<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 02:45:50 +0000</lastBuildDate>
    <item>
      <title>ff4e5c83-213a-4cba-8dab-a74fad720745</title>
      <link>https://vulnerability.circl.lu/sighting/ff4e5c83-213a-4cba-8dab-a74fad720745/export</link>
      <description>{"uuid": "ff4e5c83-213a-4cba-8dab-a74fad720745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3017", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10011", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3017\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in TA-Lib up to 0.6.4. This issue affects the function setInputBuffer of the file src/tools/ta_regtest/ta_test_func/test_minmax.c of the component ta_regtest. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5879180e9070ec35d52948f2f57519713256a0f1. It is recommended to apply a patch to fix this issue.\n\ud83d\udccf Published: 2025-03-31T21:31:10.492Z\n\ud83d\udccf Modified: 2025-04-01T20:06:50.627Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302069\n2. https://vuldb.com/?ctiid.302069\n3. https://vuldb.com/?submit.524603\n4. https://github.com/TA-Lib/ta-lib/issues/61\n5. https://github.com/TA-Lib/ta-lib/pull/62\n6. https://github.com/TA-Lib/ta-lib/issues/61#issue-2931609110\n7. https://github.com/TA-Lib/ta-lib/commit/5879180e9070ec35d52948f2f57519713256a0f1", "creation_timestamp": "2025-04-01T20:33:33.000000Z"}</description>
      <content:encoded>{"uuid": "ff4e5c83-213a-4cba-8dab-a74fad720745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3017", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10011", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3017\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in TA-Lib up to 0.6.4. This issue affects the function setInputBuffer of the file src/tools/ta_regtest/ta_test_func/test_minmax.c of the component ta_regtest. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5879180e9070ec35d52948f2f57519713256a0f1. It is recommended to apply a patch to fix this issue.\n\ud83d\udccf Published: 2025-03-31T21:31:10.492Z\n\ud83d\udccf Modified: 2025-04-01T20:06:50.627Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302069\n2. https://vuldb.com/?ctiid.302069\n3. https://vuldb.com/?submit.524603\n4. https://github.com/TA-Lib/ta-lib/issues/61\n5. https://github.com/TA-Lib/ta-lib/pull/62\n6. https://github.com/TA-Lib/ta-lib/issues/61#issue-2931609110\n7. https://github.com/TA-Lib/ta-lib/commit/5879180e9070ec35d52948f2f57519713256a0f1", "creation_timestamp": "2025-04-01T20:33:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ff4e5c83-213a-4cba-8dab-a74fad720745/export</guid>
      <pubDate>Tue, 01 Apr 2025 20:33:33 +0000</pubDate>
    </item>
    <item>
      <title>58c079f9-cd49-4f9c-be27-0fbae1e6f4ac</title>
      <link>https://vulnerability.circl.lu/sighting/58c079f9-cd49-4f9c-be27-0fbae1e6f4ac/export</link>
      <description>{"uuid": "58c079f9-cd49-4f9c-be27-0fbae1e6f4ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30174", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-09", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "58c079f9-cd49-4f9c-be27-0fbae1e6f4ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30174", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-09", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/58c079f9-cd49-4f9c-be27-0fbae1e6f4ac/export</guid>
      <pubDate>Thu, 15 May 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>bd6151bf-d4e6-430e-8e44-72135eb8a755</title>
      <link>https://vulnerability.circl.lu/sighting/bd6151bf-d4e6-430e-8e44-72135eb8a755/export</link>
      <description>{"uuid": "bd6151bf-d4e6-430e-8e44-72135eb8a755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30176", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-09", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "bd6151bf-d4e6-430e-8e44-72135eb8a755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30176", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-09", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bd6151bf-d4e6-430e-8e44-72135eb8a755/export</guid>
      <pubDate>Thu, 15 May 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>02c626b2-ded4-44aa-9aa8-d6277d0d8d09</title>
      <link>https://vulnerability.circl.lu/sighting/02c626b2-ded4-44aa-9aa8-d6277d0d8d09/export</link>
      <description>{"uuid": "02c626b2-ded4-44aa-9aa8-d6277d0d8d09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30175", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-09", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "02c626b2-ded4-44aa-9aa8-d6277d0d8d09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30175", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-09", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/02c626b2-ded4-44aa-9aa8-d6277d0d8d09/export</guid>
      <pubDate>Thu, 15 May 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>d9e791e1-e348-43bc-b31e-cc70a2e598dd</title>
      <link>https://vulnerability.circl.lu/sighting/d9e791e1-e348-43bc-b31e-cc70a2e598dd/export</link>
      <description>{"uuid": "d9e791e1-e348-43bc-b31e-cc70a2e598dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30170", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17322", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30170\n\ud83d\udd25 CVSS Score: 5.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:C)\n\ud83d\udd39 Description: Exposure of file path, file size or file existence vulnerabilities in ASPECT provide attackers access to file system information if session administrator credentials become compromised.\nThis issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.\n\ud83d\udccf Published: 2025-05-22T17:38:50.749Z\n\ud83d\udccf Modified: 2025-05-22T17:38:50.749Z\n\ud83d\udd17 References:\n1. https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&amp;amp;LanguageCode=en&amp;amp;DocumentPartId=pdf&amp;amp;Action=Launch", "creation_timestamp": "2025-05-22T17:43:19.000000Z"}</description>
