<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 14:09:49 +0000</lastBuildDate>
    <item>
      <title>1d4ce23c-3cde-45eb-98bb-58ed07975c23</title>
      <link>https://vulnerability.circl.lu/sighting/1d4ce23c-3cde-45eb-98bb-58ed07975c23/export</link>
      <description>{"uuid": "1d4ce23c-3cde-45eb-98bb-58ed07975c23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13256", "type": "seen", "source": "https://t.me/cvedetector/14886", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13256 - Drupal Email Contact Access Bypass Weakness\", \n  \"Content\": \"CVE ID : CVE-2024-13256 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Insufficient Granularity of Access Control vulnerability in Drupal Email Contact allows Forceful Browsing.This issue affects Email Contact: from 0.0.0 before 2.0.4. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:55.000000Z"}</description>
      <content:encoded>{"uuid": "1d4ce23c-3cde-45eb-98bb-58ed07975c23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13256", "type": "seen", "source": "https://t.me/cvedetector/14886", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13256 - Drupal Email Contact Access Bypass Weakness\", \n  \"Content\": \"CVE ID : CVE-2024-13256 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Insufficient Granularity of Access Control vulnerability in Drupal Email Contact allows Forceful Browsing.This issue affects Email Contact: from 0.0.0 before 2.0.4. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1d4ce23c-3cde-45eb-98bb-58ed07975c23/export</guid>
      <pubDate>Thu, 09 Jan 2025 21:06:55 +0000</pubDate>
    </item>
    <item>
      <title>048d5f55-e25b-45c7-9b3a-9eac0632a521</title>
      <link>https://vulnerability.circl.lu/sighting/048d5f55-e25b-45c7-9b3a-9eac0632a521/export</link>
      <description>{"uuid": "048d5f55-e25b-45c7-9b3a-9eac0632a521", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://t.me/cvedetector/14888", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13258 - \"Drupal JSON API Unauthorized Access\"\", \n  \"Content\": \"CVE ID : CVE-2024-13258 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Authorization vulnerability in Drupal Drupal REST &amp;amp; JSON API Authentication allows Forceful Browsing.This issue affects Drupal REST &amp;amp; JSON API Authentication: from 0.0.0 before 2.0.13. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:56.000000Z"}</description>
      <content:encoded>{"uuid": "048d5f55-e25b-45c7-9b3a-9eac0632a521", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://t.me/cvedetector/14888", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13258 - \"Drupal JSON API Unauthorized Access\"\", \n  \"Content\": \"CVE ID : CVE-2024-13258 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Authorization vulnerability in Drupal Drupal REST &amp;amp; JSON API Authentication allows Forceful Browsing.This issue affects Drupal REST &amp;amp; JSON API Authentication: from 0.0.0 before 2.0.13. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/048d5f55-e25b-45c7-9b3a-9eac0632a521/export</guid>
      <pubDate>Thu, 09 Jan 2025 21:06:56 +0000</pubDate>
    </item>
    <item>
      <title>01313ff3-019c-4d2b-83fa-32e85da5aec8</title>
      <link>https://vulnerability.circl.lu/sighting/01313ff3-019c-4d2b-83fa-32e85da5aec8/export</link>
      <description>{"uuid": "01313ff3-019c-4d2b-83fa-32e85da5aec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13257", "type": "seen", "source": "https://t.me/cvedetector/14887", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13257 - Drupal Commerce Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-13257 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Authorization vulnerability in Drupal Commerce View Receipt allows Forceful Browsing.This issue affects Commerce View Receipt: from 0.0.0 before 1.0.3. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:56.000000Z"}</description>
      <content:encoded>{"uuid": "01313ff3-019c-4d2b-83fa-32e85da5aec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13257", "type": "seen", "source": "https://t.me/cvedetector/14887", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13257 - Drupal Commerce Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-13257 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Authorization vulnerability in Drupal Commerce View Receipt allows Forceful Browsing.This issue affects Commerce View Receipt: from 0.0.0 before 1.0.3. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/01313ff3-019c-4d2b-83fa-32e85da5aec8/export</guid>
