<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:26:11 +0000</lastBuildDate>
    <item>
      <title>d275e50c-c86d-459c-b3a1-858b694dc6e0</title>
      <link>https://vulnerability.circl.lu/sighting/d275e50c-c86d-459c-b3a1-858b694dc6e0/export</link>
      <description>{"uuid": "d275e50c-c86d-459c-b3a1-858b694dc6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25157", "type": "seen", "source": "https://t.me/arpsyndicate/2087", "content": "#ExploitObserverAlert\n\nCVE-2019-25157\n\nDESCRIPTION: Exploit Observer has 4 entries related to CVE-2019-25157. A vulnerability was found in Ethex Contracts. It has been classified as critical. This affects an unknown part of the file EthexJackpot.sol of the component Monthly Jackpot Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 6b8664b698d3d953e16c284fadc6caeb9e58e3db. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248271.", "creation_timestamp": "2023-12-23T05:21:15.000000Z"}</description>
      <content:encoded>{"uuid": "d275e50c-c86d-459c-b3a1-858b694dc6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25157", "type": "seen", "source": "https://t.me/arpsyndicate/2087", "content": "#ExploitObserverAlert\n\nCVE-2019-25157\n\nDESCRIPTION: Exploit Observer has 4 entries related to CVE-2019-25157. A vulnerability was found in Ethex Contracts. It has been classified as critical. This affects an unknown part of the file EthexJackpot.sol of the component Monthly Jackpot Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 6b8664b698d3d953e16c284fadc6caeb9e58e3db. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248271.", "creation_timestamp": "2023-12-23T05:21:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d275e50c-c86d-459c-b3a1-858b694dc6e0/export</guid>
      <pubDate>Sat, 23 Dec 2023 05:21:15 +0000</pubDate>
    </item>
    <item>
      <title>129ad6de-576f-407a-8992-ffa7846cb386</title>
      <link>https://vulnerability.circl.lu/sighting/129ad6de-576f-407a-8992-ffa7846cb386/export</link>
      <description>{"uuid": "129ad6de-576f-407a-8992-ffa7846cb386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25157", "type": "seen", "source": "https://t.me/ctinow/160680", "content": "https://ift.tt/px37oic\nCVE-2019-25157 Exploit", "creation_timestamp": "2023-12-29T21:17:10.000000Z"}</description>
      <content:encoded>{"uuid": "129ad6de-576f-407a-8992-ffa7846cb386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25157", "type": "seen", "source": "https://t.me/ctinow/160680", "content": "https://ift.tt/px37oic\nCVE-2019-25157 Exploit", "creation_timestamp": "2023-12-29T21:17:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/129ad6de-576f-407a-8992-ffa7846cb386/export</guid>
      <pubDate>Fri, 29 Dec 2023 21:17:10 +0000</pubDate>
    </item>
    <item>
      <title>c1c76563-998d-4aad-92dc-8ed5edf17067</title>
      <link>https://vulnerability.circl.lu/sighting/c1c76563-998d-4aad-92dc-8ed5edf17067/export</link>
      <description>{"uuid": "c1c76563-998d-4aad-92dc-8ed5edf17067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25157", "type": "seen", "source": "https://t.me/ctinow/167108", "content": "https://ift.tt/JT1X79U\nCVE-2019-25157 | Ethex Contracts Monthly Jackpot EthexJackpot.sol access control", "creation_timestamp": "2024-01-12T07:41:37.000000Z"}</description>
      <content:encoded>{"uuid": "c1c76563-998d-4aad-92dc-8ed5edf17067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25157", "type": "seen", "source": "https://t.me/ctinow/167108", "content": "https://ift.tt/JT1X79U\nCVE-2019-25157 | Ethex Contracts Monthly Jackpot EthexJackpot.sol access control", "creation_timestamp": "2024-01-12T07:41:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c1c76563-998d-4aad-92dc-8ed5edf17067/export</guid>
      <pubDate>Fri, 12 Jan 2024 07:41:37 +0000</pubDate>
    </item>
  </channel>
</rss>
