<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 05:16:39 +0000</lastBuildDate>
    <item>
      <title>52ae951b-19fb-4110-99ef-27d3f401c3ad</title>
      <link>https://vulnerability.circl.lu/sighting/52ae951b-19fb-4110-99ef-27d3f401c3ad/export</link>
      <description>{"uuid": "52ae951b-19fb-4110-99ef-27d3f401c3ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12252", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lg7ad5sdja2a", "content": "", "creation_timestamp": "2025-01-20T21:02:04.771007Z"}</description>
      <content:encoded>{"uuid": "52ae951b-19fb-4110-99ef-27d3f401c3ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12252", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lg7ad5sdja2a", "content": "", "creation_timestamp": "2025-01-20T21:02:04.771007Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/52ae951b-19fb-4110-99ef-27d3f401c3ad/export</guid>
      <pubDate>Mon, 20 Jan 2025 21:02:04 +0000</pubDate>
    </item>
    <item>
      <title>4d66eec4-35e6-4fb0-b563-5e29658ecef6</title>
      <link>https://vulnerability.circl.lu/sighting/4d66eec4-35e6-4fb0-b563-5e29658ecef6/export</link>
      <description>{"uuid": "4d66eec4-35e6-4fb0-b563-5e29658ecef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://bsky.app/profile/mitsuhiko.at/post/3lgvrgcpcws24", "content": "", "creation_timestamp": "2025-01-29T20:06:38.137325Z"}</description>
      <content:encoded>{"uuid": "4d66eec4-35e6-4fb0-b563-5e29658ecef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://bsky.app/profile/mitsuhiko.at/post/3lgvrgcpcws24", "content": "", "creation_timestamp": "2025-01-29T20:06:38.137325Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4d66eec4-35e6-4fb0-b563-5e29658ecef6/export</guid>
      <pubDate>Wed, 29 Jan 2025 20:06:38 +0000</pubDate>
    </item>
    <item>
      <title>e2629bf4-cf96-48a8-96f3-bb1a361d438e</title>
      <link>https://vulnerability.circl.lu/sighting/e2629bf4-cf96-48a8-96f3-bb1a361d438e/export</link>
      <description>{"uuid": "e2629bf4-cf96-48a8-96f3-bb1a361d438e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://bsky.app/profile/mitsuhiko.at/post/3lgvrgdrdsk24", "content": "", "creation_timestamp": "2025-01-29T20:06:38.617316Z"}</description>
      <content:encoded>{"uuid": "e2629bf4-cf96-48a8-96f3-bb1a361d438e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://bsky.app/profile/mitsuhiko.at/post/3lgvrgdrdsk24", "content": "", "creation_timestamp": "2025-01-29T20:06:38.617316Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e2629bf4-cf96-48a8-96f3-bb1a361d438e/export</guid>
      <pubDate>Wed, 29 Jan 2025 20:06:38 +0000</pubDate>
    </item>
    <item>
      <title>73e25841-3cfe-4be1-a8f7-2dcfeac0192b</title>
      <link>https://vulnerability.circl.lu/sighting/73e25841-3cfe-4be1-a8f7-2dcfeac0192b/export</link>
      <description>{"uuid": "73e25841-3cfe-4be1-a8f7-2dcfeac0192b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12251", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyhqdfchq2s", "content": "", "creation_timestamp": "2025-02-12T15:16:23.407033Z"}</description>
      <content:encoded>{"uuid": "73e25841-3cfe-4be1-a8f7-2dcfeac0192b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12251", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyhqdfchq2s", "content": "", "creation_timestamp": "2025-02-12T15:16:23.407033Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/73e25841-3cfe-4be1-a8f7-2dcfeac0192b/export</guid>
      <pubDate>Wed, 12 Feb 2025 15:16:23 +0000</pubDate>
    </item>
    <item>
      <title>262c15ef-1943-4202-9354-67cc280ea339</title>
      <link>https://vulnerability.circl.lu/sighting/262c15ef-1943-4202-9354-67cc280ea339/export</link>
      <description>{"uuid": "262c15ef-1943-4202-9354-67cc280ea339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12251", "type": "seen", "source": "https://t.me/cvedetector/17902", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12251 - Telerik UI for WinUI Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12251 \nPublished : Feb. 12, 2025, 3:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : In Progress\u00ae Telerik\u00ae UI for WinUI versions prior to 2025 Q1 (3.0.0), a command injection attack is possible through improper neutralization of hyperlink elements. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T18:33:44.000000Z"}</description>
