<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T13:16:17.184152+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ae3b52ea-8784-4cb2-8191-55b58659ad36/export</id>
    <title>ae3b52ea-8784-4cb2-8191-55b58659ad36</title>
    <updated>2026-05-08T13:16:17.574682+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ae3b52ea-8784-4cb2-8191-55b58659ad36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44081", "type": "seen", "source": "https://t.me/cibsecurity/39754", "content": "\u203c CVE-2021-44081 \u203c\n\nA buffer overflow vulnerability exists in the AMF of open5gs 2.1.4. When the length of MSIN in Supi exceeds 24 characters, it leads to AMF denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T20:11:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ae3b52ea-8784-4cb2-8191-55b58659ad36/export"/>
    <published>2022-03-29T20:11:28+00:00</published>
  </entry>
</feed>
