<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T17:50:16.691863+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4fecdbe4-0b23-4e5f-a66a-5e3a350d5bb0/export</id>
    <title>4fecdbe4-0b23-4e5f-a66a-5e3a350d5bb0</title>
    <updated>2026-05-04T17:50:16.900907+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4fecdbe4-0b23-4e5f-a66a-5e3a350d5bb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12297", "type": "seen", "source": "Telegram/pd6Hois9L-Ok_Ydu60EWoBX9NnIXOJfrvpd0U-oT8UhSwA", "content": "", "creation_timestamp": "2025-03-11T12:18:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4fecdbe4-0b23-4e5f-a66a-5e3a350d5bb0/export"/>
    <published>2025-03-11T12:18:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/da520823-e8d1-40eb-9541-3e7b8ce6fb5a/export</id>
    <title>da520823-e8d1-40eb-9541-3e7b8ce6fb5a</title>
    <updated>2026-05-04T17:50:16.900800+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "da520823-e8d1-40eb-9541-3e7b8ce6fb5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12297", "type": "seen", "source": "https://t.me/true_secator/6827", "content": "\u0422\u0430\u0439\u0432\u0430\u043d\u044c\u0441\u043a\u0430\u044f Moxa \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0432\u043e\u0438\u0445 \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u0430\u0445 PT, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043e\u0431\u043e\u0439\u0442\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-12297, \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS v4 9,2 \u0438\u0437 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0445 10,0 \u0438 \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438 \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0438 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0432 \u0435\u0435 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0431\u0440\u0443\u0442\u0430 \u0438 \u0430\u0442\u0430\u043a \u0441 \u043a\u043e\u043b\u043b\u0438\u0437\u0438\u0435\u0439 MD5 \u0434\u043b\u044f \u043f\u043e\u0434\u0434\u0435\u043b\u043a\u0438 \u0445\u044d\u0448\u0435\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0447\u0442\u043e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0442\u0430\u0432\u0438\u0442 \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u0443 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.\n\n\u0414\u0440\u0443\u0433\u0438\u043c\u0438 \u0441\u043b\u043e\u0432\u0430\u043c\u0438, \u0443\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043e\u0431\u0445\u043e\u0434\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u043c \u0438\u043b\u0438 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0443 \u0441\u043b\u0443\u0436\u0431.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438: PT-508 (\u0432\u0435\u0440\u0441\u0438\u044f \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 3.8), PT-510 (\u0432\u0435\u0440\u0441\u0438\u044f 3.8), PT-7528 (\u0432\u0435\u0440\u0441\u0438\u044f 5.0), PT-7728 (\u0432\u0435\u0440\u0441\u0438\u044f 3.9), PT-7828 (\u0432\u0435\u0440\u0441\u0438\u044f 4.0), PT-G503 (\u0432\u0435\u0440\u0441\u0438\u044f 5.3), PT-G510 (\u0432\u0435\u0440\u0441\u0438\u044f 6.5), PT-G7728 (\u0432\u0435\u0440\u0441\u0438\u044f 6.5) \u0438 PT-G7828 (\u0432\u0435\u0440\u0441\u0438\u044f 6.5 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u044f\u044f).\n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u0432\u0448\u0438\u0441\u044c \u0441\u043e \u0441\u043b\u0443\u0436\u0431\u043e\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 Moxa.\n\n\u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0432\u044b\u0440\u0430\u0437\u0438\u043b \u043f\u0440\u0438\u0437\u043d\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0410\u0440\u0442\u0435\u043c\u0443 \u0422\u0443\u0440\u044b\u0448\u0435\u0432\u0443 \u0438\u0437 \u0420\u0443\u0441\u0430\u0442\u043e\u043c \u0410\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f (\u0420\u0410\u0421\u0423) \u0437\u0430 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0442\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u0432 \u0438\u043b\u0438 ACL, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442\u044c \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044e \u0441\u0435\u0442\u0438, \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c MFA \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u043c \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c, \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u044e \u0441\u043e\u0431\u044b\u0442\u0438\u0439, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a \u0438 \u043f\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0430\u043d\u043e\u043c\u0430\u043b\u0438\u0439.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Moxa \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0442\u0443 \u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Ethernet-\u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u0435 \u0441\u0435\u0440\u0438\u0438 EDS-508A, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0435\u043c \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 3.11 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439, \u0435\u0449\u0435 \u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 \u044f\u043d\u0432\u0430\u0440\u044f 2025 \u0433\u043e\u0434\u0430.", "creation_timestamp": "2025-03-11T13:36:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/da520823-e8d1-40eb-9541-3e7b8ce6fb5a/export"/>
    <published>2025-03-11T13:36:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0a1ec423-debd-46aa-8494-5ebc01550c14/export</id>
    <title>0a1ec423-debd-46aa-8494-5ebc01550c14</title>
