<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 13:43:32 +0000</lastBuildDate>
    <item>
      <title>43746a68-5939-45e0-bc09-49b79521e21f</title>
      <link>https://vulnerability.circl.lu/sighting/43746a68-5939-45e0-bc09-49b79521e21f/export</link>
      <description>{"uuid": "43746a68-5939-45e0-bc09-49b79521e21f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7625", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aAnother CVE-2024-24590 poc\nURL\uff1ahttps://github.com/pandahacker2763/CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-12T15:09:07.000000Z"}</description>
      <content:encoded>{"uuid": "43746a68-5939-45e0-bc09-49b79521e21f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7625", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aAnother CVE-2024-24590 poc\nURL\uff1ahttps://github.com/pandahacker2763/CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-12T15:09:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/43746a68-5939-45e0-bc09-49b79521e21f/export</guid>
      <pubDate>Wed, 12 Jun 2024 15:09:07 +0000</pubDate>
    </item>
    <item>
      <title>dca3831f-2c1d-4aa7-8d8b-1ac27f6504df</title>
      <link>https://vulnerability.circl.lu/sighting/dca3831f-2c1d-4aa7-8d8b-1ac27f6504df/export</link>
      <description>{"uuid": "dca3831f-2c1d-4aa7-8d8b-1ac27f6504df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7626", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aAnother CVE-2024-24590 poc\nURL\uff1ahttps://github.com/DemonPandaz2763/CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-12T15:21:43.000000Z"}</description>
      <content:encoded>{"uuid": "dca3831f-2c1d-4aa7-8d8b-1ac27f6504df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7626", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aAnother CVE-2024-24590 poc\nURL\uff1ahttps://github.com/DemonPandaz2763/CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-12T15:21:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dca3831f-2c1d-4aa7-8d8b-1ac27f6504df/export</guid>
      <pubDate>Wed, 12 Jun 2024 15:21:43 +0000</pubDate>
    </item>
    <item>
      <title>37db620e-0020-47f9-a4bc-c6e45dfe197a</title>
      <link>https://vulnerability.circl.lu/sighting/37db620e-0020-47f9-a4bc-c6e45dfe197a/export</link>
      <description>{"uuid": "37db620e-0020-47f9-a4bc-c6e45dfe197a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7642", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof of concept for CVE-2024-24590\nURL\uff1ahttps://github.com/OxyDeV2/ClearML-CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-13T11:42:33.000000Z"}</description>
      <content:encoded>{"uuid": "37db620e-0020-47f9-a4bc-c6e45dfe197a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7642", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof of concept for CVE-2024-24590\nURL\uff1ahttps://github.com/OxyDeV2/ClearML-CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-13T11:42:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/37db620e-0020-47f9-a4bc-c6e45dfe197a/export</guid>
      <pubDate>Thu, 13 Jun 2024 11:42:33 +0000</pubDate>
    </item>
    <item>
      <title>fc3e3ab9-59cf-4d68-a151-d7ddcb7deb81</title>
      <link>https://vulnerability.circl.lu/sighting/fc3e3ab9-59cf-4d68-a151-d7ddcb7deb81/export</link>
      <description>{"uuid": "fc3e3ab9-59cf-4d68-a151-d7ddcb7deb81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7661", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC (RCE &amp;amp; CMD) FOR CVE-2024-24590 CLEARML\nURL\uff1ahttps://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-15T10:04:26.000000Z"}</description>
      <content:encoded>{"uuid": "fc3e3ab9-59cf-4d68-a151-d7ddcb7deb81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7661", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC (RCE &amp;amp; CMD) FOR CVE-2024-24590 CLEARML\nURL\uff1ahttps://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-15T10:04:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fc3e3ab9-59cf-4d68-a151-d7ddcb7deb81/export</guid>
      <pubDate>Sat, 15 Jun 2024 10:04:26 +0000</pubDate>
    </item>
    <item>
      <title>cac97a34-0637-4a13-99cb-50d8c08316b3</title>
      <link>https://vulnerability.circl.lu/sighting/cac97a34-0637-4a13-99cb-50d8c08316b3/export</link>
      <description>{"uuid": "cac97a34-0637-4a13-99cb-50d8c08316b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7662", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aCVE-2024-24590 ClearML RCE&amp;amp;CMD POC\nURL\uff1ahttps://github.com/Hackhoven/Magento-RCE\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-06-15T13:04:13.000000Z"}</description>
      <content:encoded>{"uuid": "cac97a34-0637-4a13-99cb-50d8c08316b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7662", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aCVE-2024-24590 ClearML RCE&amp;amp;CMD POC\nURL\uff1ahttps://github.com/Hackhoven/Magento-RCE\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-06-15T13:04:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cac97a34-0637-4a13-99cb-50d8c08316b3/export</guid>
      <pubDate>Sat, 15 Jun 2024 13:04:13 +0000</pubDate>
    </item>
    <item>
      <title>7549c1ae-d43a-4004-9c6e-75b7c40e260a</title>
      <link>https://vulnerability.circl.lu/sighting/7549c1ae-d43a-4004-9c6e-75b7c40e260a/export</link>
      <description>{"uuid": "7549c1ae-d43a-4004-9c6e-75b7c40e260a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2682", "content": "https://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC\n\nClearML Exploit Script\n#github #exploit", "creation_timestamp": "2024-06-17T17:57:27.000000Z"}</description>
      <content:encoded>{"uuid": "7549c1ae-d43a-4004-9c6e-75b7c40e260a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2682", "content": "https://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC\n\nClearML Exploit Script\n#github #exploit", "creation_timestamp": "2024-06-17T17:57:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7549c1ae-d43a-4004-9c6e-75b7c40e260a/export</guid>
