<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:33:35.447893+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/41f4a041-7158-4378-b78d-0121f3618b3d/export</id>
    <title>41f4a041-7158-4378-b78d-0121f3618b3d</title>
    <updated>2026-05-04T14:33:35.778208+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "41f4a041-7158-4378-b78d-0121f3618b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50684", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114072408550773487", "content": "", "creation_timestamp": "2025-02-26T21:53:40.646006Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/41f4a041-7158-4378-b78d-0121f3618b3d/export"/>
    <published>2025-02-26T21:53:40.646006+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b92df68d-1503-4a44-a31c-e2175b4dba29/export</id>
    <title>b92df68d-1503-4a44-a31c-e2175b4dba29</title>
    <updated>2026-05-04T14:33:35.778052+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b92df68d-1503-4a44-a31c-e2175b4dba29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50684", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj4jztziyo2s", "content": "", "creation_timestamp": "2025-02-26T23:33:23.787438Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b92df68d-1503-4a44-a31c-e2175b4dba29/export"/>
    <published>2025-02-26T23:33:23.787438+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/23b42306-e968-4fe6-be80-ab26a96cf7b0/export</id>
    <title>23b42306-e968-4fe6-be80-ab26a96cf7b0</title>
    <updated>2026-05-04T14:33:35.777740+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "23b42306-e968-4fe6-be80-ab26a96cf7b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50684", "type": "seen", "source": "https://t.me/cvedetector/18972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50684 - SunGrow iSolarCloud Android App Insecure AES Key Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50684 \nPublished : Feb. 26, 2025, 9:15 p.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : SunGrow iSolarCloud Android app V2.1.6.20241017 and prior uses an insecure AES key to encrypt client data (insufficient entropy). This may allow attackers to decrypt intercepted communications between the mobile app and iSolarCloud. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T00:19:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/23b42306-e968-4fe6-be80-ab26a96cf7b0/export"/>
    <published>2025-02-27T00:19:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/864d11ea-5010-4e31-9e12-e9a77140b35b/export</id>
    <title>864d11ea-5010-4e31-9e12-e9a77140b35b</title>
    <updated>2026-05-04T14:33:35.773698+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "864d11ea-5010-4e31-9e12-e9a77140b35b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50684", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/864d11ea-5010-4e31-9e12-e9a77140b35b/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
</feed>
