<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 15:45:13 +0000</lastBuildDate>
    <item>
      <title>15b22fd9-ac1f-4bae-b119-89e3e91ed073</title>
      <link>https://vulnerability.circl.lu/sighting/15b22fd9-ac1f-4bae-b119-89e3e91ed073/export</link>
      <description>{"uuid": "15b22fd9-ac1f-4bae-b119-89e3e91ed073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbucmex732u", "content": "", "creation_timestamp": "2025-01-21T22:05:02.559113Z"}</description>
      <content:encoded>{"uuid": "15b22fd9-ac1f-4bae-b119-89e3e91ed073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbucmex732u", "content": "", "creation_timestamp": "2025-01-21T22:05:02.559113Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/15b22fd9-ac1f-4bae-b119-89e3e91ed073/export</guid>
      <pubDate>Tue, 21 Jan 2025 22:05:02 +0000</pubDate>
    </item>
    <item>
      <title>93cbfb2b-edcf-48ee-a4ac-e943df98f71d</title>
      <link>https://vulnerability.circl.lu/sighting/93cbfb2b-edcf-48ee-a4ac-e943df98f71d/export</link>
      <description>{"uuid": "93cbfb2b-edcf-48ee-a4ac-e943df98f71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lgdprx7x3o26", "content": "", "creation_timestamp": "2025-01-22T15:49:22.212753Z"}</description>
      <content:encoded>{"uuid": "93cbfb2b-edcf-48ee-a4ac-e943df98f71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lgdprx7x3o26", "content": "", "creation_timestamp": "2025-01-22T15:49:22.212753Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/93cbfb2b-edcf-48ee-a4ac-e943df98f71d/export</guid>
      <pubDate>Wed, 22 Jan 2025 15:49:22 +0000</pubDate>
    </item>
    <item>
      <title>494bd318-9f11-4030-b0a9-8d73b2b73a33</title>
      <link>https://vulnerability.circl.lu/sighting/494bd318-9f11-4030-b0a9-8d73b2b73a33/export</link>
      <description>{"uuid": "494bd318-9f11-4030-b0a9-8d73b2b73a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lggqncuoxz2z", "content": "", "creation_timestamp": "2025-01-23T20:42:38.597386Z"}</description>
      <content:encoded>{"uuid": "494bd318-9f11-4030-b0a9-8d73b2b73a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lggqncuoxz2z", "content": "", "creation_timestamp": "2025-01-23T20:42:38.597386Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/494bd318-9f11-4030-b0a9-8d73b2b73a33/export</guid>
      <pubDate>Thu, 23 Jan 2025 20:42:38 +0000</pubDate>
    </item>
    <item>
      <title>e567a244-5542-44a5-ae38-c8dfb53bd0c4</title>
      <link>https://vulnerability.circl.lu/sighting/e567a244-5542-44a5-ae38-c8dfb53bd0c4/export</link>
      <description>{"uuid": "e567a244-5542-44a5-ae38-c8dfb53bd0c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3lgnlcezz6s2p", "content": "", "creation_timestamp": "2025-01-26T13:55:45.000865Z"}</description>
      <content:encoded>{"uuid": "e567a244-5542-44a5-ae38-c8dfb53bd0c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3lgnlcezz6s2p", "content": "", "creation_timestamp": "2025-01-26T13:55:45.000865Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e567a244-5542-44a5-ae38-c8dfb53bd0c4/export</guid>
      <pubDate>Sun, 26 Jan 2025 13:55:45 +0000</pubDate>
    </item>
    <item>
      <title>b1b39759-f5d6-4685-b88c-02a9938b2ed5</title>
      <link>https://vulnerability.circl.lu/sighting/b1b39759-f5d6-4685-b88c-02a9938b2ed5/export</link>
      <description>{"uuid": "b1b39759-f5d6-4685-b88c-02a9938b2ed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lhyij75feg2t", "content": "", "creation_timestamp": "2025-02-12T15:30:18.116702Z"}</description>
      <content:encoded>{"uuid": "b1b39759-f5d6-4685-b88c-02a9938b2ed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lhyij75feg2t", "content": "", "creation_timestamp": "2025-02-12T15:30:18.116702Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b1b39759-f5d6-4685-b88c-02a9938b2ed5/export</guid>
      <pubDate>Wed, 12 Feb 2025 15:30:18 +0000</pubDate>
    </item>
    <item>
      <title>d7cb002b-fdb8-438f-9296-73b284ac1418</title>
      <link>https://vulnerability.circl.lu/sighting/d7cb002b-fdb8-438f-9296-73b284ac1418/export</link>
      <description>{"uuid": "d7cb002b-fdb8-438f-9296-73b284ac1418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21532", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5249", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21532\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Vulnerability in the Oracle Analytics Desktop product of Oracle Analytics (component: Install).  Supported versions that are affected are Prior to 8.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Analytics Desktop executes to compromise Oracle Analytics Desktop.  Successful attacks of this vulnerability can result in takeover of Oracle Analytics Desktop. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n\ud83d\udccf Published: 2025-01-21T20:53:09.111Z\n\ud83d\udccf Modified: 2025-02-25T04:55:11.543Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-02-25T05:24:13.000000Z"}</description>
      <content:encoded>{"uuid": "d7cb002b-fdb8-438f-9296-73b284ac1418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21532", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5249", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21532\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Vulnerability in the Oracle Analytics Desktop product of Oracle Analytics (component: Install).  Supported versions that are affected are Prior to 8.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Analytics Desktop executes to compromise Oracle Analytics Desktop.  Successful attacks of this vulnerability can result in takeover of Oracle Analytics Desktop. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n\ud83d\udccf Published: 2025-01-21T20:53:09.111Z\n\ud83d\udccf Modified: 2025-02-25T04:55:11.543Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-02-25T05:24:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d7cb002b-fdb8-438f-9296-73b284ac1418/export</guid>
      <pubDate>Tue, 25 Feb 2025 05:24:13 +0000</pubDate>
    </item>
