<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:07:20.749939+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/14918b0c-b4f3-4593-b447-d4cff7848c8f/export</id>
    <title>14918b0c-b4f3-4593-b447-d4cff7848c8f</title>
    <updated>2026-05-04T10:07:20.922174+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "14918b0c-b4f3-4593-b447-d4cff7848c8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6445", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50696\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SunGrow WiNet-S V200.001.00.P025 and earlier versions is missing integrity checks for firmware upgrades. Sending a specific MQTT message allows an update to an inverter or a WiNet connectivity dongle with a bogus firmware file that is located on attacker-controlled server.\n\ud83d\udccf Published: 2025-02-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-04T21:09:49.150Z\n\ud83d\udd17 References:\n1. https://en.sungrowpower.com/security-notice-detail-2/6140", "creation_timestamp": "2025-03-04T21:35:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/14918b0c-b4f3-4593-b447-d4cff7848c8f/export"/>
    <published>2025-03-04T21:35:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9650e40a-1603-4888-978a-2c6a4a57e27a/export</id>
    <title>9650e40a-1603-4888-978a-2c6a4a57e27a</title>
    <updated>2026-05-04T10:07:20.922078+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9650e40a-1603-4888-978a-2c6a4a57e27a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50696", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9650e40a-1603-4888-978a-2c6a4a57e27a/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ab106209-d634-4284-98bc-a5c39f1c86d8/export</id>
    <title>ab106209-d634-4284-98bc-a5c39f1c86d8</title>
    <updated>2026-05-04T10:07:20.921985+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ab106209-d634-4284-98bc-a5c39f1c86d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50698", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ab106209-d634-4284-98bc-a5c39f1c86d8/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/730d262b-55fd-4afd-b635-26ea74b522af/export</id>
    <title>730d262b-55fd-4afd-b635-26ea74b522af</title>
    <updated>2026-05-04T10:07:20.921887+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "730d262b-55fd-4afd-b635-26ea74b522af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50695", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/730d262b-55fd-4afd-b635-26ea74b522af/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/446959f8-b382-404b-bd44-a5583bfe4212/export</id>
    <title>446959f8-b382-404b-bd44-a5583bfe4212</title>
    <updated>2026-05-04T10:07:20.921784+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "446959f8-b382-404b-bd44-a5583bfe4212", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50692", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/446959f8-b382-404b-bd44-a5583bfe4212/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/df049196-d1f4-4d77-a5a9-64dfd493f62e/export</id>
    <title>df049196-d1f4-4d77-a5a9-64dfd493f62e</title>
    <updated>2026-05-04T10:07:20.921681+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "df049196-d1f4-4d77-a5a9-64dfd493f62e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50693", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/df049196-d1f4-4d77-a5a9-64dfd493f62e/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e0892509-0646-4108-a0de-490987e10e70/export</id>
    <title>e0892509-0646-4108-a0de-490987e10e70</title>
    <updated>2026-05-04T10:07:20.921575+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e0892509-0646-4108-a0de-490987e10e70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50697", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e0892509-0646-4108-a0de-490987e10e70/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/62f14cf0-915a-4123-aff2-826c49b4bac5/export</id>
    <title>62f14cf0-915a-4123-aff2-826c49b4bac5</title>
    <updated>2026-05-04T10:07:20.921456+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "62f14cf0-915a-4123-aff2-826c49b4bac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50694", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/62f14cf0-915a-4123-aff2-826c49b4bac5/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b9ce5d8d-9d41-4b2f-bf24-c332a8be766f/export</id>
    <title>b9ce5d8d-9d41-4b2f-bf24-c332a8be766f</title>
    <updated>2026-05-04T10:07:20.921300+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b9ce5d8d-9d41-4b2f-bf24-c332a8be766f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50690", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b9ce5d8d-9d41-4b2f-bf24-c332a8be766f/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1b5bd600-34f1-4692-94d5-e16785ba250f/export</id>
    <title>1b5bd600-34f1-4692-94d5-e16785ba250f</title>
    <updated>2026-05-04T10:07:20.918424+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1b5bd600-34f1-4692-94d5-e16785ba250f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50691", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-12", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1b5bd600-34f1-4692-94d5-e16785ba250f/export"/>
    <published>2025-03-13T11:00:00+00:00</published>
  </entry>
</feed>