      <content:encoded>{"uuid": "262c15ef-1943-4202-9354-67cc280ea339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12251", "type": "seen", "source": "https://t.me/cvedetector/17902", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12251 - Telerik UI for WinUI Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12251 \nPublished : Feb. 12, 2025, 3:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : In Progress\u00ae Telerik\u00ae UI for WinUI versions prior to 2025 Q1 (3.0.0), a command injection attack is possible through improper neutralization of hyperlink elements. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T18:33:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/262c15ef-1943-4202-9354-67cc280ea339/export</guid>
      <pubDate>Wed, 12 Feb 2025 18:33:44 +0000</pubDate>
    </item>
    <item>
      <title>1b0e109a-bb95-4571-9603-686c4fdbbdec</title>
      <link>https://vulnerability.circl.lu/sighting/1b0e109a-bb95-4571-9603-686c4fdbbdec/export</link>
      <description>{"uuid": "1b0e109a-bb95-4571-9603-686c4fdbbdec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12252", "type": "published-proof-of-concept", "source": "Telegram/yRj3rvTPwwJJrmgfCfqzU7qpeXOxuv70IH7oKMdEI3GidpE", "content": "", "creation_timestamp": "2025-03-26T10:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "1b0e109a-bb95-4571-9603-686c4fdbbdec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12252", "type": "published-proof-of-concept", "source": "Telegram/yRj3rvTPwwJJrmgfCfqzU7qpeXOxuv70IH7oKMdEI3GidpE", "content": "", "creation_timestamp": "2025-03-26T10:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1b0e109a-bb95-4571-9603-686c4fdbbdec/export</guid>
      <pubDate>Wed, 26 Mar 2025 10:00:06 +0000</pubDate>
    </item>
    <item>
      <title>c71cb4c3-fa80-469c-be73-4d5e46a37ed8</title>
      <link>https://vulnerability.circl.lu/sighting/c71cb4c3-fa80-469c-be73-4d5e46a37ed8/export</link>
      <description>{"uuid": "c71cb4c3-fa80-469c-be73-4d5e46a37ed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12252", "type": "published-proof-of-concept", "source": "Telegram/vQ0Sm3TCgGLw115KTy13Xlz5wNa50qfz0GIGSnr52V26EMk", "content": "", "creation_timestamp": "2025-03-26T20:00:07.000000Z"}</description>
      <content:encoded>{"uuid": "c71cb4c3-fa80-469c-be73-4d5e46a37ed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12252", "type": "published-proof-of-concept", "source": "Telegram/vQ0Sm3TCgGLw115KTy13Xlz5wNa50qfz0GIGSnr52V26EMk", "content": "", "creation_timestamp": "2025-03-26T20:00:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c71cb4c3-fa80-469c-be73-4d5e46a37ed8/export</guid>
      <pubDate>Wed, 26 Mar 2025 20:00:07 +0000</pubDate>
    </item>
    <item>
      <title>8d2f5f37-6109-442a-a5cb-d0bece4dae42</title>
      <link>https://vulnerability.circl.lu/sighting/8d2f5f37-6109-442a-a5cb-d0bece4dae42/export</link>
      <description>{"uuid": "8d2f5f37-6109-442a-a5cb-d0bece4dae42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10589", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12254\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines()\n method would not \"pause\" writing and signal to the Protocol to drain \nthe buffer to the wire once the write buffer reached the \"high-water \nmark\". Because of this, Protocols would not periodically drain the write\n buffer potentially leading to memory exhaustion.\n\n\n\n\n\nThis\n vulnerability likely impacts a small number of users, you must be using\n Python 3.12.0 or later, on macOS or Linux, using the asyncio module \nwith protocols, and using .writelines() method which had new \nzero-copy-on-write behavior in Python 3.12.0 and later. If not all of \nthese factors are true then your usage of Python is unaffected.