    <item>
      <title>cab6c187-2ab2-4676-b2cf-2e41883f7eb4</title>
      <link>https://vulnerability.circl.lu/sighting/cab6c187-2ab2-4676-b2cf-2e41883f7eb4/export</link>
      <description>{"uuid": "cab6c187-2ab2-4676-b2cf-2e41883f7eb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lizr4g4nma23", "content": "", "creation_timestamp": "2025-02-25T21:02:09.172608Z"}</description>
      <content:encoded>{"uuid": "cab6c187-2ab2-4676-b2cf-2e41883f7eb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21535", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lizr4g4nma23", "content": "", "creation_timestamp": "2025-02-25T21:02:09.172608Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cab6c187-2ab2-4676-b2cf-2e41883f7eb4/export</guid>
      <pubDate>Tue, 25 Feb 2025 21:02:09 +0000</pubDate>
    </item>
    <item>
      <title>7dcb42d8-41d5-4b4a-ab09-027f79ab2815</title>
      <link>https://vulnerability.circl.lu/sighting/7dcb42d8-41d5-4b4a-ab09-027f79ab2815/export</link>
      <description>{"uuid": "7dcb42d8-41d5-4b4a-ab09-027f79ab2815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2153", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7005", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2153\n\ud83d\udd25 CVSS Score: 2.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in HDF5 1.14.6. Affected is the function H5SM_delete of the file H5SM.c of the component h5 File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-10T14:00:09.524Z\n\ud83d\udccf Modified: 2025-03-10T14:00:09.524Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299064\n2. https://vuldb.com/?ctiid.299064\n3. https://vuldb.com/?submit.510819\n4. https://github.com/HDFGroup/hdf5/issues/5329\n5. https://github.com/sae-as-me/Crashes/raw/refs/heads/main/hdf5/h5_extended_crash.h5", "creation_timestamp": "2025-03-10T14:38:51.000000Z"}</description>
      <content:encoded>{"uuid": "7dcb42d8-41d5-4b4a-ab09-027f79ab2815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2153", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7005", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2153\n\ud83d\udd25 CVSS Score: 2.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in HDF5 1.14.6. Affected is the function H5SM_delete of the file H5SM.c of the component h5 File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-10T14:00:09.524Z\n\ud83d\udccf Modified: 2025-03-10T14:00:09.524Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299064\n2. https://vuldb.com/?ctiid.299064\n3. https://vuldb.com/?submit.510819\n4. https://github.com/HDFGroup/hdf5/issues/5329\n5. https://github.com/sae-as-me/Crashes/raw/refs/heads/main/hdf5/h5_extended_crash.h5", "creation_timestamp": "2025-03-10T14:38:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7dcb42d8-41d5-4b4a-ab09-027f79ab2815/export</guid>
      <pubDate>Mon, 10 Mar 2025 14:38:51 +0000</pubDate>
    </item>
    <item>
      <title>9ea54b35-1180-40c4-80b5-b9889af8d964</title>
      <link>https://vulnerability.circl.lu/sighting/9ea54b35-1180-40c4-80b5-b9889af8d964/export</link>
      <description>{"uuid": "9ea54b35-1180-40c4-80b5-b9889af8d964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2153", "type": "seen", "source": "https://t.me/cvedetector/19955", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2153 - Apache HDF5 Heap-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2153 \nPublished : March 10, 2025, 2:15 p.m. | 57\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in HDF5 1.14.6. Affected is the function H5SM_delete of the file H5SM.c of the component h5 File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T16:31:53.000000Z"}</description>
      <content:encoded>{"uuid": "9ea54b35-1180-40c4-80b5-b9889af8d964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2153", "type": "seen", "source": "https://t.me/cvedetector/19955", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2153 - Apache HDF5 Heap-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2153 \nPublished : March 10, 2025, 2:15 p.m. | 57\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in HDF5 1.14.6. Affected is the function H5SM_delete of the file H5SM.c of the component h5 File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T16:31:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9ea54b35-1180-40c4-80b5-b9889af8d964/export</guid>
      <pubDate>Mon, 10 Mar 2025 16:31:53 +0000</pubDate>
    </item>
    <item>
      <title>0f4c9850-1607-42a6-bd90-e076a7f83a1e</title>
      <link>https://vulnerability.circl.lu/sighting/0f4c9850-1607-42a6-bd90-e076a7f83a1e/export</link>
      <description>{"uuid": "0f4c9850-1607-42a6-bd90-e076a7f83a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21530", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7586", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21530\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Panel Processor).  Supported versions that are affected are 8.60 and  8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\ud83d\udccf Published: 2025-01-21T20:53:08.312Z\n\ud83d\udccf Modified: 2025-03-14T16:30:02.161Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-03-14T16:44:00.000000Z"}</description>
      <content:encoded>{"uuid": "0f4c9850-1607-42a6-bd90-e076a7f83a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21530", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7586", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21530\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Panel Processor).  Supported versions that are affected are 8.60 and  8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\ud83d\udccf Published: 2025-01-21T20:53:08.312Z\n\ud83d\udccf Modified: 2025-03-14T16:30:02.161Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpujan2025.html", "creation_timestamp": "2025-03-14T16:44:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0f4c9850-1607-42a6-bd90-e076a7f83a1e/export</guid>
      <pubDate>Fri, 14 Mar 2025 16:44:00 +0000</pubDate>
    </item>
  </channel>
</rss>
