<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:21:19.000186+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ac11fbb1-8d1d-44c9-b0a4-e3e53f0684ee/export</id>
    <title>ac11fbb1-8d1d-44c9-b0a4-e3e53f0684ee</title>
    <updated>2026-05-04T19:21:19.329036+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ac11fbb1-8d1d-44c9-b0a4-e3e53f0684ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2012-4858", "type": "seen", "source": "https://t.me/arpsyndicate/2551", "content": "#ExploitObserverAlert\n\nCVE-2012-4858\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2012-4858. IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 does not properly validate Java serialized input, which allows remote attackers to execute arbitrary commands via unspecified vectors.\n\nFIRST-EPSS: 0.009070000\nNVD-IS: 10.0\nNVD-ES: 8.6", "creation_timestamp": "2024-01-06T15:30:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ac11fbb1-8d1d-44c9-b0a4-e3e53f0684ee/export"/>
    <published>2024-01-06T15:30:41+00:00</published>
  </entry>
</feed>
