<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T21:36:25.146665+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/52ae951b-19fb-4110-99ef-27d3f401c3ad/export</id>
    <title>52ae951b-19fb-4110-99ef-27d3f401c3ad</title>
    <updated>2026-05-04T21:36:25.341418+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "52ae951b-19fb-4110-99ef-27d3f401c3ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12252", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lg7ad5sdja2a", "content": "", "creation_timestamp": "2025-01-20T21:02:04.771007Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/52ae951b-19fb-4110-99ef-27d3f401c3ad/export"/>
    <published>2025-01-20T21:02:04.771007+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4d66eec4-35e6-4fb0-b563-5e29658ecef6/export</id>
    <title>4d66eec4-35e6-4fb0-b563-5e29658ecef6</title>
    <updated>2026-05-04T21:36:25.341346+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4d66eec4-35e6-4fb0-b563-5e29658ecef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://bsky.app/profile/mitsuhiko.at/post/3lgvrgcpcws24", "content": "", "creation_timestamp": "2025-01-29T20:06:38.137325Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4d66eec4-35e6-4fb0-b563-5e29658ecef6/export"/>
    <published>2025-01-29T20:06:38.137325+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e2629bf4-cf96-48a8-96f3-bb1a361d438e/export</id>
    <title>e2629bf4-cf96-48a8-96f3-bb1a361d438e</title>
    <updated>2026-05-04T21:36:25.341268+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e2629bf4-cf96-48a8-96f3-bb1a361d438e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://bsky.app/profile/mitsuhiko.at/post/3lgvrgdrdsk24", "content": "", "creation_timestamp": "2025-01-29T20:06:38.617316Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e2629bf4-cf96-48a8-96f3-bb1a361d438e/export"/>
    <published>2025-01-29T20:06:38.617316+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/73e25841-3cfe-4be1-a8f7-2dcfeac0192b/export</id>
    <title>73e25841-3cfe-4be1-a8f7-2dcfeac0192b</title>
    <updated>2026-05-04T21:36:25.341083+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "73e25841-3cfe-4be1-a8f7-2dcfeac0192b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12251", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyhqdfchq2s", "content": "", "creation_timestamp": "2025-02-12T15:16:23.407033Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/73e25841-3cfe-4be1-a8f7-2dcfeac0192b/export"/>
    <published>2025-02-12T15:16:23.407033+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/262c15ef-1943-4202-9354-67cc280ea339/export</id>
    <title>262c15ef-1943-4202-9354-67cc280ea339</title>
    <updated>2026-05-04T21:36:25.340762+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "262c15ef-1943-4202-9354-67cc280ea339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12251", "type": "seen", "source": "https://t.me/cvedetector/17902", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12251 - Telerik UI for WinUI Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12251 \nPublished : Feb. 12, 2025, 3:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : In Progress\u00ae Telerik\u00ae UI for WinUI versions prior to 2025 Q1 (3.0.0), a command injection attack is possible through improper neutralization of hyperlink elements. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T18:33:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/262c15ef-1943-4202-9354-67cc280ea339/export"/>
    <published>2025-02-12T18:33:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1b0e109a-bb95-4571-9603-686c4fdbbdec/export</id>
    <title>1b0e109a-bb95-4571-9603-686c4fdbbdec</title>
    <updated>2026-05-04T21:36:25.340547+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1b0e109a-bb95-4571-9603-686c4fdbbdec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12252", "type": "published-proof-of-concept", "source": "Telegram/yRj3rvTPwwJJrmgfCfqzU7qpeXOxuv70IH7oKMdEI3GidpE", "content": "", "creation_timestamp": "2025-03-26T10:00:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1b0e109a-bb95-4571-9603-686c4fdbbdec/export"/>
    <published>2025-03-26T10:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c71cb4c3-fa80-469c-be73-4d5e46a37ed8/export</id>
    <title>c71cb4c3-fa80-469c-be73-4d5e46a37ed8</title>
    <updated>2026-05-04T21:36:25.340300+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c71cb4c3-fa80-469c-be73-4d5e46a37ed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12252", "type": "published-proof-of-concept", "source": "Telegram/vQ0Sm3TCgGLw115KTy13Xlz5wNa50qfz0GIGSnr52V26EMk", "content": "", "creation_timestamp": "2025-03-26T20:00:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c71cb4c3-fa80-469c-be73-4d5e46a37ed8/export"/>
    <published>2025-03-26T20:00:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8d2f5f37-6109-442a-a5cb-d0bece4dae42/export</id>
    <title>8d2f5f37-6109-442a-a5cb-d0bece4dae42</title>
    <updated>2026-05-04T21:36:25.340049+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8d2f5f37-6109-442a-a5cb-d0bece4dae42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10589", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12254\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines()\n method would not \"pause\" writing and signal to the Protocol to drain \nthe buffer to the wire once the write buffer reached the \"high-water \nmark\". Because of this, Protocols would not periodically drain the write\n buffer potentially leading to memory exhaustion.\n\n\n\n\n\nThis\n vulnerability likely impacts a small number of users, you must be using\n Python 3.12.0 or later, on macOS or Linux, using the asyncio module \nwith protocols, and using .writelines() method which had new \nzero-copy-on-write behavior in Python 3.12.0 and later. If not all of \nthese factors are true then your usage of Python is unaffected.\n\ud83d\udccf Published: 2024-12-06T15:19:41.576Z\n\ud83d\udccf Modified: 2025-04-04T23:03:00.653Z\n\ud83d\udd17 References:\n1. https://github.com/python/cpython/issues/127655\n2. https://github.com/python/cpython/pull/127656\n3. https://mail.python.org/archives/list/security-announce@python.org/thread/H4O3UBAOAQQXGT4RE3E4XQYR5XLROORB/\n4. https://github.com/python/cpython/commit/71e8429ac8e2adc10084ab5ec29a62f4b6671a82\n5. https://github.com/python/cpython/commit/9aa0deb2eef2655a1029ba228527b152353135b5\n6. https://github.com/python/cpython/commit/e991ac8f2037d78140e417cc9a9486223eb3e786", "creation_timestamp": "2025-04-04T23:37:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8d2f5f37-6109-442a-a5cb-d0bece4dae42/export"/>
    <published>2025-04-04T23:37:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/03669567-5fca-4fe9-a3d7-defd8ddf8eca/export</id>
    <title>03669567-5fca-4fe9-a3d7-defd8ddf8eca</title>
    <updated>2026-05-04T21:36:25.339750+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "03669567-5fca-4fe9-a3d7-defd8ddf8eca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://gist.github.com/Vizonex/8242da16ed2d6a48b7acb812fee88957", "content": "", "creation_timestamp": "2025-09-11T23:45:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/03669567-5fca-4fe9-a3d7-defd8ddf8eca/export"/>
    <published>2025-09-11T23:45:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/865092cb-f454-4db3-8043-abf0f12ada5d/export</id>
    <title>865092cb-f454-4db3-8043-abf0f12ada5d</title>
    <updated>2026-05-04T21:36:25.336825+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "865092cb-f454-4db3-8043-abf0f12ada5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3miogaw2zts22", "content": "", "creation_timestamp": "2026-04-04T14:14:41.812524Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/865092cb-f454-4db3-8043-abf0f12ada5d/export"/>
    <published>2026-04-04T14:14:41.812524+00:00</published>
  </entry>
</feed>
