<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T19:40:01.700271+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/343f7f46-7ab7-4c70-aff0-26efc28b7211/export</id>
    <title>343f7f46-7ab7-4c70-aff0-26efc28b7211</title>
    <updated>2026-05-06T19:40:01.924912+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "343f7f46-7ab7-4c70-aff0-26efc28b7211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20918", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6651", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20918\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Out-of-bounds read in applying extra data of base content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.\n\ud83d\udccf Published: 2025-03-06T05:04:21.562Z\n\ud83d\udccf Modified: 2025-03-06T05:04:21.562Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/serviceWeb.smsb?year=2025&amp;amp;month=03", "creation_timestamp": "2025-03-06T05:36:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/343f7f46-7ab7-4c70-aff0-26efc28b7211/export"/>
    <published>2025-03-06T05:36:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6576225e-d568-4b80-8339-a6397f77d393/export</id>
    <title>6576225e-d568-4b80-8339-a6397f77d393</title>
    <updated>2026-05-06T19:40:01.924841+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6576225e-d568-4b80-8339-a6397f77d393", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20917", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6652", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20917\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Out-of-bounds read in applying binary of pdf content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.\n\ud83d\udccf Published: 2025-03-06T05:04:20.348Z\n\ud83d\udccf Modified: 2025-03-06T05:04:20.348Z\n\ud83d\udd17 References:\n1. https://security.samsungmobile.com/serviceWeb.smsb?year=2025&amp;amp;month=03", "creation_timestamp": "2025-03-06T05:36:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6576225e-d568-4b80-8339-a6397f77d393/export"/>
    <published>2025-03-06T05:36:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2f4be247-0825-4e3c-b041-86c8dd2f4cc5/export</id>
    <title>2f4be247-0825-4e3c-b041-86c8dd2f4cc5</title>
    <updated>2026-05-06T19:40:01.924769+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2f4be247-0825-4e3c-b041-86c8dd2f4cc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20919", "type": "seen", "source": "https://t.me/cvedetector/19683", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20919 - Samsung Notes OOB Read\", \n  \"Content\": \"CVE ID : CVE-2025-20919 \nPublished : March 6, 2025, 5:15 a.m. | 33\u00a0minutes ago \nDescription : Out-of-bounds read in applying binary of video content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T07:09:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2f4be247-0825-4e3c-b041-86c8dd2f4cc5/export"/>
    <published>2025-03-06T07:09:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d3d4e100-7cf8-49a0-ad0c-05a7a253ec80/export</id>
    <title>d3d4e100-7cf8-49a0-ad0c-05a7a253ec80</title>
    <updated>2026-05-06T19:40:01.924683+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d3d4e100-7cf8-49a0-ad0c-05a7a253ec80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20913", "type": "seen", "source": "https://t.me/cvedetector/19685", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20913 - Samsung Notes OOB Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20913 \nPublished : March 6, 2025, 5:15 a.m. | 33\u00a0minutes ago \nDescription : Out-of-bounds read in applying binary of drawing content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T07:09:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d3d4e100-7cf8-49a0-ad0c-05a7a253ec80/export"/>
    <published>2025-03-06T07:09:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cfd91c1a-2b59-48df-893c-c96616b7ed1c/export</id>
    <title>cfd91c1a-2b59-48df-893c-c96616b7ed1c</title>
    <updated>2026-05-06T19:40:01.924603+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cfd91c1a-2b59-48df-893c-c96616b7ed1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20915", "type": "seen", "source": "https://t.me/cvedetector/19687", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20915 - Samsung Notes OOB Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20915 \nPublished : March 6, 2025, 5:15 a.m. | 33\u00a0minutes ago \nDescription : Out-of-bounds read in applying binary of voice content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T07:09:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cfd91c1a-2b59-48df-893c-c96616b7ed1c/export"/>
    <published>2025-03-06T07:09:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de0317ee-195f-4ca7-b070-5845eb70149a/export</id>
    <title>de0317ee-195f-4ca7-b070-5845eb70149a</title>
    <updated>2026-05-06T19:40:01.924517+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "de0317ee-195f-4ca7-b070-5845eb70149a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20914", "type": "seen", "source": "https://t.me/cvedetector/19686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20914 - Samsung Notes OOB Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20914 \nPublished : March 6, 2025, 5:15 a.m. | 33\u00a0minutes ago \nDescription : Out-of-bounds read in applying binary of hand writing content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T07:09:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de0317ee-195f-4ca7-b070-5845eb70149a/export"/>
    <published>2025-03-06T07:09:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cb3e59d3-bacb-4b86-baf0-3f6d4cce17b4/export</id>
    <title>cb3e59d3-bacb-4b86-baf0-3f6d4cce17b4</title>
    <updated>2026-05-06T19:40:01.924436+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cb3e59d3-bacb-4b86-baf0-3f6d4cce17b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20916", "type": "seen", "source": "https://t.me/cvedetector/19688", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20916 - Samsung Notes OOB Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20916 \nPublished : March 6, 2025, 5:15 a.m. | 33\u00a0minutes ago \nDescription : Out-of-bounds read in reading string of SPen in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T07:09:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cb3e59d3-bacb-4b86-baf0-3f6d4cce17b4/export"/>
    <published>2025-03-06T07:09:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8402f1f7-cf3c-4c36-ac13-cb7d36682596/export</id>
    <title>8402f1f7-cf3c-4c36-ac13-cb7d36682596</title>
    <updated>2026-05-06T19:40:01.924360+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8402f1f7-cf3c-4c36-ac13-cb7d36682596", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20911", "type": "seen", "source": "Telegram/Ig7RDU6HjzTYrPWxh8H5Tr4rrBxug4B-tl0lJ-_tOG-y544r", "content": "", "creation_timestamp": "2025-03-08T04:34:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8402f1f7-cf3c-4c36-ac13-cb7d36682596/export"/>
    <published>2025-03-08T04:34:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1a03e8f9-5569-480c-bfe6-bae8f69e9539/export</id>
    <title>1a03e8f9-5569-480c-bfe6-bae8f69e9539</title>
    <updated>2026-05-06T19:40:01.924245+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1a03e8f9-5569-480c-bfe6-bae8f69e9539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20910", "type": "seen", "source": "Telegram/nsZx3cLLZChTegwmrc23s1xmnXYtYAuhB50yjIxICO4SovIF", "content": "", "creation_timestamp": "2025-03-08T04:34:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1a03e8f9-5569-480c-bfe6-bae8f69e9539/export"/>
    <published>2025-03-08T04:34:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3a61fadb-daef-4d75-90ad-347d48d519d1/export</id>
    <title>3a61fadb-daef-4d75-90ad-347d48d519d1</title>
    <updated>2026-05-06T19:40:01.922095+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3a61fadb-daef-4d75-90ad-347d48d519d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2091", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18434", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2091\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/RE:M/U:Green)\n\ud83d\udd39 Description: An open redirection vulnerability in M-Files mobile applications for Android and iOS prior to version 25.6.0 allows attackers to use maliciously crafted PDF files to trick other users into making requests to untrusted URLs.\n\ud83d\udccf Published: 2025-06-16T08:27:13.170Z\n\ud83d\udccf Modified: 2025-06-16T08:27:13.170Z\n\ud83d\udd17 References:\n1. https://product.m-files.com/security-advisories/cve-2025-2091", "creation_timestamp": "2025-06-16T09:38:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3a61fadb-daef-4d75-90ad-347d48d519d1/export"/>
    <published>2025-06-16T09:38:05+00:00</published>
  </entry>
</feed>
