<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T17:11:51.073858+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/22985096-bfd0-4cf5-9127-bfbc3620210e/export</id>
    <title>22985096-bfd0-4cf5-9127-bfbc3620210e</title>
    <updated>2026-05-07T17:11:51.530804+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "22985096-bfd0-4cf5-9127-bfbc3620210e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39312", "type": "seen", "source": "https://t.me/cvedetector/206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39312 - Botan is a C++ cryptography library. X.509 certifi\", \n  \"Content\": \"CVE ID : CVE-2024-39312 \nPublished : July 8, 2024, 5:15 p.m. | 34\u00a0minutes ago \nDescription : Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. A bug in the parsing of name constraint extensions in X.509 certificates meant that if the extension included both permitted subtrees and excluded subtrees, only the permitted subtree would be checked. If a certificate included a name which was permitted by the permitted subtree but also excluded by excluded subtree, it would be accepted. Fixed in versions 3.5.0 and 2.19.5. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T19:56:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/22985096-bfd0-4cf5-9127-bfbc3620210e/export"/>
    <published>2024-07-08T19:56:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ad1a61be-a2f9-470b-90ac-95462849a029/export</id>
    <title>ad1a61be-a2f9-470b-90ac-95462849a029</title>
    <updated>2026-05-07T17:11:51.523215+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ad1a61be-a2f9-470b-90ac-95462849a029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39312", "type": "seen", "source": "Telegram/lB2tFuHZlESL5UYh_MvL0ZdCO9rG32bleGtwKzDfx5d-x5qR", "content": "", "creation_timestamp": "2025-03-06T02:16:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ad1a61be-a2f9-470b-90ac-95462849a029/export"/>
    <published>2025-03-06T02:16:32+00:00</published>
  </entry>
</feed>