\n\ud83d\udccf Published: 2024-12-06T15:19:41.576Z\n\ud83d\udccf Modified: 2025-04-04T23:03:00.653Z\n\ud83d\udd17 References:\n1. https://github.com/python/cpython/issues/127655\n2. https://github.com/python/cpython/pull/127656\n3. https://mail.python.org/archives/list/security-announce@python.org/thread/H4O3UBAOAQQXGT4RE3E4XQYR5XLROORB/\n4. https://github.com/python/cpython/commit/71e8429ac8e2adc10084ab5ec29a62f4b6671a82\n5. https://github.com/python/cpython/commit/9aa0deb2eef2655a1029ba228527b152353135b5\n6. https://github.com/python/cpython/commit/e991ac8f2037d78140e417cc9a9486223eb3e786", "creation_timestamp": "2025-04-04T23:37:53.000000Z"}</description>
      <content:encoded>{"uuid": "8d2f5f37-6109-442a-a5cb-d0bece4dae42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10589", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12254\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines()\n method would not \"pause\" writing and signal to the Protocol to drain \nthe buffer to the wire once the write buffer reached the \"high-water \nmark\". Because of this, Protocols would not periodically drain the write\n buffer potentially leading to memory exhaustion.\n\n\n\n\n\nThis\n vulnerability likely impacts a small number of users, you must be using\n Python 3.12.0 or later, on macOS or Linux, using the asyncio module \nwith protocols, and using .writelines() method which had new \nzero-copy-on-write behavior in Python 3.12.0 and later. If not all of \nthese factors are true then your usage of Python is unaffected.\n\ud83d\udccf Published: 2024-12-06T15:19:41.576Z\n\ud83d\udccf Modified: 2025-04-04T23:03:00.653Z\n\ud83d\udd17 References:\n1. https://github.com/python/cpython/issues/127655\n2. https://github.com/python/cpython/pull/127656\n3. https://mail.python.org/archives/list/security-announce@python.org/thread/H4O3UBAOAQQXGT4RE3E4XQYR5XLROORB/\n4. https://github.com/python/cpython/commit/71e8429ac8e2adc10084ab5ec29a62f4b6671a82\n5. https://github.com/python/cpython/commit/9aa0deb2eef2655a1029ba228527b152353135b5\n6. https://github.com/python/cpython/commit/e991ac8f2037d78140e417cc9a9486223eb3e786", "creation_timestamp": "2025-04-04T23:37:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8d2f5f37-6109-442a-a5cb-d0bece4dae42/export</guid>
      <pubDate>Fri, 04 Apr 2025 23:37:53 +0000</pubDate>
    </item>
    <item>
      <title>03669567-5fca-4fe9-a3d7-defd8ddf8eca</title>
      <link>https://vulnerability.circl.lu/sighting/03669567-5fca-4fe9-a3d7-defd8ddf8eca/export</link>
      <description>{"uuid": "03669567-5fca-4fe9-a3d7-defd8ddf8eca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://gist.github.com/Vizonex/8242da16ed2d6a48b7acb812fee88957", "content": "", "creation_timestamp": "2025-09-11T23:45:45.000000Z"}</description>
      <content:encoded>{"uuid": "03669567-5fca-4fe9-a3d7-defd8ddf8eca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://gist.github.com/Vizonex/8242da16ed2d6a48b7acb812fee88957", "content": "", "creation_timestamp": "2025-09-11T23:45:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/03669567-5fca-4fe9-a3d7-defd8ddf8eca/export</guid>
      <pubDate>Thu, 11 Sep 2025 23:45:45 +0000</pubDate>
    </item>
    <item>
      <title>865092cb-f454-4db3-8043-abf0f12ada5d</title>
      <link>https://vulnerability.circl.lu/sighting/865092cb-f454-4db3-8043-abf0f12ada5d/export</link>
      <description>{"uuid": "865092cb-f454-4db3-8043-abf0f12ada5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3miogaw2zts22", "content": "", "creation_timestamp": "2026-04-04T14:14:41.812524Z"}</description>
      <content:encoded>{"uuid": "865092cb-f454-4db3-8043-abf0f12ada5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12254", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3miogaw2zts22", "content": "", "creation_timestamp": "2026-04-04T14:14:41.812524Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/865092cb-f454-4db3-8043-abf0f12ada5d/export</guid>
      <pubDate>Sat, 04 Apr 2026 14:14:41 +0000</pubDate>
    </item>
  </channel>
</rss>
