<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:54:36.193900+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fce7a33c-f63d-4954-afb1-02186736eb11/export</id>
    <title>fce7a33c-f63d-4954-afb1-02186736eb11</title>
    <updated>2026-05-04T19:54:36.431778+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fce7a33c-f63d-4954-afb1-02186736eb11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq6kjbgs2o", "content": "", "creation_timestamp": "2025-01-03T04:15:57.192949Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fce7a33c-f63d-4954-afb1-02186736eb11/export"/>
    <published>2025-01-03T04:15:57.192949+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6752a815-3911-450b-afef-286d53235118/export</id>
    <title>6752a815-3911-450b-afef-286d53235118</title>
    <updated>2026-05-04T19:54:36.431698+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6752a815-3911-450b-afef-286d53235118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrodvbx52q", "content": "", "creation_timestamp": "2025-01-03T04:42:40.717221Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6752a815-3911-450b-afef-286d53235118/export"/>
    <published>2025-01-03T04:42:40.717221+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/efa48a32-73c7-4b20-8edf-d4944a7f3d3b/export</id>
    <title>efa48a32-73c7-4b20-8edf-d4944a7f3d3b</title>
    <updated>2026-05-04T19:54:36.431629+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "efa48a32-73c7-4b20-8edf-d4944a7f3d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesroeofh62e", "content": "", "creation_timestamp": "2025-01-03T04:42:42.994307Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/efa48a32-73c7-4b20-8edf-d4944a7f3d3b/export"/>
    <published>2025-01-03T04:42:42.994307+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a3e9ae47-d628-4efd-828b-d4955e9aa023/export</id>
    <title>a3e9ae47-d628-4efd-828b-d4955e9aa023</title>
    <updated>2026-05-04T19:54:36.431529+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a3e9ae47-d628-4efd-828b-d4955e9aa023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrof626o2k", "content": "", "creation_timestamp": "2025-01-03T04:42:45.037502Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a3e9ae47-d628-4efd-828b-d4955e9aa023/export"/>
    <published>2025-01-03T04:42:45.037502+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/779a4e27-9d1b-403f-bf99-9c357b19595b/export</id>
    <title>779a4e27-9d1b-403f-bf99-9c357b19595b</title>
    <updated>2026-05-04T19:54:36.431456+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "779a4e27-9d1b-403f-bf99-9c357b19595b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113762797652955807", "content": "", "creation_timestamp": "2025-01-03T05:35:33.030470Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/779a4e27-9d1b-403f-bf99-9c357b19595b/export"/>
    <published>2025-01-03T05:35:33.030470+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d38ecabd-636f-43b4-be3a-3a650e39fc3c/export</id>
    <title>d38ecabd-636f-43b4-be3a-3a650e39fc3c</title>
    <updated>2026-05-04T19:54:36.431343+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d38ecabd-636f-43b4-be3a-3a650e39fc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://t.me/cvedetector/14211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53840 - Venezuela Biometrics Extractables Fingerprint Extraction\", \n  \"Content\": \"CVE ID : CVE-2024-53840 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d38ecabd-636f-43b4-be3a-3a650e39fc3c/export"/>
    <published>2025-01-03T06:09:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/87cd7f50-4ef3-4abb-9bec-0a80153b6e93/export</id>
    <title>87cd7f50-4ef3-4abb-9bec-0a80153b6e93</title>
    <updated>2026-05-04T19:54:36.431264+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "87cd7f50-4ef3-4abb-9bec-0a80153b6e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://t.me/cvedetector/14212", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53841 - Google Android Confused Deputy Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53841 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In startListeningForDeviceStateChanges, there is a possible Permission Bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/87cd7f50-4ef3-4abb-9bec-0a80153b6e93/export"/>
    <published>2025-01-03T06:09:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b157a9da-d8f9-4043-afa7-ce255cb598a2/export</id>
    <title>b157a9da-d8f9-4043-afa7-ce255cb598a2</title>
    <updated>2026-05-04T19:54:36.431164+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b157a9da-d8f9-4043-afa7-ce255cb598a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://t.me/cvedetector/14213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53842 - \"Adobe CC Remote Code Execution via Out-of-Bounds Write\"\", \n  \"Content\": \"CVE ID : CVE-2024-53842 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b157a9da-d8f9-4043-afa7-ce255cb598a2/export"/>
    <published>2025-01-03T06:09:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8fe2181a-136e-4086-b2d4-64109b560e9a/export</id>
    <title>8fe2181a-136e-4086-b2d4-64109b560e9a</title>
    <updated>2026-05-04T19:54:36.431046+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8fe2181a-136e-4086-b2d4-64109b560e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5384", "type": "seen", "source": "Telegram/PumtoLv5DzWvg5dem_J2gBwiVGKncDY-OEoR-GcC5h0afuLo", "content": "", "creation_timestamp": "2025-02-14T10:03:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8fe2181a-136e-4086-b2d4-64109b560e9a/export"/>
    <published>2025-02-14T10:03:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f560a461-5a6f-4186-9ee3-21c9e6f73a3f/export</id>
    <title>f560a461-5a6f-4186-9ee3-21c9e6f73a3f</title>
    <updated>2026-05-04T19:54:36.429274+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f560a461-5a6f-4186-9ee3-21c9e6f73a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53849", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m4lt3xh4ts2f", "content": "", "creation_timestamp": "2025-11-01T20:24:14.843087Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f560a461-5a6f-4186-9ee3-21c9e6f73a3f/export"/>
    <published>2025-11-01T20:24:14.843087+00:00</published>
  </entry>
</feed>
