<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 16:43:26 +0000</lastBuildDate>
    <item>
      <title>22985096-bfd0-4cf5-9127-bfbc3620210e</title>
      <link>https://vulnerability.circl.lu/sighting/22985096-bfd0-4cf5-9127-bfbc3620210e/export</link>
      <description>{"uuid": "22985096-bfd0-4cf5-9127-bfbc3620210e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39312", "type": "seen", "source": "https://t.me/cvedetector/206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39312 - Botan is a C++ cryptography library. X.509 certifi\", \n  \"Content\": \"CVE ID : CVE-2024-39312 \nPublished : July 8, 2024, 5:15 p.m. | 34\u00a0minutes ago \nDescription : Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. A bug in the parsing of name constraint extensions in X.509 certificates meant that if the extension included both permitted subtrees and excluded subtrees, only the permitted subtree would be checked. If a certificate included a name which was permitted by the permitted subtree but also excluded by excluded subtree, it would be accepted. Fixed in versions 3.5.0 and 2.19.5. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T19:56:00.000000Z"}</description>
      <content:encoded>{"uuid": "22985096-bfd0-4cf5-9127-bfbc3620210e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39312", "type": "seen", "source": "https://t.me/cvedetector/206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39312 - Botan is a C++ cryptography library. X.509 certifi\", \n  \"Content\": \"CVE ID : CVE-2024-39312 \nPublished : July 8, 2024, 5:15 p.m. | 34\u00a0minutes ago \nDescription : Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. A bug in the parsing of name constraint extensions in X.509 certificates meant that if the extension included both permitted subtrees and excluded subtrees, only the permitted subtree would be checked. If a certificate included a name which was permitted by the permitted subtree but also excluded by excluded subtree, it would be accepted. Fixed in versions 3.5.0 and 2.19.5. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T19:56:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/22985096-bfd0-4cf5-9127-bfbc3620210e/export</guid>
      <pubDate>Mon, 08 Jul 2024 19:56:00 +0000</pubDate>
    </item>
    <item>
      <title>ad1a61be-a2f9-470b-90ac-95462849a029</title>
      <link>https://vulnerability.circl.lu/sighting/ad1a61be-a2f9-470b-90ac-95462849a029/export</link>
      <description>{"uuid": "ad1a61be-a2f9-470b-90ac-95462849a029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39312", "type": "seen", "source": "Telegram/lB2tFuHZlESL5UYh_MvL0ZdCO9rG32bleGtwKzDfx5d-x5qR", "content": "", "creation_timestamp": "2025-03-06T02:16:32.000000Z"}</description>
      <content:encoded>{"uuid": "ad1a61be-a2f9-470b-90ac-95462849a029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39312", "type": "seen", "source": "Telegram/lB2tFuHZlESL5UYh_MvL0ZdCO9rG32bleGtwKzDfx5d-x5qR", "content": "", "creation_timestamp": "2025-03-06T02:16:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ad1a61be-a2f9-470b-90ac-95462849a029/export</guid>
      <pubDate>Thu, 06 Mar 2025 02:16:32 +0000</pubDate>
    </item>
  </channel>
</rss>
