<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T05:50:32.306725+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/95fd5e46-7cf9-49c1-abb2-595b7f6bb00a/export</id>
    <title>95fd5e46-7cf9-49c1-abb2-595b7f6bb00a</title>
    <updated>2026-05-06T05:50:32.719141+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "95fd5e46-7cf9-49c1-abb2-595b7f6bb00a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24221", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10055", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24221\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved data access restriction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Sensitive keychain data may be accessible from an iOS backup.\n\ud83d\udccf Published: 2025-03-31T22:22:50.981Z\n\ud83d\udccf Modified: 2025-04-02T13:30:07.844Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122371\n2. https://support.apple.com/en-us/122372\n3. https://support.apple.com/en-us/122378", "creation_timestamp": "2025-04-02T13:33:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/95fd5e46-7cf9-49c1-abb2-595b7f6bb00a/export"/>
    <published>2025-04-02T13:33:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8679e721-eb16-4e8d-a1aa-7bfcb84743f5/export</id>
    <title>8679e721-eb16-4e8d-a1aa-7bfcb84743f5</title>
    <updated>2026-05-06T05:50:32.719043+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8679e721-eb16-4e8d-a1aa-7bfcb84743f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24221", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/30726", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24221: Sensitive keychain data may be accessible from an iOS backup\nURL\uff1ahttps://github.com/AnonymousDeveloper69/CVE-2025-24221\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-09T11:33:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8679e721-eb16-4e8d-a1aa-7bfcb84743f5/export"/>
    <published>2025-04-09T11:33:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/79c417fe-9a96-4181-97bf-243fdddf5311/export</id>
    <title>79c417fe-9a96-4181-97bf-243fdddf5311</title>
    <updated>2026-05-06T05:50:32.718914+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "79c417fe-9a96-4181-97bf-243fdddf5311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24221", "type": "published-proof-of-concept", "source": "Telegram/FAIvuvhej6YKUILw0E0XScyFxRjU5GWS0y-TO9Z9-0AOFS8", "content": "", "creation_timestamp": "2025-04-09T17:00:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/79c417fe-9a96-4181-97bf-243fdddf5311/export"/>
    <published>2025-04-09T17:00:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1f624a5c-3ee2-48a9-9174-2e5941005842/export</id>
    <title>1f624a5c-3ee2-48a9-9174-2e5941005842</title>
    <updated>2026-05-06T05:50:32.716731+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1f624a5c-3ee2-48a9-9174-2e5941005842", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24221", "type": "seen", "source": "Telegram/2E5zGnFDFPvCqW-_8Fv5TCu3RrGIbsxTzgaNWgYN4u84o0k", "content": "", "creation_timestamp": "2026-04-02T22:14:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1f624a5c-3ee2-48a9-9174-2e5941005842/export"/>
    <published>2026-04-02T22:14:33+00:00</published>
  </entry>
</feed>
