2181a-136e-4086-b2d4-64109b560e9a/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:03:08 +0000</pubDate>
    </item>
    <item>
      <title>f560a461-5a6f-4186-9ee3-21c9e6f73a3f</title>
      <link>https://vulnerability.circl.lu/sighting/f560a461-5a6f-4186-9ee3-21c9e6f73a3f/export</link>
      <description>{"uuid": "f560a461-5a6f-4186-9ee3-21c9e6f73a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53849", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m4lt3xh4ts2f", "content": "", "creation_timestamp": "2025-11-01T20:24:14.843087Z"}</description>
      <content:encoded>{"uuid": "f560a461-5a6f-4186-9ee3-21c9e6f73a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53849", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m4lt3xh4ts2f", "content": "", "creation_timestamp": "2025-11-01T20:24:14.843087Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f560a461-5a6f-4186-9ee3-21c9e6f73a3f/export</guid>
      <pubDate>Sat, 01 Nov 2025 20:24:14 +0000</pubDate>
    </item>
  </channel>
</rss>
