<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:00:07.253748+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d275e50c-c86d-459c-b3a1-858b694dc6e0/export</id>
    <title>d275e50c-c86d-459c-b3a1-858b694dc6e0</title>
    <updated>2026-05-06T09:00:07.627355+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d275e50c-c86d-459c-b3a1-858b694dc6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25157", "type": "seen", "source": "https://t.me/arpsyndicate/2087", "content": "#ExploitObserverAlert\n\nCVE-2019-25157\n\nDESCRIPTION: Exploit Observer has 4 entries related to CVE-2019-25157. A vulnerability was found in Ethex Contracts. It has been classified as critical. This affects an unknown part of the file EthexJackpot.sol of the component Monthly Jackpot Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 6b8664b698d3d953e16c284fadc6caeb9e58e3db. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248271.", "creation_timestamp": "2023-12-23T05:21:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d275e50c-c86d-459c-b3a1-858b694dc6e0/export"/>
    <published>2023-12-23T05:21:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/129ad6de-576f-407a-8992-ffa7846cb386/export</id>
    <title>129ad6de-576f-407a-8992-ffa7846cb386</title>
    <updated>2026-05-06T09:00:07.627242+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "129ad6de-576f-407a-8992-ffa7846cb386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25157", "type": "seen", "source": "https://t.me/ctinow/160680", "content": "https://ift.tt/px37oic\nCVE-2019-25157 Exploit", "creation_timestamp": "2023-12-29T21:17:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/129ad6de-576f-407a-8992-ffa7846cb386/export"/>
    <published>2023-12-29T21:17:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c1c76563-998d-4aad-92dc-8ed5edf17067/export</id>
    <title>c1c76563-998d-4aad-92dc-8ed5edf17067</title>
    <updated>2026-05-06T09:00:07.624514+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c1c76563-998d-4aad-92dc-8ed5edf17067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25157", "type": "seen", "source": "https://t.me/ctinow/167108", "content": "https://ift.tt/JT1X79U\nCVE-2019-25157 | Ethex Contracts Monthly Jackpot EthexJackpot.sol access control", "creation_timestamp": "2024-01-12T07:41:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c1c76563-998d-4aad-92dc-8ed5edf17067/export"/>
    <published>2024-01-12T07:41:37+00:00</published>
  </entry>
</feed>
