<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:21:39.019921+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/210697d4-b407-4255-ba47-56f5bd6f42f3/export</id>
    <title>210697d4-b407-4255-ba47-56f5bd6f42f3</title>
    <updated>2026-05-04T14:21:39.241303+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "210697d4-b407-4255-ba47-56f5bd6f42f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "https://t.me/information_security_channel/52213", "content": "Critical Flaw in AI Python Package Can Lead to System and Data Compromise\nhttps://www.securityweek.com/critical-flaw-in-ai-python-package-can-lead-to-system-and-data-compromise/\n\nA critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.\nThe post Critical Flaw in AI Python Package Can Lead to System and Data Compromise (https://www.securityweek.com/critical-flaw-in-ai-python-package-can-lead-to-system-and-data-compromise/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-05-17T15:53:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/210697d4-b407-4255-ba47-56f5bd6f42f3/export"/>
    <published>2024-05-17T15:53:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/418937a3-1176-478e-bf7b-9d8b056ef707/export</id>
    <title>418937a3-1176-478e-bf7b-9d8b056ef707</title>
    <updated>2026-05-04T14:21:39.241234+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "418937a3-1176-478e-bf7b-9d8b056ef707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "https://t.me/KomunitiSiber/1975", "content": "Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox\nhttps://thehackernews.com/2024/05/researchers-uncover-flaws-in-python.html\n\nA critical security flaw has been disclosed in the\u00a0llama_cpp_python\u00a0Python package that could be exploited by threat actors to achieve arbitrary code execution.\nTracked as\u00a0CVE-2024-34359\u00a0(CVSS score: 9.7), the flaw has been codenamed Llama Drama by software supply chain security firm Checkmarx.\n\"If exploited, it could allow attackers to execute arbitrary code on your system,", "creation_timestamp": "2024-05-21T13:16:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/418937a3-1176-478e-bf7b-9d8b056ef707/export"/>
    <published>2024-05-21T13:16:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a4a03ba0-a4b4-494e-8069-18939de050a7/export</id>
    <title>a4a03ba0-a4b4-494e-8069-18939de050a7</title>
    <updated>2026-05-04T14:21:39.241173+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a4a03ba0-a4b4-494e-8069-18939de050a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "Telegram/HnfBiLwo399C-z0d0q2TTUydlA9C_nLqDy3NCxdivPLF0Q", "content": "", "creation_timestamp": "2024-05-21T13:24:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a4a03ba0-a4b4-494e-8069-18939de050a7/export"/>
    <published>2024-05-21T13:24:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f095ae9f-7c88-4d98-8606-0bb0edefae3d/export</id>
    <title>f095ae9f-7c88-4d98-8606-0bb0edefae3d</title>
    <updated>2026-05-04T14:21:39.241111+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f095ae9f-7c88-4d98-8606-0bb0edefae3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "Telegram/0XIhWL9u3TURRxPZwtlJOta_6VFGTrjK73IsDBt66QftRWM", "content": "", "creation_timestamp": "2024-05-21T13:45:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f095ae9f-7c88-4d98-8606-0bb0edefae3d/export"/>
    <published>2024-05-21T13:45:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ffc90787-ef10-408e-8ac7-14f9180e9aac/export</id>
    <title>ffc90787-ef10-408e-8ac7-14f9180e9aac</title>
    <updated>2026-05-04T14:21:39.241039+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ffc90787-ef10-408e-8ac7-14f9180e9aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "https://t.me/HackingInsights/725", "content": "\u200aCVE-2024-34359: Critical Vulnerability in AI Integration Package Threatens Data Security\n\nhttps://securityonline.info/cve-2024-34359-critical-vulnerability-in-ai-integration-package-threatens-data-security/", "creation_timestamp": "2024-05-21T15:29:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ffc90787-ef10-408e-8ac7-14f9180e9aac/export"/>
    <published>2024-05-21T15:29:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f3e55db2-1932-43e3-afbb-48b8885acf23/export</id>
    <title>f3e55db2-1932-43e3-afbb-48b8885acf23</title>
    <updated>2026-05-04T14:21:39.240965+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f3e55db2-1932-43e3-afbb-48b8885acf23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/8206", "content": "The Hacker News\nResearchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox\n\nA critical security flaw has been disclosed in the&amp;nbsp;llama_cpp_python&amp;nbsp;Python package that could be exploited by threat actors to achieve arbitrary code execution.\nTracked as&amp;nbsp;CVE-2024-34359&amp;nbsp;(CVSS score: 9.7), the flaw has been codenamed Llama Drama by software supply chain security firm Checkmarx.\n\"If exploited, it could allow attackers to execute arbitrary code on your system,", "creation_timestamp": "2024-05-21T15:53:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f3e55db2-1932-43e3-afbb-48b8885acf23/export"/>
    <published>2024-05-21T15:53:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d1ffae24-da20-4845-a533-16e53758b0bb/export</id>
    <title>d1ffae24-da20-4845-a533-16e53758b0bb</title>
    <updated>2026-05-04T14:21:39.240891+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d1ffae24-da20-4845-a533-16e53758b0bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "Telegram/z1FmJvv5udIO3Zoz4PeB3fN7DcS1aeKuhlIf4800DCXKBA", "content": "", "creation_timestamp": "2024-05-21T15:53:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d1ffae24-da20-4845-a533-16e53758b0bb/export"/>
    <published>2024-05-21T15:53:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c8c34b4d-ca8f-40a5-82e5-24f066264356/export</id>
    <title>c8c34b4d-ca8f-40a5-82e5-24f066264356</title>
    <updated>2026-05-04T14:21:39.240810+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c8c34b4d-ca8f-40a5-82e5-24f066264356", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/1523", "content": "The Hacker News\nResearchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox\n\nA critical security flaw has been disclosed in the&amp;nbsp;llama_cpp_python&amp;nbsp;Python package that could be exploited by threat actors to achieve arbitrary code execution.\nTracked as&amp;nbsp;CVE-2024-34359&amp;nbsp;(CVSS score: 9.7), the flaw has been codenamed Llama Drama by software supply chain security firm Checkmarx.\n\"If exploited, it could allow attackers to execute arbitrary code on your system,", "creation_timestamp": "2024-05-21T15:53:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c8c34b4d-ca8f-40a5-82e5-24f066264356/export"/>
    <published>2024-05-21T15:53:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/21840df4-3b39-47e0-87ee-47c22b38800a/export</id>
    <title>21840df4-3b39-47e0-87ee-47c22b38800a</title>
    <updated>2026-05-04T14:21:39.240712+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "21840df4-3b39-47e0-87ee-47c22b38800a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "Telegram/lFwPID8s5MkrDhyGFaDaCmiOcjcPEN6HyJS_VbQy0kvXmopB", "content": "", "creation_timestamp": "2024-05-26T16:56:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/21840df4-3b39-47e0-87ee-47c22b38800a/export"/>
    <published>2024-05-26T16:56:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0c87a9cb-3c4d-4fe9-99d9-c787ebe60083/export</id>
    <title>0c87a9cb-3c4d-4fe9-99d9-c787ebe60083</title>
    <updated>2026-05-04T14:21:39.238903+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0c87a9cb-3c4d-4fe9-99d9-c787ebe60083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34359", "type": "seen", "source": "https://bsky.app/profile/yayafa.bsky.social/post/3mizefczwon2g", "content": "", "creation_timestamp": "2026-04-08T22:40:35.776440Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0c87a9cb-3c4d-4fe9-99d9-c787ebe60083/export"/>
    <published>2026-04-08T22:40:35.776440+00:00</published>
  </entry>
</feed>
