<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T13:28:14.611987+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2bad9668-1741-4a6b-8c6a-b72fe6e1f046/export</id>
    <title>2bad9668-1741-4a6b-8c6a-b72fe6e1f046</title>
    <updated>2026-05-09T13:28:15.066522+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2bad9668-1741-4a6b-8c6a-b72fe6e1f046", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44204", "type": "seen", "source": "https://t.me/cvedetector/6943", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44204 - \"Apple iOS VoiceOver Password Exfiltration Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-44204 \nPublished : Oct. 4, 2024, 12:15 a.m. | 45\u00a0minutes ago \nDescription : A logic issue was addressed with improved validation. This issue is fixed in iOS 18.0.1 and iPadOS 18.0.1. A user's saved passwords may be read aloud by VoiceOver. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-04T03:29:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2bad9668-1741-4a6b-8c6a-b72fe6e1f046/export"/>
    <published>2024-10-04T03:29:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0c7ed44d-19eb-49e3-a5a3-d3b965b6364f/export</id>
    <title>0c7ed44d-19eb-49e3-a5a3-d3b965b6364f</title>
    <updated>2026-05-09T13:28:15.066387+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0c7ed44d-19eb-49e3-a5a3-d3b965b6364f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44204", "type": "seen", "source": "https://t.me/true_secator/6284", "content": "\u041d\u0435 \u043f\u0440\u043e\u0448\u043b\u043e \u0438 \u043c\u0435\u0441\u044f\u0446\u0430, \u043a\u0430\u043a Apple \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0432\u0435\u0440\u0441\u0442\u0430\u0442\u044c \u043d\u043e\u0432\u044b\u0435 \u043f\u0430\u0442\u0447\u0438 \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043e\u0448\u0438\u0431\u043e\u043a \u0432 iOS \u0438 iPadOS 18, \u043a\u043e\u0442\u043e\u0440\u044b\u0435, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u043d\u0435 \u043c\u0435\u043d\u0435\u0435 33 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 iPhone \u0438 iPad.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044e Apple, \u043d\u043e\u0432\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 iOS 18.0.1 \u0438 iPadOS 18.0.1 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0434\u0432\u0443\u0445 \u043e\u0448\u0438\u0431\u043e\u043a \u0432 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0434\u0435\u043b\u0430\u044e\u0442 \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 \u0430\u0443\u0434\u0438\u043e\u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u044b \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432.\n\n\u041e\u0434\u043d\u0430 \u0438\u0437 \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u0430\u044f \u043a\u0430\u043a CVE-2024-44207, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0434\u0438\u043e\u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438 \u0421\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u043a\u043e\u0440\u043e\u0442\u043a\u0438\u0435 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u044b \u0437\u0432\u0443\u043a\u0430 \u0434\u043e \u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0438 \u0438\u043d\u0434\u0438\u043a\u0430\u0442\u043e\u0440\u0430 \u043c\u0438\u043a\u0440\u043e\u0444\u043e\u043d\u0430.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430, CVE-2024-44204, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c VoiceOver \u0437\u0430\u0447\u0438\u0442\u044b\u0432\u0430\u0442\u044c \u0432\u0441\u043b\u0443\u0445 \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0438\u0437-\u0437\u0430 \u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u0438.\n\nApple \u0437\u0430\u044f\u0432\u0438\u043b\u0430, \u0447\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u043e\u0439 \u041e\u0421 \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u043d\u0443\u044e \u0432\u0430\u043b\u0438\u0434\u0430\u0446\u0438\u044e \u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438. \u041f\u043e\u043a\u0430 \u043d\u0435\u0442 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u0432 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u043a\u0430\u043a\u0430\u044f-\u043b\u0438\u0431\u043e \u0438\u0437 \u044d\u0442\u0438\u0445 \u0434\u0432\u0443\u0445 \u043e\u0448\u0438\u0431\u043e\u043a \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043e \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b, \u043f\u0440\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u0435\u043d\u0441\u043e\u0440\u043d\u044b\u0439 \u044d\u043a\u0440\u0430\u043d \u043c\u043e\u0436\u0435\u0442 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043d\u0435 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u0442\u044c, \u043a\u0430\u043c\u0435\u0440\u0430 \u0437\u0430\u0432\u0438\u0441\u0430\u0435\u0442, \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u0421\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e \u0437\u0430\u0432\u0435\u0440\u0448\u0430\u0435\u0442 \u0440\u0430\u0431\u043e\u0442\u0443, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u0435\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e.\n\n\u041f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u0432 Apple \u043f\u0440\u043e\u043a\u0440\u0430\u043b\u0438\u0441\u044c \u043d\u0430 \u043f\u043e\u043b\u0441\u0442\u0430\u0432\u043a\u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0441 \u043e\u043f\u044b\u0442\u043e\u043c \u0440\u0430\u0431\u043e\u0442\u044b \u0432 Microsoft, \u0430 \u0435\u0441\u043b\u0438 \u0443\u0436\u0435 \u0438 \u043f\u0430\u0442\u0447\u0438 \u043f\u0435\u0440\u0435\u0441\u0442\u0430\u043d\u0443\u0442 \u0441\u043f\u0430\u0441\u0430\u0442\u044c \u043e\u0442 \u043e\u0448\u0438\u0431\u043e\u043a - \u0442\u043e \u043c\u043e\u0436\u043d\u043e \u0441\u043c\u0435\u043b\u043e \u0437\u0430\u044f\u0432\u043b\u044f\u0442\u044c, \u0447\u0442\u043e \u0438\u0445 \u0442\u0440\u0443\u0434\u043e\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u043f\u0435\u0440\u0435\u0448\u043b\u043e \u043d\u0430 \u043f\u043e\u043b\u043d\u044b\u0439 \u043e\u043a\u043b\u0430\u0434.", "creation_timestamp": "2024-10-04T12:30:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0c7ed44d-19eb-49e3-a5a3-d3b965b6364f/export"/>
