<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 02:21:41 +0000</lastBuildDate>
    <item>
      <title>027a95cf-702a-437b-a6a0-e3a49231e33d</title>
      <link>https://vulnerability.circl.lu/sighting/027a95cf-702a-437b-a6a0-e3a49231e33d/export</link>
      <description>{"uuid": "027a95cf-702a-437b-a6a0-e3a49231e33d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://t.me/cvedetector/24059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29906 - Finit TTY Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29906 \nPublished : April 29, 2025, 11:16 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T03:42:20.000000Z"}</description>
      <content:encoded>{"uuid": "027a95cf-702a-437b-a6a0-e3a49231e33d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://t.me/cvedetector/24059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29906 - Finit TTY Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29906 \nPublished : April 29, 2025, 11:16 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T03:42:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/027a95cf-702a-437b-a6a0-e3a49231e33d/export</guid>
      <pubDate>Wed, 30 Apr 2025 03:42:20 +0000</pubDate>
    </item>
    <item>
      <title>c2f0320b-8a15-4682-9077-2dcef29b7b81</title>
      <link>https://vulnerability.circl.lu/sighting/c2f0320b-8a15-4682-9077-2dcef29b7b81/export</link>
      <description>{"uuid": "c2f0320b-8a15-4682-9077-2dcef29b7b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114427071199222062", "content": "", "creation_timestamp": "2025-04-30T13:09:03.064629Z"}</description>
      <content:encoded>{"uuid": "c2f0320b-8a15-4682-9077-2dcef29b7b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114427071199222062", "content": "", "creation_timestamp": "2025-04-30T13:09:03.064629Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c2f0320b-8a15-4682-9077-2dcef29b7b81/export</guid>
      <pubDate>Wed, 30 Apr 2025 13:09:03 +0000</pubDate>
    </item>
    <item>
      <title>2ad97978-dad3-4927-ac70-b1f2755cadeb</title>
      <link>https://vulnerability.circl.lu/sighting/2ad97978-dad3-4927-ac70-b1f2755cadeb/export</link>
      <description>{"uuid": "2ad97978-dad3-4927-ac70-b1f2755cadeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lo3f6lra6e23", "content": "", "creation_timestamp": "2025-05-01T03:39:49.856459Z"}</description>
      <content:encoded>{"uuid": "2ad97978-dad3-4927-ac70-b1f2755cadeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lo3f6lra6e23", "content": "", "creation_timestamp": "2025-05-01T03:39:49.856459Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2ad97978-dad3-4927-ac70-b1f2755cadeb/export</guid>
      <pubDate>Thu, 01 May 2025 03:39:49 +0000</pubDate>
    </item>
    <item>
      <title>0b9f234a-6f92-47be-85b8-f14e3bd01f95</title>
      <link>https://vulnerability.circl.lu/sighting/0b9f234a-6f92-47be-85b8-f14e3bd01f95/export</link>
      <description>{"uuid": "0b9f234a-6f92-47be-85b8-f14e3bd01f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lo3zep6x3z2u", "content": "", "creation_timestamp": "2025-05-01T09:41:09.060574Z"}</description>
      <content:encoded>{"uuid": "0b9f234a-6f92-47be-85b8-f14e3bd01f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29906", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lo3zep6x3z2u", "content": "", "creation_timestamp": "2025-05-01T09:41:09.060574Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0b9f234a-6f92-47be-85b8-f14e3bd01f95/export</guid>
      <pubDate>Thu, 01 May 2025 09:41:09 +0000</pubDate>
    </item>
    <item>
      <title>f1127051-c59c-4c4d-bc27-38a0d913a9e9</title>
      <link>https://vulnerability.circl.lu/sighting/f1127051-c59c-4c4d-bc27-38a0d913a9e9/export</link>
      <description>{"uuid": "f1127051-c59c-4c4d-bc27-38a0d913a9e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18286", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29902\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Remote code execution that allows unauthorized users to execute arbitrary code on the server machine.\n\ud83d\udccf Published: 2025-06-13T09:23:49.631Z\n\ud83d\udccf Modified: 2025-06-13T09:23:49.631Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/BOSCH-SA-992447.html", "creation_timestamp": "2025-06-13T09:34:41.000000Z"}</description>