      <pubDate>Thu, 09 Jan 2025 21:06:56 +0000</pubDate>
    </item>
    <item>
      <title>d304a5f2-088d-4724-96a2-b2c0cdf15f6b</title>
      <link>https://vulnerability.circl.lu/sighting/d304a5f2-088d-4724-96a2-b2c0cdf15f6b/export</link>
      <description>{"uuid": "d304a5f2-088d-4724-96a2-b2c0cdf15f6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13259", "type": "seen", "source": "https://t.me/cvedetector/14889", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13259 - \"Drupal Image Sizes Sensitive Information Insertion Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13259 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Insertion of Sensitive Information Into Sent Data vulnerability in Drupal Image Sizes allows Forceful Browsing.This issue affects Image Sizes: from 0.0.0 before 3.0.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:57.000000Z"}</description>
      <content:encoded>{"uuid": "d304a5f2-088d-4724-96a2-b2c0cdf15f6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13259", "type": "seen", "source": "https://t.me/cvedetector/14889", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13259 - \"Drupal Image Sizes Sensitive Information Insertion Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13259 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Insertion of Sensitive Information Into Sent Data vulnerability in Drupal Image Sizes allows Forceful Browsing.This issue affects Image Sizes: from 0.0.0 before 3.0.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d304a5f2-088d-4724-96a2-b2c0cdf15f6b/export</guid>
      <pubDate>Thu, 09 Jan 2025 21:06:57 +0000</pubDate>
    </item>
    <item>
      <title>267738f6-5b39-4f7f-9798-beb50314125f</title>
      <link>https://vulnerability.circl.lu/sighting/267738f6-5b39-4f7f-9798-beb50314125f/export</link>
      <description>{"uuid": "267738f6-5b39-4f7f-9798-beb50314125f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://t.me/cvedetector/14890", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13251 - Drupal Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13251 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Privilege Assignment vulnerability in Drupal Registration role allows Privilege Escalation.This issue affects Registration role: from 0.0.0 before 2.0.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:58.000000Z"}</description>
      <content:encoded>{"uuid": "267738f6-5b39-4f7f-9798-beb50314125f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://t.me/cvedetector/14890", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13251 - Drupal Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13251 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Privilege Assignment vulnerability in Drupal Registration role allows Privilege Escalation.This issue affects Registration role: from 0.0.0 before 2.0.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/267738f6-5b39-4f7f-9798-beb50314125f/export</guid>
      <pubDate>Thu, 09 Jan 2025 21:06:58 +0000</pubDate>
    </item>
    <item>
      <title>18899566-d014-45ab-9879-57c552a2b4df</title>
      <link>https://vulnerability.circl.lu/sighting/18899566-d014-45ab-9879-57c552a2b4df/export</link>
      <description>{"uuid": "18899566-d014-45ab-9879-57c552a2b4df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13252", "type": "seen", "source": "https://t.me/cvedetector/14891", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13252 - Drupal TacJS Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-13252 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal TacJS allows Cross-Site Scripting (XSS).This issue affects TacJS: from 0.0.0 before 6.5.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:07:01.000000Z"}</description>
      <content:encoded>{"uuid": "18899566-d014-45ab-9879-57c552a2b4df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13252", "type": "seen", "source": "https://t.me/cvedetector/14891", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13252 - Drupal TacJS Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-13252 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal TacJS allows Cross-Site Scripting (XSS).This issue affects TacJS: from 0.0.0 before 6.5.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:07:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/18899566-d014-45ab-9879-57c552a2b4df/export</guid>
