<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 12:57:37 +0000</lastBuildDate>
    <item>
      <title>a09c2176-66d4-4d1f-bbf1-33eaffe09f7a</title>
      <link>https://vulnerability.circl.lu/sighting/a09c2176-66d4-4d1f-bbf1-33eaffe09f7a/export</link>
      <description>{"uuid": "a09c2176-66d4-4d1f-bbf1-33eaffe09f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56023", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2ruhdyk25", "content": "", "creation_timestamp": "2025-01-02T12:20:23.622748Z"}</description>
      <content:encoded>{"uuid": "a09c2176-66d4-4d1f-bbf1-33eaffe09f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56023", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2ruhdyk25", "content": "", "creation_timestamp": "2025-01-02T12:20:23.622748Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a09c2176-66d4-4d1f-bbf1-33eaffe09f7a/export</guid>
      <pubDate>Thu, 02 Jan 2025 12:20:23 +0000</pubDate>
    </item>
    <item>
      <title>55d72ab5-0072-434d-8d49-718dcf6945f9</title>
      <link>https://vulnerability.circl.lu/sighting/55d72ab5-0072-434d-8d49-718dcf6945f9/export</link>
      <description>{"uuid": "55d72ab5-0072-434d-8d49-718dcf6945f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56024", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2rwojy325", "content": "", "creation_timestamp": "2025-01-02T12:20:25.685199Z"}</description>
      <content:encoded>{"uuid": "55d72ab5-0072-434d-8d49-718dcf6945f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56024", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2rwojy325", "content": "", "creation_timestamp": "2025-01-02T12:20:25.685199Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/55d72ab5-0072-434d-8d49-718dcf6945f9/export</guid>
      <pubDate>Thu, 02 Jan 2025 12:20:25 +0000</pubDate>
    </item>
    <item>
      <title>c916cad5-aafa-43c6-85e7-00430fe8a93c</title>
      <link>https://vulnerability.circl.lu/sighting/c916cad5-aafa-43c6-85e7-00430fe8a93c/export</link>
      <description>{"uuid": "c916cad5-aafa-43c6-85e7-00430fe8a93c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56025", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2rzabiz2o", "content": "", "creation_timestamp": "2025-01-02T12:20:27.753082Z"}</description>
      <content:encoded>{"uuid": "c916cad5-aafa-43c6-85e7-00430fe8a93c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56025", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2rzabiz2o", "content": "", "creation_timestamp": "2025-01-02T12:20:27.753082Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c916cad5-aafa-43c6-85e7-00430fe8a93c/export</guid>
      <pubDate>Thu, 02 Jan 2025 12:20:27 +0000</pubDate>
    </item>
    <item>
      <title>a7395c6e-698b-445f-84ff-d43c5f495c2b</title>
      <link>https://vulnerability.circl.lu/sighting/a7395c6e-698b-445f-84ff-d43c5f495c2b/export</link>
      <description>{"uuid": "a7395c6e-698b-445f-84ff-d43c5f495c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56026", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2s3i4es25", "content": "", "creation_timestamp": "2025-01-02T12:20:30.337723Z"}</description>
      <content:encoded>{"uuid": "a7395c6e-698b-445f-84ff-d43c5f495c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56026", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2s3i4es25", "content": "", "creation_timestamp": "2025-01-02T12:20:30.337723Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a7395c6e-698b-445f-84ff-d43c5f495c2b/export</guid>
      <pubDate>Thu, 02 Jan 2025 12:20:30 +0000</pubDate>
    </item>
    <item>
      <title>a431cd19-f116-4b16-af79-11f7f29a3969</title>
      <link>https://vulnerability.circl.lu/sighting/a431cd19-f116-4b16-af79-11f7f29a3969/export</link>
      <description>{"uuid": "a431cd19-f116-4b16-af79-11f7f29a3969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56022", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760332013809181", "content": "", "creation_timestamp": "2025-01-02T19:08:30.716777Z"}</description>
      <content:encoded>{"uuid": "a431cd19-f116-4b16-af79-11f7f29a3969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56022", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760332013809181", "content": "", "creation_timestamp": "2025-01-02T19:08:30.716777Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a431cd19-f116-4b16-af79-11f7f29a3969/export</guid>
      <pubDate>Thu, 02 Jan 2025 19:08:30 +0000</pubDate>
    </item>
    <item>
      <title>e541af57-ab10-40d7-95f3-59e71b3141a0</title>
      <link>https://vulnerability.circl.lu/sighting/e541af57-ab10-40d7-95f3-59e71b3141a0/export</link>
      <description>{"uuid": "e541af57-ab10-40d7-95f3-59e71b3141a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56023", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760332027706244", "content": "", "creation_timestamp": "2025-01-02T19:08:30.808346Z"}</description>
