<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:19:59 +0000</lastBuildDate>
    <item>
      <title>bd60e91f-1cb7-4ac6-bbf0-945c4720e954</title>
      <link>https://vulnerability.circl.lu/sighting/bd60e91f-1cb7-4ac6-bbf0-945c4720e954/export</link>
      <description>{"uuid": "bd60e91f-1cb7-4ac6-bbf0-945c4720e954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47535", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25193\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Netty, an asynchronous, event-driven network application framework, has a vulnerability in versions up to and including 4.1.118.Final. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. A similar issue was previously reported as CVE-2024-47535. This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. Commit d1fbda62d3a47835d3fb35db8bd42ecc205a5386 contains an updated fix.\n\ud83d\udccf Published: 2025-02-10T22:02:17.197Z\n\ud83d\udccf Modified: 2025-02-21T18:03:38.211Z\n\ud83d\udd17 References:\n1. https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx\n2. https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386", "creation_timestamp": "2025-02-21T18:18:54.000000Z"}</description>
      <content:encoded>{"uuid": "bd60e91f-1cb7-4ac6-bbf0-945c4720e954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47535", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25193\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Netty, an asynchronous, event-driven network application framework, has a vulnerability in versions up to and including 4.1.118.Final. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crash. A similar issue was previously reported as CVE-2024-47535. This issue was fixed, but the fix was incomplete in that null-bytes were not counted against the input limit. Commit d1fbda62d3a47835d3fb35db8bd42ecc205a5386 contains an updated fix.\n\ud83d\udccf Published: 2025-02-10T22:02:17.197Z\n\ud83d\udccf Modified: 2025-02-21T18:03:38.211Z\n\ud83d\udd17 References:\n1. https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx\n2. https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386", "creation_timestamp": "2025-02-21T18:18:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bd60e91f-1cb7-4ac6-bbf0-945c4720e954/export</guid>
      <pubDate>Fri, 21 Feb 2025 18:18:54 +0000</pubDate>
    </item>
    <item>
      <title>f3c72f1a-b84c-4244-bd34-4da8a3a100c0</title>
      <link>https://vulnerability.circl.lu/sighting/f3c72f1a-b84c-4244-bd34-4da8a3a100c0/export</link>
      <description>{"uuid": "f3c72f1a-b84c-4244-bd34-4da8a3a100c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/OoyvOxhDepv_VW-3kj9cRIaGdoLcZyggYa8Ds5zdnxyRhfM", "content": "", "creation_timestamp": "2025-08-12T03:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "f3c72f1a-b84c-4244-bd34-4da8a3a100c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/OoyvOxhDepv_VW-3kj9cRIaGdoLcZyggYa8Ds5zdnxyRhfM", "content": "", "creation_timestamp": "2025-08-12T03:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f3c72f1a-b84c-4244-bd34-4da8a3a100c0/export</guid>
      <pubDate>Tue, 12 Aug 2025 03:00:06 +0000</pubDate>
    </item>
    <item>
      <title>49abe094-14c0-471e-bfa9-86a3ed5bf122</title>
      <link>https://vulnerability.circl.lu/sighting/49abe094-14c0-471e-bfa9-86a3ed5bf122/export</link>
      <description>{"uuid": "49abe094-14c0-471e-bfa9-86a3ed5bf122", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/lGYbLck6G7m7DaRiRxfjxEzwq5qsYzU-Axb6YLGnEcc6ewQ", "content": "", "creation_timestamp": "2025-08-12T21:00:04.000000Z"}</description>
      <content:encoded>{"uuid": "49abe094-14c0-471e-bfa9-86a3ed5bf122", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/lGYbLck6G7m7DaRiRxfjxEzwq5qsYzU-Axb6YLGnEcc6ewQ", "content": "", "creation_timestamp": "2025-08-12T21:00:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/49abe094-14c0-471e-bfa9-86a3ed5bf122/export</guid>
      <pubDate>Tue, 12 Aug 2025 21:00:04 +0000</pubDate>
    </item>
    <item>
      <title>f576be34-f4a6-40f5-9965-ba779392477a</title>
      <link>https://vulnerability.circl.lu/sighting/f576be34-f4a6-40f5-9965-ba779392477a/export</link>
      <description>{"uuid": "f576be34-f4a6-40f5-9965-ba779392477a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/47515", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC of CVE-2025-47533 Clobber RCE\nURL\uff1ahttps://github.com/zs1n/CVE-2024-47533\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-13T01:27:05.000000Z"}</description>
      <content:encoded>{"uuid": "f576be34-f4a6-40f5-9965-ba779392477a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/47515", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC of CVE-2025-47533 Clobber RCE\nURL\uff1ahttps://github.com/zs1n/CVE-2024-47533\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-13T01:27:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f576be34-f4a6-40f5-9965-ba779392477a/export</guid>
      <pubDate>Wed, 13 Aug 2025 01:27:05 +0000</pubDate>
    </item>
    <item>
      <title>e771bbf8-868c-400c-a580-cbf1e8b91a5f</title>
