<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T10:37:48.393158+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/28b92013-c3be-4916-9ac4-c5bd3eb4e168/export</id>
    <title>28b92013-c3be-4916-9ac4-c5bd3eb4e168</title>
    <updated>2026-05-09T10:37:48.759154+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "28b92013-c3be-4916-9ac4-c5bd3eb4e168", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2887", "type": "seen", "source": "https://t.me/cvedetector/21344", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2887 - Apache Target Rollback Detection Vulnerability (Client Side Attack)\", \n  \"Content\": \"CVE ID : CVE-2025-2887 \nPublished : March 27, 2025, 11:15 p.m. | 38\u00a0minutes ago \nDescription : During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T01:01:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/28b92013-c3be-4916-9ac4-c5bd3eb4e168/export"/>
    <published>2025-03-28T01:01:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c5a168be-7bbb-4cbf-9e4b-47cc01628abd/export</id>
    <title>c5a168be-7bbb-4cbf-9e4b-47cc01628abd</title>
    <updated>2026-05-09T10:37:48.759005+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c5a168be-7bbb-4cbf-9e4b-47cc01628abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28878", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c5a168be-7bbb-4cbf-9e4b-47cc01628abd/export"/>
    <published>2025-08-13T13:26:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/25045bb9-1212-4e0c-80bc-c2a50a0662ab/export</id>
    <title>25045bb9-1212-4e0c-80bc-c2a50a0662ab</title>
    <updated>2026-05-09T10:37:48.758853+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "25045bb9-1212-4e0c-80bc-c2a50a0662ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28870", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/25045bb9-1212-4e0c-80bc-c2a50a0662ab/export"/>
    <published>2025-08-13T13:26:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3b543b65-a4c9-481f-8962-68e236238244/export</id>
    <title>3b543b65-a4c9-481f-8962-68e236238244</title>
    <updated>2026-05-09T10:37:48.758649+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3b543b65-a4c9-481f-8962-68e236238244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28876", "type": "published-proof-of-concept", "source": "Telegram/qaiUzY0jU3lsWkLczH5jpfSLcodDVE0N-CXW3vtlinmUY8k", "content": "", "creation_timestamp": "2026-04-01T21:29:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3b543b65-a4c9-481f-8962-68e236238244/export"/>
    <published>2026-04-01T21:29:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ed1db2e0-acac-4c29-a482-b02f07a79e5d/export</id>
    <title>ed1db2e0-acac-4c29-a482-b02f07a79e5d</title>
    <updated>2026-05-09T10:37:48.756507+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ed1db2e0-acac-4c29-a482-b02f07a79e5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28872", "type": "published-proof-of-concept", "source": "Telegram/qaiUzY0jU3lsWkLczH5jpfSLcodDVE0N-CXW3vtlinmUY8k", "content": "", "creation_timestamp": "2026-04-01T21:29:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ed1db2e0-acac-4c29-a482-b02f07a79e5d/export"/>
    <published>2026-04-01T21:29:15+00:00</published>
  </entry>
</feed>
