<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:26:13 +0000</lastBuildDate>
    <item>
      <title>c9c41a00-0993-4cb4-9e9e-b5e110834466</title>
      <link>https://vulnerability.circl.lu/sighting/c9c41a00-0993-4cb4-9e9e-b5e110834466/export</link>
      <description>{"uuid": "c9c41a00-0993-4cb4-9e9e-b5e110834466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1633", "type": "seen", "source": "https://t.me/ctinow/187853", "content": "https://ift.tt/3VIs5R9\nCVE-2024-1633", "creation_timestamp": "2024-02-19T18:26:44.000000Z"}</description>
      <content:encoded>{"uuid": "c9c41a00-0993-4cb4-9e9e-b5e110834466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1633", "type": "seen", "source": "https://t.me/ctinow/187853", "content": "https://ift.tt/3VIs5R9\nCVE-2024-1633", "creation_timestamp": "2024-02-19T18:26:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c9c41a00-0993-4cb4-9e9e-b5e110834466/export</guid>
      <pubDate>Mon, 19 Feb 2024 18:26:44 +0000</pubDate>
    </item>
    <item>
      <title>cf13f80d-e628-4f32-b069-e2bd0c1bb323</title>
      <link>https://vulnerability.circl.lu/sighting/cf13f80d-e628-4f32-b069-e2bd0c1bb323/export</link>
      <description>{"uuid": "cf13f80d-e628-4f32-b069-e2bd0c1bb323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1633", "type": "seen", "source": "https://t.me/ctinow/187860", "content": "https://ift.tt/3VIs5R9\nCVE-2024-1633", "creation_timestamp": "2024-02-19T18:26:53.000000Z"}</description>
      <content:encoded>{"uuid": "cf13f80d-e628-4f32-b069-e2bd0c1bb323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1633", "type": "seen", "source": "https://t.me/ctinow/187860", "content": "https://ift.tt/3VIs5R9\nCVE-2024-1633", "creation_timestamp": "2024-02-19T18:26:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cf13f80d-e628-4f32-b069-e2bd0c1bb323/export</guid>
      <pubDate>Mon, 19 Feb 2024 18:26:53 +0000</pubDate>
    </item>
    <item>
      <title>30e1acbe-d313-49a8-8105-ae9a9b5fea68</title>
      <link>https://vulnerability.circl.lu/sighting/30e1acbe-d313-49a8-8105-ae9a9b5fea68/export</link>
      <description>{"uuid": "30e1acbe-d313-49a8-8105-ae9a9b5fea68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1633", "type": "seen", "source": "https://t.me/arpsyndicate/3664", "content": "#ExploitObserverAlert\n\nCVE-2024-1633\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1633. During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table \u201cbl2_mem_params_descs\u201d. For each image, the bl2 reads the image length and destination from the image\u2019s certificate.\u00a0Because of the way of reading from the image, which base on\u00a032-bit unsigned integer value, it can result to\u00a0an integer overflow.\u00a0An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot.   Affected git version from\u00a0c2f286820471ed276c57e603762bd831873e5a17 until (not", "creation_timestamp": "2024-02-20T18:39:09.000000Z"}</description>
      <content:encoded>{"uuid": "30e1acbe-d313-49a8-8105-ae9a9b5fea68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1633", "type": "seen", "source": "https://t.me/arpsyndicate/3664", "content": "#ExploitObserverAlert\n\nCVE-2024-1633\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1633. During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table \u201cbl2_mem_params_descs\u201d. For each image, the bl2 reads the image length and destination from the image\u2019s certificate.\u00a0Because of the way of reading from the image, which base on\u00a032-bit unsigned integer value, it can result to\u00a0an integer overflow.\u00a0An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot.   Affected git version from\u00a0c2f286820471ed276c57e603762bd831873e5a17 until (not", "creation_timestamp": "2024-02-20T18:39:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/30e1acbe-d313-49a8-8105-ae9a9b5fea68/export</guid>
      <pubDate>Tue, 20 Feb 2024 18:39:09 +0000</pubDate>
    </item>
    <item>
      <title>c3b5d8c8-9c30-4d25-bbd6-5ae09ef883c9</title>
      <link>https://vulnerability.circl.lu/sighting/c3b5d8c8-9c30-4d25-bbd6-5ae09ef883c9/export</link>
      <description>{"uuid": "c3b5d8c8-9c30-4d25-bbd6-5ae09ef883c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1633", "type": "seen", "source": "https://t.me/ctinow/203222", "content": "https://ift.tt/gYvMXwW\nCVE-2024-1633 | Renesas rcar_gen3 2.5 Image bl2_mem_params_descs integer overflow", "creation_timestamp": "2024-03-08T11:23:46.000000Z"}</description>
      <content:encoded>{"uuid": "c3b5d8c8-9c30-4d25-bbd6-5ae09ef883c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1633", "type": "seen", "source": "https://t.me/ctinow/203222", "content": "https://ift.tt/gYvMXwW\nCVE-2024-1633 | Renesas rcar_gen3 2.5 Image bl2_mem_params_descs integer overflow", "creation_timestamp": "2024-03-08T11:23:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c3b5d8c8-9c30-4d25-bbd6-5ae09ef883c9/export</guid>
      <pubDate>Fri, 08 Mar 2024 11:23:46 +0000</pubDate>
    </item>
  </channel>
</rss>