      <content:encoded>{"uuid": "f1127051-c59c-4c4d-bc27-38a0d913a9e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18286", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29902\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Remote code execution that allows unauthorized users to execute arbitrary code on the server machine.\n\ud83d\udccf Published: 2025-06-13T09:23:49.631Z\n\ud83d\udccf Modified: 2025-06-13T09:23:49.631Z\n\ud83d\udd17 References:\n1. https://psirt.bosch.com/security-advisories/BOSCH-SA-992447.html", "creation_timestamp": "2025-06-13T09:34:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f1127051-c59c-4c4d-bc27-38a0d913a9e9/export</guid>
      <pubDate>Fri, 13 Jun 2025 09:34:41 +0000</pubDate>
    </item>
    <item>
      <title>2abe452e-b5e3-45a4-bdd7-b807414c54fe</title>
      <link>https://vulnerability.circl.lu/sighting/2abe452e-b5e3-45a4-bdd7-b807414c54fe/export</link>
      <description>{"uuid": "2abe452e-b5e3-45a4-bdd7-b807414c54fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "Telegram/nG2kdAsSMNJFnQuBB8eLNRFNXLlpnIS3vQaD1YGco_2LIks", "content": "", "creation_timestamp": "2025-06-13T10:32:05.000000Z"}</description>
      <content:encoded>{"uuid": "2abe452e-b5e3-45a4-bdd7-b807414c54fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "Telegram/nG2kdAsSMNJFnQuBB8eLNRFNXLlpnIS3vQaD1YGco_2LIks", "content": "", "creation_timestamp": "2025-06-13T10:32:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2abe452e-b5e3-45a4-bdd7-b807414c54fe/export</guid>
      <pubDate>Fri, 13 Jun 2025 10:32:05 +0000</pubDate>
    </item>
    <item>
      <title>02c11e21-e654-4beb-8880-07b0263a2b04</title>
      <link>https://vulnerability.circl.lu/sighting/02c11e21-e654-4beb-8880-07b0263a2b04/export</link>
      <description>{"uuid": "02c11e21-e654-4beb-8880-07b0263a2b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrif4ccs5z2r", "content": "", "creation_timestamp": "2025-06-13T11:58:43.869547Z"}</description>
      <content:encoded>{"uuid": "02c11e21-e654-4beb-8880-07b0263a2b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29902", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrif4ccs5z2r", "content": "", "creation_timestamp": "2025-06-13T11:58:43.869547Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/02c11e21-e654-4beb-8880-07b0263a2b04/export</guid>
      <pubDate>Fri, 13 Jun 2025 11:58:43 +0000</pubDate>
    </item>
    <item>
      <title>9af31f9d-9293-4bc1-a4a1-3f3bf1635445</title>
      <link>https://vulnerability.circl.lu/sighting/9af31f9d-9293-4bc1-a4a1-3f3bf1635445/export</link>
      <description>{"uuid": "9af31f9d-9293-4bc1-a4a1-3f3bf1635445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29905", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-385/", "content": "", "creation_timestamp": "2025-06-16T03:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "9af31f9d-9293-4bc1-a4a1-3f3bf1635445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29905", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-385/", "content": "", "creation_timestamp": "2025-06-16T03:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9af31f9d-9293-4bc1-a4a1-3f3bf1635445/export</guid>
      <pubDate>Mon, 16 Jun 2025 03:00:00 +0000</pubDate>
    </item>
    <item>
      <title>bc3ced8a-34cd-4f09-b291-bb3cd14d9c70</title>
      <link>https://vulnerability.circl.lu/sighting/bc3ced8a-34cd-4f09-b291-bb3cd14d9c70/export</link>
      <description>{"uuid": "bc3ced8a-34cd-4f09-b291-bb3cd14d9c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29903", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "bc3ced8a-34cd-4f09-b291-bb3cd14d9c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29903", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bc3ced8a-34cd-4f09-b291-bb3cd14d9c70/export</guid>
      <pubDate>Wed, 13 Aug 2025 13:26:34 +0000</pubDate>
    </item>
    <item>
      <title>e66280a8-9013-4599-8898-5527e49d2fdc</title>
      <link>https://vulnerability.circl.lu/sighting/e66280a8-9013-4599-8898-5527e49d2fdc/export</link>
      <description>{"uuid": "e66280a8-9013-4599-8898-5527e49d2fdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29904", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "e66280a8-9013-4599-8898-5527e49d2fdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29904", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e66280a8-9013-4599-8898-5527e49d2fdc/export</guid>
      <pubDate>Wed, 13 Aug 2025 13:26:34 +0000</pubDate>
    </item>
  </channel>
</rss>
