<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:43:33.773275+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f20a6f18-52d7-4501-a9c7-045e5df972e9/export</id>
    <title>f20a6f18-52d7-4501-a9c7-045e5df972e9</title>
    <updated>2026-05-04T13:43:33.930745+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f20a6f18-52d7-4501-a9c7-045e5df972e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56196", "type": "seen", "source": "https://t.me/cvedetector/19699", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56196 - Apache Traffic Server Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56196 \nPublished : March 6, 2025, 12:15 p.m. | 1\u00a0hour, 52\u00a0minutes ago \nDescription : Improper Access Control vulnerability in Apache Traffic Server.  \n  \nThis issue affects Apache Traffic Server: from 10.0.0 through 10.0.3.  \n  \nUsers are recommended to upgrade to version 10.0.4, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T15:30:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f20a6f18-52d7-4501-a9c7-045e5df972e9/export"/>
    <published>2025-03-06T15:30:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1c5b424e-abe7-44b9-a278-ae8ed17aff99/export</id>
    <title>1c5b424e-abe7-44b9-a278-ae8ed17aff99</title>
    <updated>2026-05-04T13:43:33.930650+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1c5b424e-abe7-44b9-a278-ae8ed17aff99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56196", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljptkycffy2f", "content": "", "creation_timestamp": "2025-03-06T15:44:34.141727Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1c5b424e-abe7-44b9-a278-ae8ed17aff99/export"/>
    <published>2025-03-06T15:44:34.141727+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/365df756-d8de-493b-b17f-b5209475656b/export</id>
    <title>365df756-d8de-493b-b17f-b5209475656b</title>
    <updated>2026-05-04T13:43:33.930548+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "365df756-d8de-493b-b17f-b5209475656b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56195", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljptkyuatu2q", "content": "", "creation_timestamp": "2025-03-06T15:44:35.168020Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/365df756-d8de-493b-b17f-b5209475656b/export"/>
    <published>2025-03-06T15:44:35.168020+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c7410394-5ca8-441a-96c8-f6cc2d55f1a0/export</id>
    <title>c7410394-5ca8-441a-96c8-f6cc2d55f1a0</title>
    <updated>2026-05-04T13:43:33.930446+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c7410394-5ca8-441a-96c8-f6cc2d55f1a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56192", "type": "seen", "source": "https://t.me/cvedetector/19980", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56192 - WiLink Notify GScan Event Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56192 \nPublished : March 10, 2025, 9:15 p.m. | 17\u00a0minutes ago \nDescription : In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T23:13:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c7410394-5ca8-441a-96c8-f6cc2d55f1a0/export"/>
    <published>2025-03-10T23:13:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e900553d-0171-4ec8-aa15-7855621e9405/export</id>
    <title>e900553d-0171-4ec8-aa15-7855621e9405</title>
    <updated>2026-05-04T13:43:33.930340+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e900553d-0171-4ec8-aa15-7855621e9405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56191", "type": "seen", "source": "https://t.me/cvedetector/19986", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56191 - D-Link DHD Elevation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2024-56191 \nPublished : March 10, 2025, 9:15 p.m. | 17\u00a0minutes ago \nDescription : In dhd_process_full_gscan_result of dhd_pno.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T23:13:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e900553d-0171-4ec8-aa15-7855621e9405/export"/>
    <published>2025-03-10T23:13:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/abdfcbe5-01a7-4e8c-b87b-735054074a28/export</id>
    <title>abdfcbe5-01a7-4e8c-b87b-735054074a28</title>
    <updated>2026-05-04T13:43:33.930241+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "abdfcbe5-01a7-4e8c-b87b-735054074a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56191", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2qmorykz2h", "content": "", "creation_timestamp": "2025-03-10T23:51:10.130788Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/abdfcbe5-01a7-4e8c-b87b-735054074a28/export"/>
    <published>2025-03-10T23:51:10.130788+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b0200659-5560-4ab8-92d7-75821678d5d1/export</id>
    <title>b0200659-5560-4ab8-92d7-75821678d5d1</title>
    <updated>2026-05-04T13:43:33.930139+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b0200659-5560-4ab8-92d7-75821678d5d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56192", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2qmpg7dd2h", "content": "", "creation_timestamp": "2025-03-10T23:51:12.099615Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b0200659-5560-4ab8-92d7-75821678d5d1/export"/>
    <published>2025-03-10T23:51:12.099615+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3ee14b41-92af-46c7-a8f7-3e696a6ab945/export</id>
    <title>3ee14b41-92af-46c7-a8f7-3e696a6ab945</title>
    <updated>2026-05-04T13:43:33.930025+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3ee14b41-92af-46c7-a8f7-3e696a6ab945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56193", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17657", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56193\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a possible disclosure of Bluetooth adapter details due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-05-27T15:41:27.429Z\n\ud83d\udccf Modified: 2025-05-27T15:41:27.429Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2025-05-01", "creation_timestamp": "2025-05-27T15:49:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3ee14b41-92af-46c7-a8f7-3e696a6ab945/export"/>
    <published>2025-05-27T15:49:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3634aca9-8610-48ee-9818-1f8f30336a97/export</id>
    <title>3634aca9-8610-48ee-9818-1f8f30336a97</title>
    <updated>2026-05-04T13:43:33.929885+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3634aca9-8610-48ee-9818-1f8f30336a97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56193", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq65wel6lt22", "content": "", "creation_timestamp": "2025-05-27T17:02:24.336441Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3634aca9-8610-48ee-9818-1f8f30336a97/export"/>
    <published>2025-05-27T17:02:24.336441+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/67afb179-b973-4259-bea9-03f85301d3da/export</id>
    <title>67afb179-b973-4259-bea9-03f85301d3da</title>
    <updated>2026-05-04T13:43:33.926936+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "67afb179-b973-4259-bea9-03f85301d3da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56190", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxz7leb54j2i", "content": "", "creation_timestamp": "2025-09-04T13:06:12.136894Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/67afb179-b973-4259-bea9-03f85301d3da/export"/>
    <published>2025-09-04T13:06:12.136894+00:00</published>
  </entry>
</feed>
