<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T16:29:05.329714+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b7db6806-e4c1-46c0-8b0d-91810e4e15a7/export</id>
    <title>b7db6806-e4c1-46c0-8b0d-91810e4e15a7</title>
    <updated>2026-05-04T16:29:05.765998+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b7db6806-e4c1-46c0-8b0d-91810e4e15a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "seen", "source": "https://t.me/ctinow/165339", "content": "https://ift.tt/uyYR2Sk\nCVE-2024-21668", "creation_timestamp": "2024-01-09T20:26:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b7db6806-e4c1-46c0-8b0d-91810e4e15a7/export"/>
    <published>2024-01-09T20:26:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0ba98b3e-2509-4979-b13f-4e8eae7a43fe/export</id>
    <title>0ba98b3e-2509-4979-b13f-4e8eae7a43fe</title>
    <updated>2026-05-04T16:29:05.765908+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0ba98b3e-2509-4979-b13f-4e8eae7a43fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "seen", "source": "https://t.me/arpsyndicate/3006", "content": "#ExploitObserverAlert\n\nCVE-2024-21668\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-21668. react-native-mmkv is a library that allows easy use of MMKV inside React Native applications. Before version 2.11.0, the react-native-mmkv logged the optional encryption key for the MMKV database into the Android system log. The key can be obtained by anyone with access to the Android Debugging Bridge (ADB) if it is enabled in the phone settings. This bug is not present on iOS devices. By logging the encryption secret to the system logs, attackers can trivially recover the secret by enabling ADB and undermining an app's thread model. This issue has been patched in version 2.11.0.\n\nFIRST-EPSS: 0.000580000\nNVD-IS: 3.6\nNVD-ES: 1.2", "creation_timestamp": "2024-01-26T17:08:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0ba98b3e-2509-4979-b13f-4e8eae7a43fe/export"/>
    <published>2024-01-26T17:08:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/acc03f4d-085a-4041-b95e-eb31411391a2/export</id>
    <title>acc03f4d-085a-4041-b95e-eb31411391a2</title>
    <updated>2026-05-04T16:29:05.765793+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "acc03f4d-085a-4041-b95e-eb31411391a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "seen", "source": "https://t.me/ctinow/174607", "content": "https://ift.tt/KJL76mI\nCVE-2024-21668 | mrousavy react-native-mmkv up to 2.10.x log file (GHSA-4jh3-6jhv-2mgp)", "creation_timestamp": "2024-01-27T04:11:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/acc03f4d-085a-4041-b95e-eb31411391a2/export"/>
    <published>2024-01-27T04:11:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fbf5dae6-39aa-4d9c-9e93-9d4b67d61cec/export</id>
    <title>fbf5dae6-39aa-4d9c-9e93-9d4b67d61cec</title>
    <updated>2026-05-04T16:29:05.764097+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fbf5dae6-39aa-4d9c-9e93-9d4b67d61cec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18600", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21668\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: react-native-mmkv is a library that allows easy use of MMKV inside React Native applications. Before version 2.11.0, the react-native-mmkv logged the optional encryption key for the MMKV database into the Android system log. The key can be obtained by anyone with access to the Android Debugging Bridge (ADB) if it is enabled in the phone settings. This bug is not present on iOS devices. By logging the encryption secret to the system logs, attackers can trivially recover the secret by enabling ADB and undermining an app's thread model. This issue has been patched in version 2.11.0.\n\ud83d\udccf Published: 2024-01-09T19:05:49.332Z\n\ud83d\udccf Modified: 2025-06-17T14:26:17.894Z\n\ud83d\udd17 References:\n1. https://github.com/mrousavy/react-native-mmkv/security/advisories/GHSA-4jh3-6jhv-2mgp\n2. https://github.com/mrousavy/react-native-mmkv/commit/a8995ccb7184281f7d168bad3e9987c9bd05f00d\n3. https://github.com/mrousavy/react-native-mmkv/releases/tag/v2.11.0", "creation_timestamp": "2025-06-17T14:40:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fbf5dae6-39aa-4d9c-9e93-9d4b67d61cec/export"/>
    <published>2025-06-17T14:40:07+00:00</published>
  </entry>
</feed>