    <updated>2026-05-04T17:50:16.900717+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0a1ec423-debd-46aa-8494-5ebc01550c14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12295", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8019", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12295\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The BoomBox Theme Extensions plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.8.0. This is due to the plugin not properly validating a user's identity prior to updating their password through the 'boombox_ajax_reset_password' function. This makes it possible for authenticated attackers, with subscriber-level privileges and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.\n\ud83d\udccf Published: 2025-03-19T04:21:06.477Z\n\ud83d\udccf Modified: 2025-03-19T04:21:06.477Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/c453aaf6-767d-4929-bbb3-3c0b78b0507a?source=cve\n2. https://themeforest.net/item/boombox-viral-buzz-wordpress-theme/16596434", "creation_timestamp": "2025-03-19T04:48:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0a1ec423-debd-46aa-8494-5ebc01550c14/export"/>
    <published>2025-03-19T04:48:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/78eb2ff6-b1b9-4681-8d10-8577c40af41f/export</id>
    <title>78eb2ff6-b1b9-4681-8d10-8577c40af41f</title>
    <updated>2026-05-04T17:50:16.900645+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "78eb2ff6-b1b9-4681-8d10-8577c40af41f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12295", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114187757507266850", "content": "", "creation_timestamp": "2025-03-19T06:48:26.064303Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/78eb2ff6-b1b9-4681-8d10-8577c40af41f/export"/>
    <published>2025-03-19T06:48:26.064303+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8efe96ae-da2b-4f0b-85eb-b075a319d91e/export</id>
    <title>8efe96ae-da2b-4f0b-85eb-b075a319d91e</title>
    <updated>2026-05-04T17:50:16.900571+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8efe96ae-da2b-4f0b-85eb-b075a319d91e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12295", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkpoa2jy5z2e", "content": "", "creation_timestamp": "2025-03-19T07:34:11.883818Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8efe96ae-da2b-4f0b-85eb-b075a319d91e/export"/>
    <published>2025-03-19T07:34:11.883818+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/007e9962-6bf4-4c0d-bf9c-77320d181fd4/export</id>
    <title>007e9962-6bf4-4c0d-bf9c-77320d181fd4</title>
    <updated>2026-05-04T17:50:16.900478+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "007e9962-6bf4-4c0d-bf9c-77320d181fd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12295", "type": "seen", "source": "https://t.me/cvedetector/20626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12295 - BoomBox Theme Extensions WordPress Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12295 \nPublished : March 19, 2025, 5:15 a.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : The BoomBox Theme Extensions plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.8.0. This is due to the plugin not properly validating a user's identity prior to updating their password through the 'boombox_ajax_reset_password' function. This makes it possible for authenticated attackers, with subscriber-level privileges and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T07:57:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/007e9962-6bf4-4c0d-bf9c-77320d181fd4/export"/>
    <published>2025-03-19T07:57:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a1dda458-95cb-4885-9a40-a59e8240e216/export</id>
    <title>a1dda458-95cb-4885-9a40-a59e8240e216</title>
    <updated>2026-05-04T17:50:16.900406+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a1dda458-95cb-4885-9a40-a59e8240e216", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12294", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a1dda458-95cb-4885-9a40-a59e8240e216/export"/>
    <published>2025-09-16T23:16:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c49e9671-542d-41c3-9fc5-879999b62a43/export</id>
    <title>c49e9671-542d-41c3-9fc5-879999b62a43</title>
    <updated>2026-05-04T17:50:16.900307+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c49e9671-542d-41c3-9fc5-879999b62a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12294", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c49e9671-542d-41c3-9fc5-879999b62a43/export"/>
    <published>2025-09-18T16:44:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/27116d44-58e7-4d24-8da8-5e0ddc2685a7/export</id>
    <title>27116d44-58e7-4d24-8da8-5e0ddc2685a7</title>
    <updated>2026-05-04T17:50:16.900200+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "27116d44-58e7-4d24-8da8-5e0ddc2685a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12297", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3me24qaafrw2h", "content": "", "creation_timestamp": "2026-02-04T14:50:13.582806Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/27116d44-58e7-4d24-8da8-5e0ddc2685a7/export"/>
    <published>2026-02-04T14:50:13.582806+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c7673b49-f652-4457-8177-494423c8c1a1/export</id>
    <title>c7673b49-f652-4457-8177-494423c8c1a1</title>
    <updated>2026-05-04T17:50:16.897923+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c7673b49-f652-4457-8177-494423c8c1a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12297", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/control-systems-moxa-security-advisory-av26-085", "content": "", "creation_timestamp": "2026-02-04T15:40:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c7673b49-f652-4457-8177-494423c8c1a1/export"/>
    <published>2026-02-04T15:40:27+00:00</published>
  </entry>
</feed>