      <content:encoded>{"uuid": "d9e791e1-e348-43bc-b31e-cc70a2e598dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30170", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17322", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30170\n\ud83d\udd25 CVSS Score: 5.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:C)\n\ud83d\udd39 Description: Exposure of file path, file size or file existence vulnerabilities in ASPECT provide attackers access to file system information if session administrator credentials become compromised.\nThis issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.\n\ud83d\udccf Published: 2025-05-22T17:38:50.749Z\n\ud83d\udccf Modified: 2025-05-22T17:38:50.749Z\n\ud83d\udd17 References:\n1. https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&amp;amp;LanguageCode=en&amp;amp;DocumentPartId=pdf&amp;amp;Action=Launch", "creation_timestamp": "2025-05-22T17:43:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d9e791e1-e348-43bc-b31e-cc70a2e598dd/export</guid>
      <pubDate>Thu, 22 May 2025 17:43:19 +0000</pubDate>
    </item>
    <item>
      <title>6b77e846-1813-418e-95b4-516f61fef742</title>
      <link>https://vulnerability.circl.lu/sighting/6b77e846-1813-418e-95b4-516f61fef742/export</link>
      <description>{"uuid": "6b77e846-1813-418e-95b4-516f61fef742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30173", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpruvw3skg2r", "content": "", "creation_timestamp": "2025-05-22T19:45:06.573236Z"}</description>
      <content:encoded>{"uuid": "6b77e846-1813-418e-95b4-516f61fef742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30173", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpruvw3skg2r", "content": "", "creation_timestamp": "2025-05-22T19:45:06.573236Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6b77e846-1813-418e-95b4-516f61fef742/export</guid>
      <pubDate>Thu, 22 May 2025 19:45:06 +0000</pubDate>
    </item>
    <item>
      <title>81039011-3389-41c1-a690-6d0806e779a6</title>
      <link>https://vulnerability.circl.lu/sighting/81039011-3389-41c1-a690-6d0806e779a6/export</link>
      <description>{"uuid": "81039011-3389-41c1-a690-6d0806e779a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30170", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprveeeyks2o", "content": "", "creation_timestamp": "2025-05-22T19:53:09.037406Z"}</description>
      <content:encoded>{"uuid": "81039011-3389-41c1-a690-6d0806e779a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30170", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprveeeyks2o", "content": "", "creation_timestamp": "2025-05-22T19:53:09.037406Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/81039011-3389-41c1-a690-6d0806e779a6/export</guid>
      <pubDate>Thu, 22 May 2025 19:53:09 +0000</pubDate>
    </item>
    <item>
      <title>6688f436-07f8-470b-b612-4459ba9635ac</title>
      <link>https://vulnerability.circl.lu/sighting/6688f436-07f8-470b-b612-4459ba9635ac/export</link>
      <description>{"uuid": "6688f436-07f8-470b-b612-4459ba9635ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30171", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprw77lwle27", "content": "", "creation_timestamp": "2025-05-22T20:08:09.624678Z"}</description>
      <content:encoded>{"uuid": "6688f436-07f8-470b-b612-4459ba9635ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30171", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprw77lwle27", "content": "", "creation_timestamp": "2025-05-22T20:08:09.624678Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6688f436-07f8-470b-b612-4459ba9635ac/export</guid>
      <pubDate>Thu, 22 May 2025 20:08:09 +0000</pubDate>
    </item>
    <item>
      <title>47505ef3-5368-4d44-9d10-ffe6e96706b4</title>
      <link>https://vulnerability.circl.lu/sighting/47505ef3-5368-4d44-9d10-ffe6e96706b4/export</link>
      <description>{"uuid": "47505ef3-5368-4d44-9d10-ffe6e96706b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30172", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprwi5z3h72r", "content": "", "creation_timestamp": "2025-05-22T20:13:10.152000Z"}</description>
      <content:encoded>{"uuid": "47505ef3-5368-4d44-9d10-ffe6e96706b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30172", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lprwi5z3h72r", "content": "", "creation_timestamp": "2025-05-22T20:13:10.152000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/47505ef3-5368-4d44-9d10-ffe6e96706b4/export</guid>
      <pubDate>Thu, 22 May 2025 20:13:10 +0000</pubDate>
    </item>
    <item>
      <title>ff5386de-d4fb-4d09-b262-14960ab7b412</title>
      <link>https://vulnerability.circl.lu/sighting/ff5386de-d4fb-4d09-b262-14960ab7b412/export</link>
      <description>{"uuid": "ff5386de-d4fb-4d09-b262-14960ab7b412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30177", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mkg7y5htr32x", "content": "", "creation_timestamp": "2026-04-26T18:51:27.240311Z"}</description>
      <content:encoded>{"uuid": "ff5386de-d4fb-4d09-b262-14960ab7b412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30177", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mkg7y5htr32x", "content": "", "creation_timestamp": "2026-04-26T18:51:27.240311Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ff5386de-d4fb-4d09-b262-14960ab7b412/export</guid>
      <pubDate>Sun, 26 Apr 2026 18:51:27 +0000</pubDate>
    </item>
  </channel>
</rss>