      <pubDate>Thu, 09 Jan 2025 21:07:01 +0000</pubDate>
    </item>
    <item>
      <title>f2cb9c1a-0c7e-47e8-a3c9-b85ab9bf8843</title>
      <link>https://vulnerability.circl.lu/sighting/f2cb9c1a-0c7e-47e8-a3c9-b85ab9bf8843/export</link>
      <description>{"uuid": "f2cb9c1a-0c7e-47e8-a3c9-b85ab9bf8843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13250", "type": "seen", "source": "https://t.me/cvedetector/14899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13250 - Drupal Symfony Mailer Lite CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-13250 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Drupal Drupal Symfony Mailer Lite allows Cross Site Request Forgery.This issue affects Drupal Symfony Mailer Lite: from 0.0.0 before 1.0.6. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:07:12.000000Z"}</description>
      <content:encoded>{"uuid": "f2cb9c1a-0c7e-47e8-a3c9-b85ab9bf8843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13250", "type": "seen", "source": "https://t.me/cvedetector/14899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13250 - Drupal Symfony Mailer Lite CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-13250 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Drupal Drupal Symfony Mailer Lite allows Cross Site Request Forgery.This issue affects Drupal Symfony Mailer Lite: from 0.0.0 before 1.0.6. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:07:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2cb9c1a-0c7e-47e8-a3c9-b85ab9bf8843/export</guid>
      <pubDate>Thu, 09 Jan 2025 21:07:12 +0000</pubDate>
    </item>
    <item>
      <title>f9a765ae-f0fc-413d-aa80-78ab9f5adb9c</title>
      <link>https://vulnerability.circl.lu/sighting/f9a765ae-f0fc-413d-aa80-78ab9f5adb9c/export</link>
      <description>{"uuid": "f9a765ae-f0fc-413d-aa80-78ab9f5adb9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316675395599", "content": "", "creation_timestamp": "2025-01-10T17:48:54.353227Z"}</description>
      <content:encoded>{"uuid": "f9a765ae-f0fc-413d-aa80-78ab9f5adb9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316675395599", "content": "", "creation_timestamp": "2025-01-10T17:48:54.353227Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f9a765ae-f0fc-413d-aa80-78ab9f5adb9c/export</guid>
      <pubDate>Fri, 10 Jan 2025 17:48:54 +0000</pubDate>
    </item>
    <item>
      <title>09bad3ec-0ef5-4f5e-94ea-669d3175bd9f</title>
      <link>https://vulnerability.circl.lu/sighting/09bad3ec-0ef5-4f5e-94ea-669d3175bd9f/export</link>
      <description>{"uuid": "09bad3ec-0ef5-4f5e-94ea-669d3175bd9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316847032256", "content": "", "creation_timestamp": "2025-01-10T17:48:58.737344Z"}</description>
      <content:encoded>{"uuid": "09bad3ec-0ef5-4f5e-94ea-669d3175bd9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316847032256", "content": "", "creation_timestamp": "2025-01-10T17:48:58.737344Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/09bad3ec-0ef5-4f5e-94ea-669d3175bd9f/export</guid>
      <pubDate>Fri, 10 Jan 2025 17:48:58 +0000</pubDate>
    </item>
    <item>
      <title>7e79ab99-ec20-4232-9932-65f1d2477e0c</title>
      <link>https://vulnerability.circl.lu/sighting/7e79ab99-ec20-4232-9932-65f1d2477e0c/export</link>
      <description>{"uuid": "7e79ab99-ec20-4232-9932-65f1d2477e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13253", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316779208716", "content": "", "creation_timestamp": "2025-01-10T17:48:58.922242Z"}</description>
      <content:encoded>{"uuid": "7e79ab99-ec20-4232-9932-65f1d2477e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13253", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316779208716", "content": "", "creation_timestamp": "2025-01-10T17:48:58.922242Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7e79ab99-ec20-4232-9932-65f1d2477e0c/export</guid>
      <pubDate>Fri, 10 Jan 2025 17:48:58 +0000</pubDate>
    </item>
  </channel>
</rss>