      <link>https://vulnerability.circl.lu/sighting/e771bbf8-868c-400c-a580-cbf1e8b91a5f/export</link>
      <description>{"uuid": "e771bbf8-868c-400c-a580-cbf1e8b91a5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/qrqNXy-LFnDqpCptstXdyMweXak-lAcnoZbxdT5gTxXk4Dg", "content": "", "creation_timestamp": "2025-08-13T09:00:04.000000Z"}</description>
      <content:encoded>{"uuid": "e771bbf8-868c-400c-a580-cbf1e8b91a5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/qrqNXy-LFnDqpCptstXdyMweXak-lAcnoZbxdT5gTxXk4Dg", "content": "", "creation_timestamp": "2025-08-13T09:00:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e771bbf8-868c-400c-a580-cbf1e8b91a5f/export</guid>
      <pubDate>Wed, 13 Aug 2025 09:00:04 +0000</pubDate>
    </item>
    <item>
      <title>aa49307d-56eb-49a2-9df9-58271df4b611</title>
      <link>https://vulnerability.circl.lu/sighting/aa49307d-56eb-49a2-9df9-58271df4b611/export</link>
      <description>{"uuid": "aa49307d-56eb-49a2-9df9-58271df4b611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/qP4ATtXqVjZ2NQNBpFxFUpCqNtRkP8nG37QRNXEozXO3oQg", "content": "", "creation_timestamp": "2025-08-13T11:00:09.000000Z"}</description>
      <content:encoded>{"uuid": "aa49307d-56eb-49a2-9df9-58271df4b611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/qP4ATtXqVjZ2NQNBpFxFUpCqNtRkP8nG37QRNXEozXO3oQg", "content": "", "creation_timestamp": "2025-08-13T11:00:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aa49307d-56eb-49a2-9df9-58271df4b611/export</guid>
      <pubDate>Wed, 13 Aug 2025 11:00:09 +0000</pubDate>
    </item>
    <item>
      <title>9605bfa8-ee0e-4515-ac0a-1562966144d4</title>
      <link>https://vulnerability.circl.lu/sighting/9605bfa8-ee0e-4515-ac0a-1562966144d4/export</link>
      <description>{"uuid": "9605bfa8-ee0e-4515-ac0a-1562966144d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/GOTTM65EgyVoCQGOof2_QgaOPidZDWRgWuC5NvVOBl6NuZQ", "content": "", "creation_timestamp": "2025-08-15T07:00:12.000000Z"}</description>
      <content:encoded>{"uuid": "9605bfa8-ee0e-4515-ac0a-1562966144d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "published-proof-of-concept", "source": "Telegram/GOTTM65EgyVoCQGOof2_QgaOPidZDWRgWuC5NvVOBl6NuZQ", "content": "", "creation_timestamp": "2025-08-15T07:00:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9605bfa8-ee0e-4515-ac0a-1562966144d4/export</guid>
      <pubDate>Fri, 15 Aug 2025 07:00:12 +0000</pubDate>
    </item>
    <item>
      <title>a8773817-572d-4b9d-9ea4-6344c84bb9b1</title>
      <link>https://vulnerability.circl.lu/sighting/a8773817-572d-4b9d-9ea4-6344c84bb9b1/export</link>
      <description>{"uuid": "a8773817-572d-4b9d-9ea4-6344c84bb9b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lz7r6ti2rf2d", "content": "", "creation_timestamp": "2025-09-19T21:02:36.804807Z"}</description>
      <content:encoded>{"uuid": "a8773817-572d-4b9d-9ea4-6344c84bb9b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47533", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lz7r6ti2rf2d", "content": "", "creation_timestamp": "2025-09-19T21:02:36.804807Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a8773817-572d-4b9d-9ea4-6344c84bb9b1/export</guid>
      <pubDate>Fri, 19 Sep 2025 21:02:36 +0000</pubDate>
    </item>
    <item>
      <title>564aa8c3-3e46-4a6f-94ad-82d5b3a293c2</title>
      <link>https://vulnerability.circl.lu/sighting/564aa8c3-3e46-4a6f-94ad-82d5b3a293c2/export</link>
      <description>{"uuid": "564aa8c3-3e46-4a6f-94ad-82d5b3a293c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47535", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeux6e4m24", "content": "", "creation_timestamp": "2025-09-30T01:31:29.147842Z"}</description>
      <content:encoded>{"uuid": "564aa8c3-3e46-4a6f-94ad-82d5b3a293c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47535", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lzzeux6e4m24", "content": "", "creation_timestamp": "2025-09-30T01:31:29.147842Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/564aa8c3-3e46-4a6f-94ad-82d5b3a293c2/export</guid>
      <pubDate>Tue, 30 Sep 2025 01:31:29 +0000</pubDate>
    </item>
    <item>
      <title>130d984e-29d9-4360-a1fb-4d8328a28067</title>
      <link>https://vulnerability.circl.lu/sighting/130d984e-29d9-4360-a1fb-4d8328a28067/export</link>
      <description>{"uuid": "130d984e-29d9-4360-a1fb-4d8328a28067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47535", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3m326cbqdaj24", "content": "", "creation_timestamp": "2025-10-13T02:31:30.816047Z"}</description>
      <content:encoded>{"uuid": "130d984e-29d9-4360-a1fb-4d8328a28067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47535", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3m326cbqdaj24", "content": "", "creation_timestamp": "2025-10-13T02:31:30.816047Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/130d984e-29d9-4360-a1fb-4d8328a28067/export</guid>
      <pubDate>Mon, 13 Oct 2025 02:31:30 +0000</pubDate>
    </item>
  </channel>
</rss>
