<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 21:37:26 +0000</lastBuildDate>
    <item>
      <title>b7db6806-e4c1-46c0-8b0d-91810e4e15a7</title>
      <link>https://vulnerability.circl.lu/sighting/b7db6806-e4c1-46c0-8b0d-91810e4e15a7/export</link>
      <description>{"uuid": "b7db6806-e4c1-46c0-8b0d-91810e4e15a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "seen", "source": "https://t.me/ctinow/165339", "content": "https://ift.tt/uyYR2Sk\nCVE-2024-21668", "creation_timestamp": "2024-01-09T20:26:17.000000Z"}</description>
      <content:encoded>{"uuid": "b7db6806-e4c1-46c0-8b0d-91810e4e15a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "seen", "source": "https://t.me/ctinow/165339", "content": "https://ift.tt/uyYR2Sk\nCVE-2024-21668", "creation_timestamp": "2024-01-09T20:26:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b7db6806-e4c1-46c0-8b0d-91810e4e15a7/export</guid>
      <pubDate>Tue, 09 Jan 2024 20:26:17 +0000</pubDate>
    </item>
    <item>
      <title>0ba98b3e-2509-4979-b13f-4e8eae7a43fe</title>
      <link>https://vulnerability.circl.lu/sighting/0ba98b3e-2509-4979-b13f-4e8eae7a43fe/export</link>
      <description>{"uuid": "0ba98b3e-2509-4979-b13f-4e8eae7a43fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "seen", "source": "https://t.me/arpsyndicate/3006", "content": "#ExploitObserverAlert\n\nCVE-2024-21668\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-21668. react-native-mmkv is a library that allows easy use of MMKV inside React Native applications. Before version 2.11.0, the react-native-mmkv logged the optional encryption key for the MMKV database into the Android system log. The key can be obtained by anyone with access to the Android Debugging Bridge (ADB) if it is enabled in the phone settings. This bug is not present on iOS devices. By logging the encryption secret to the system logs, attackers can trivially recover the secret by enabling ADB and undermining an app's thread model. This issue has been patched in version 2.11.0.\n\nFIRST-EPSS: 0.000580000\nNVD-IS: 3.6\nNVD-ES: 1.2", "creation_timestamp": "2024-01-26T17:08:26.000000Z"}</description>
      <content:encoded>{"uuid": "0ba98b3e-2509-4979-b13f-4e8eae7a43fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "seen", "source": "https://t.me/arpsyndicate/3006", "content": "#ExploitObserverAlert\n\nCVE-2024-21668\n\nDESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-21668. react-native-mmkv is a library that allows easy use of MMKV inside React Native applications. Before version 2.11.0, the react-native-mmkv logged the optional encryption key for the MMKV database into the Android system log. The key can be obtained by anyone with access to the Android Debugging Bridge (ADB) if it is enabled in the phone settings. This bug is not present on iOS devices. By logging the encryption secret to the system logs, attackers can trivially recover the secret by enabling ADB and undermining an app's thread model. This issue has been patched in version 2.11.0.\n\nFIRST-EPSS: 0.000580000\nNVD-IS: 3.6\nNVD-ES: 1.2", "creation_timestamp": "2024-01-26T17:08:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0ba98b3e-2509-4979-b13f-4e8eae7a43fe/export</guid>
      <pubDate>Fri, 26 Jan 2024 17:08:26 +0000</pubDate>
    </item>
    <item>
      <title>acc03f4d-085a-4041-b95e-eb31411391a2</title>
      <link>https://vulnerability.circl.lu/sighting/acc03f4d-085a-4041-b95e-eb31411391a2/export</link>
      <description>{"uuid": "acc03f4d-085a-4041-b95e-eb31411391a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "seen", "source": "https://t.me/ctinow/174607", "content": "https://ift.tt/KJL76mI\nCVE-2024-21668 | mrousavy react-native-mmkv up to 2.10.x log file (GHSA-4jh3-6jhv-2mgp)", "creation_timestamp": "2024-01-27T04:11:13.000000Z"}</description>
      <content:encoded>{"uuid": "acc03f4d-085a-4041-b95e-eb31411391a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "seen", "source": "https://t.me/ctinow/174607", "content": "https://ift.tt/KJL76mI\nCVE-2024-21668 | mrousavy react-native-mmkv up to 2.10.x log file (GHSA-4jh3-6jhv-2mgp)", "creation_timestamp": "2024-01-27T04:11:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/acc03f4d-085a-4041-b95e-eb31411391a2/export</guid>
      <pubDate>Sat, 27 Jan 2024 04:11:13 +0000</pubDate>
    </item>
    <item>
      <title>fbf5dae6-39aa-4d9c-9e93-9d4b67d61cec</title>
      <link>https://vulnerability.circl.lu/sighting/fbf5dae6-39aa-4d9c-9e93-9d4b67d61cec/export</link>
      <description>{"uuid": "fbf5dae6-39aa-4d9c-9e93-9d4b67d61cec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18600", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21668\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: react-native-mmkv is a library that allows easy use of MMKV inside React Native applications. Before version 2.11.0, the react-native-mmkv logged the optional encryption key for the MMKV database into the Android system log. The key can be obtained by anyone with access to the Android Debugging Bridge (ADB) if it is enabled in the phone settings. This bug is not present on iOS devices. By logging the encryption secret to the system logs, attackers can trivially recover the secret by enabling ADB and undermining an app's thread model. This issue has been patched in version 2.11.0.\n\ud83d\udccf Published: 2024-01-09T19:05:49.332Z\n\ud83d\udccf Modified: 2025-06-17T14:26:17.894Z\n\ud83d\udd17 References:\n1. https://github.com/mrousavy/react-native-mmkv/security/advisories/GHSA-4jh3-6jhv-2mgp\n2. https://github.com/mrousavy/react-native-mmkv/commit/a8995ccb7184281f7d168bad3e9987c9bd05f00d\n3. https://github.com/mrousavy/react-native-mmkv/releases/tag/v2.11.0", "creation_timestamp": "2025-06-17T14:40:07.000000Z"}</description>
      <content:encoded>{"uuid": "fbf5dae6-39aa-4d9c-9e93-9d4b67d61cec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21668", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18600", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21668\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: react-native-mmkv is a library that allows easy use of MMKV inside React Native applications. Before version 2.11.0, the react-native-mmkv logged the optional encryption key for the MMKV database into the Android system log. The key can be obtained by anyone with access to the Android Debugging Bridge (ADB) if it is enabled in the phone settings. This bug is not present on iOS devices. By logging the encryption secret to the system logs, attackers can trivially recover the secret by enabling ADB and undermining an app's thread model. This issue has been patched in version 2.11.0.\n\ud83d\udccf Published: 2024-01-09T19:05:49.332Z\n\ud83d\udccf Modified: 2025-06-17T14:26:17.894Z\n\ud83d\udd17 References:\n1. https://github.com/mrousavy/react-native-mmkv/security/advisories/GHSA-4jh3-6jhv-2mgp\n2. https://github.com/mrousavy/react-native-mmkv/commit/a8995ccb7184281f7d168bad3e9987c9bd05f00d\n3. https://github.com/mrousavy/react-native-mmkv/releases/tag/v2.11.0", "creation_timestamp": "2025-06-17T14:40:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fbf5dae6-39aa-4d9c-9e93-9d4b67d61cec/export</guid>
      <pubDate>Tue, 17 Jun 2025 14:40:07 +0000</pubDate>
    </item>
  </channel>
</rss>