      <pubDate>Mon, 17 Jun 2024 17:57:27 +0000</pubDate>
    </item>
    <item>
      <title>04446cfa-dd62-4b6c-9a56-6d022c23d9eb</title>
      <link>https://vulnerability.circl.lu/sighting/04446cfa-dd62-4b6c-9a56-6d022c23d9eb/export</link>
      <description>{"uuid": "04446cfa-dd62-4b6c-9a56-6d022c23d9eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7997", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aHere is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D\nURL\uff1ahttps://github.com/HexDoesRandomShit/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-07-16T15:26:20.000000Z"}</description>
      <content:encoded>{"uuid": "04446cfa-dd62-4b6c-9a56-6d022c23d9eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7997", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aHere is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D\nURL\uff1ahttps://github.com/HexDoesRandomShit/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-07-16T15:26:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/04446cfa-dd62-4b6c-9a56-6d022c23d9eb/export</guid>
      <pubDate>Tue, 16 Jul 2024 15:26:20 +0000</pubDate>
    </item>
    <item>
      <title>27de1b54-49ca-4b10-9994-fc0dc38f8644</title>
      <link>https://vulnerability.circl.lu/sighting/27de1b54-49ca-4b10-9994-fc0dc38f8644/export</link>
      <description>{"uuid": "27de1b54-49ca-4b10-9994-fc0dc38f8644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8038", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWith this script you can exploit the CVE-2024-24590\nURL\uff1ahttps://github.com/sviim/Clearml-CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-21T04:28:47.000000Z"}</description>
      <content:encoded>{"uuid": "27de1b54-49ca-4b10-9994-fc0dc38f8644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8038", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWith this script you can exploit the CVE-2024-24590\nURL\uff1ahttps://github.com/sviim/Clearml-CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-21T04:28:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/27de1b54-49ca-4b10-9994-fc0dc38f8644/export</guid>
      <pubDate>Sun, 21 Jul 2024 04:28:47 +0000</pubDate>
    </item>
    <item>
      <title>d8e87ed2-4ebe-4ea0-ba18-8775d78b1dde</title>
      <link>https://vulnerability.circl.lu/sighting/d8e87ed2-4ebe-4ea0-ba18-8775d78b1dde/export</link>
      <description>{"uuid": "d8e87ed2-4ebe-4ea0-ba18-8775d78b1dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8040", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWith this script you can exploit the CVE-2024-24590\nURL\uff1ahttps://github.com/sviim/ClearML-CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-21T04:57:41.000000Z"}</description>
      <content:encoded>{"uuid": "d8e87ed2-4ebe-4ea0-ba18-8775d78b1dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8040", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWith this script you can exploit the CVE-2024-24590\nURL\uff1ahttps://github.com/sviim/ClearML-CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-21T04:57:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d8e87ed2-4ebe-4ea0-ba18-8775d78b1dde/export</guid>
      <pubDate>Sun, 21 Jul 2024 04:57:41 +0000</pubDate>
    </item>
    <item>
      <title>4ef5d7f4-5f74-4ebe-b699-fd6b942ea685</title>
      <link>https://vulnerability.circl.lu/sighting/4ef5d7f4-5f74-4ebe-b699-fd6b942ea685/export</link>
      <description>{"uuid": "4ef5d7f4-5f74-4ebe-b699-fd6b942ea685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24593", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18601", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24593\n\ud83d\udd25 CVSS Score: 9.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A cross-site request forgery (CSRF) vulnerability in all versions up to 1.14.1 of the api server component of Allegro AI\u2019s ClearML platform allows a remote attacker to impersonate a user by sending API requests via maliciously crafted html. Exploitation of the vulnerability allows an attacker to compromise confidential workspaces and files, leak sensitive information, and target instances of the ClearML platform within closed off networks.\n\n\ud83d\udccf Published: 2024-02-06T14:41:44.470Z\n\ud83d\udccf Modified: 2025-06-17T14:25:25.374Z\n\ud83d\udd17 References:\n1. https://hiddenlayer.com/research/not-so-clear-how-mlops-solutions-can-muddy-the-waters-of-your-supply-chain/", "creation_timestamp": "2025-06-17T14:40:11.000000Z"}</description>
      <content:encoded>{"uuid": "4ef5d7f4-5f74-4ebe-b699-fd6b942ea685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24593", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18601", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24593\n\ud83d\udd25 CVSS Score: 9.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A cross-site request forgery (CSRF) vulnerability in all versions up to 1.14.1 of the api server component of Allegro AI\u2019s ClearML platform allows a remote attacker to impersonate a user by sending API requests via maliciously crafted html. Exploitation of the vulnerability allows an attacker to compromise confidential workspaces and files, leak sensitive information, and target instances of the ClearML platform within closed off networks.\n\n\ud83d\udccf Published: 2024-02-06T14:41:44.470Z\n\ud83d\udccf Modified: 2025-06-17T14:25:25.374Z\n\ud83d\udd17 References:\n1. https://hiddenlayer.com/research/not-so-clear-how-mlops-solutions-can-muddy-the-waters-of-your-supply-chain/", "creation_timestamp": "2025-06-17T14:40:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4ef5d7f4-5f74-4ebe-b699-fd6b942ea685/export</guid>
      <pubDate>Tue, 17 Jun 2025 14:40:11 +0000</pubDate>
    </item>
  </channel>
</rss>