    <published>2024-10-04T12:30:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/275a965d-f6b0-4728-b569-36fce24002f3/export</id>
    <title>275a965d-f6b0-4728-b569-36fce24002f3</title>
    <updated>2026-05-09T13:28:15.066304+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "275a965d-f6b0-4728-b569-36fce24002f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44204", "type": "seen", "source": "https://t.me/thehackernews/5690", "content": "Apple has released critical iOS and iPadOS updates addressing a vulnerability (CVE-2024-44204) that could expose your passwords via VoiceOver technology. \n \nRead: https://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html \n \niPhone XS and later, plus iPads from the Pro, Air, and Mini series, are impacted.", "creation_timestamp": "2024-10-05T07:15:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/275a965d-f6b0-4728-b569-36fce24002f3/export"/>
    <published>2024-10-05T07:15:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cdfd3447-d4da-4c0b-93e5-735d0c77718a/export</id>
    <title>cdfd3447-d4da-4c0b-93e5-735d0c77718a</title>
    <updated>2026-05-09T13:28:15.066217+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cdfd3447-d4da-4c0b-93e5-735d0c77718a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44204", "type": "seen", "source": "https://t.me/KomunitiSiber/2680", "content": "Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability\nhttps://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html\n\nApple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user's passwords to be read out aloud by its VoiceOver assistive technology.\nThe vulnerability, tracked as CVE-2024-44204, has been described as a logic problem in the new Passwords app impacting a slew of iPhones and iPads. Security researcher Bistrit Daha has been credited with", "creation_timestamp": "2024-10-05T08:21:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cdfd3447-d4da-4c0b-93e5-735d0c77718a/export"/>
    <published>2024-10-05T08:21:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/60e5e423-8066-4b98-8257-d44e0fad19a5/export</id>
    <title>60e5e423-8066-4b98-8257-d44e0fad19a5</title>
    <updated>2026-05-09T13:28:15.066129+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "60e5e423-8066-4b98-8257-d44e0fad19a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44204", "type": "seen", "source": "Telegram/LJccwlrwHsDswCyXP-Y9gBKBDW034KYg6Vmfq-ScH_1cwQ", "content": "", "creation_timestamp": "2024-10-05T09:51:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/60e5e423-8066-4b98-8257-d44e0fad19a5/export"/>
    <published>2024-10-05T09:51:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e74d30f0-6633-4315-9ec7-cc88bbcd5bac/export</id>
    <title>e74d30f0-6633-4315-9ec7-cc88bbcd5bac</title>
    <updated>2026-05-09T13:28:15.066035+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e74d30f0-6633-4315-9ec7-cc88bbcd5bac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44204", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/22875", "content": "The Hacker News\nApple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability\n\nApple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user's passwords to be read out aloud by its VoiceOver assistive technology.\nThe vulnerability, tracked as CVE-2024-44204, has been described as a logic problem in the new Passwords app impacting a slew of iPhones and iPads. Security researcher Bistrit Daha has been credited with", "creation_timestamp": "2024-10-05T09:51:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e74d30f0-6633-4315-9ec7-cc88bbcd5bac/export"/>
    <published>2024-10-05T09:51:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/778993ff-8fe0-4be3-812c-45938100d56a/export</id>
    <title>778993ff-8fe0-4be3-812c-45938100d56a</title>
    <updated>2026-05-09T13:28:15.065897+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "778993ff-8fe0-4be3-812c-45938100d56a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44204", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/4921", "content": "The Hacker News\nApple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability\n\nApple has released iOS and iPadOS updates to address two security issues, one of which could have allowed a user's passwords to be read out aloud by its VoiceOver assistive technology.\nThe vulnerability, tracked as CVE-2024-44204, has been described as a logic problem in the new Passwords app impacting a slew of iPhones and iPads. Security researcher Bistrit Daha has been credited with", "creation_timestamp": "2024-10-05T09:51:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/778993ff-8fe0-4be3-812c-45938100d56a/export"/>
    <published>2024-10-05T09:51:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7c9763d9-1f3e-4df3-a509-39d0937283d4/export</id>
    <title>7c9763d9-1f3e-4df3-a509-39d0937283d4</title>
    <updated>2026-05-09T13:28:15.060777+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7c9763d9-1f3e-4df3-a509-39d0937283d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44204", "type": "seen", "source": "Telegram/QyXoAQp37S27rJMQXHsTB1w_ToLGE-Ss2IWJHtiZzI1RZA", "content": "", "creation_timestamp": "2024-10-05T12:15:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7c9763d9-1f3e-4df3-a509-39d0937283d4/export"/>
    <published>2024-10-05T12:15:34+00:00</published>
  </entry>
</feed>
