<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T08:15:58.159306+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b0eb8aed-d763-4d84-8530-cde832b4e277/export</id>
    <title>b0eb8aed-d763-4d84-8530-cde832b4e277</title>
    <updated>2026-05-07T08:15:58.564198+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b0eb8aed-d763-4d84-8530-cde832b4e277", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13835", "type": "seen", "source": "https://t.me/cibsecurity/34583", "content": "\u203c CVE-2017-13835 \u203c\n\nA memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS High Sierra 10.13. An application may be able to execute arbitrary code with elevated privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-23T22:19:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b0eb8aed-d763-4d84-8530-cde832b4e277/export"/>
    <published>2021-12-23T22:19:35+00:00</published>
  </entry>
</feed>