      <content:encoded>{"uuid": "e541af57-ab10-40d7-95f3-59e71b3141a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56023", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760332027706244", "content": "", "creation_timestamp": "2025-01-02T19:08:30.808346Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e541af57-ab10-40d7-95f3-59e71b3141a0/export</guid>
      <pubDate>Thu, 02 Jan 2025 19:08:30 +0000</pubDate>
    </item>
    <item>
      <title>eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6</title>
      <link>https://vulnerability.circl.lu/sighting/eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6/export</link>
      <description>{"uuid": "eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56024", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391024732496", "content": "", "creation_timestamp": "2025-01-02T19:23:30.798423Z"}</description>
      <content:encoded>{"uuid": "eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56024", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391024732496", "content": "", "creation_timestamp": "2025-01-02T19:23:30.798423Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6/export</guid>
      <pubDate>Thu, 02 Jan 2025 19:23:30 +0000</pubDate>
    </item>
    <item>
      <title>1c8f1bde-2aaa-41b8-9d0b-ff7657aea783</title>
      <link>https://vulnerability.circl.lu/sighting/1c8f1bde-2aaa-41b8-9d0b-ff7657aea783/export</link>
      <description>{"uuid": "1c8f1bde-2aaa-41b8-9d0b-ff7657aea783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56025", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391039334070", "content": "", "creation_timestamp": "2025-01-02T19:23:31.104009Z"}</description>
      <content:encoded>{"uuid": "1c8f1bde-2aaa-41b8-9d0b-ff7657aea783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56025", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391039334070", "content": "", "creation_timestamp": "2025-01-02T19:23:31.104009Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1c8f1bde-2aaa-41b8-9d0b-ff7657aea783/export</guid>
      <pubDate>Thu, 02 Jan 2025 19:23:31 +0000</pubDate>
    </item>
    <item>
      <title>9fa88573-a673-4b53-961e-66a694156386</title>
      <link>https://vulnerability.circl.lu/sighting/9fa88573-a673-4b53-961e-66a694156386/export</link>
      <description>{"uuid": "9fa88573-a673-4b53-961e-66a694156386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56026", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391053875471", "content": "", "creation_timestamp": "2025-01-02T19:23:31.386758Z"}</description>
      <content:encoded>{"uuid": "9fa88573-a673-4b53-961e-66a694156386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56026", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391053875471", "content": "", "creation_timestamp": "2025-01-02T19:23:31.386758Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9fa88573-a673-4b53-961e-66a694156386/export</guid>
      <pubDate>Thu, 02 Jan 2025 19:23:31 +0000</pubDate>
    </item>
    <item>
      <title>1bc741fa-394c-4374-9478-5c83db71452f</title>
      <link>https://vulnerability.circl.lu/sighting/1bc741fa-394c-4374-9478-5c83db71452f/export</link>
      <description>{"uuid": "1bc741fa-394c-4374-9478-5c83db71452f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5602", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-5602\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution.  Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.\n\nThe NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.\u202f Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy.\n\ud83d\udccf Published: 2024-07-23T13:15:50.508Z\n\ud83d\udccf Modified: 2025-05-01T03:55:27.855Z\n\ud83d\udd17 References:\n1. https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/stack-based-buffer-overflow-vulnerability-in-ni-io-trace-tool.html", "creation_timestamp": "2025-05-01T04:14:50.000000Z"}</description>
      <content:encoded>{"uuid": "1bc741fa-394c-4374-9478-5c83db71452f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5602", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-5602\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution.  Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.\n\nThe NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.\u202f Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy.\n\ud83d\udccf Published: 2024-07-23T13:15:50.508Z\n\ud83d\udccf Modified: 2025-05-01T03:55:27.855Z\n\ud83d\udd17 References:\n1. https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/stack-based-buffer-overflow-vulnerability-in-ni-io-trace-tool.html", "creation_timestamp": "2025-05-01T04:14:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1bc741fa-394c-4374-9478-5c83db71452f/export</guid>
      <pubDate>Thu, 01 May 2025 04:14:50 +0000</pubDate>
    </item>
  </channel>
</rss>
