<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:26:21 +0000</lastBuildDate>
    <item>
      <title>80b8548b-78ec-4021-9979-fa766b29acb6</title>
      <link>https://vulnerability.circl.lu/sighting/80b8548b-78ec-4021-9979-fa766b29acb6/export</link>
      <description>{"uuid": "80b8548b-78ec-4021-9979-fa766b29acb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54125", "type": "seen", "source": "https://t.me/cvedetector/13068", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54125 - Shonen Jump+ App for Android Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-54125 \nPublished : Dec. 17, 2024, 6:15 a.m. | 43\u00a0minutes ago \nDescription : Improper authorization in handler for custom URL scheme issue in \"Shonen Jump+\" App for Android versions prior to 4.0.0 allows an attacker to lead a user to access an arbitrary website via the vulnerable App. As a result, the user may become a victim of a phishing attack. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T08:25:16.000000Z"}</description>
      <content:encoded>{"uuid": "80b8548b-78ec-4021-9979-fa766b29acb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54125", "type": "seen", "source": "https://t.me/cvedetector/13068", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54125 - Shonen Jump+ App for Android Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-54125 \nPublished : Dec. 17, 2024, 6:15 a.m. | 43\u00a0minutes ago \nDescription : Improper authorization in handler for custom URL scheme issue in \"Shonen Jump+\" App for Android versions prior to 4.0.0 allows an attacker to lead a user to access an arbitrary website via the vulnerable App. As a result, the user may become a victim of a phishing attack. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T08:25:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/80b8548b-78ec-4021-9979-fa766b29acb6/export</guid>
      <pubDate>Tue, 17 Dec 2024 08:25:16 +0000</pubDate>
    </item>
    <item>
      <title>e908fdac-2fa0-49ba-a226-d446066dafbe</title>
      <link>https://vulnerability.circl.lu/sighting/e908fdac-2fa0-49ba-a226-d446066dafbe/export</link>
      <description>{"uuid": "e908fdac-2fa0-49ba-a226-d446066dafbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54120", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7757etfh25", "content": "", "creation_timestamp": "2025-01-08T03:15:34.659641Z"}</description>
      <content:encoded>{"uuid": "e908fdac-2fa0-49ba-a226-d446066dafbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54120", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7757etfh25", "content": "", "creation_timestamp": "2025-01-08T03:15:34.659641Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e908fdac-2fa0-49ba-a226-d446066dafbe/export</guid>
      <pubDate>Wed, 08 Jan 2025 03:15:34 +0000</pubDate>
    </item>
    <item>
      <title>1cc7ebd6-63e8-4e37-bf4d-d9996344b79d</title>
      <link>https://vulnerability.circl.lu/sighting/1cc7ebd6-63e8-4e37-bf4d-d9996344b79d/export</link>
      <description>{"uuid": "1cc7ebd6-63e8-4e37-bf4d-d9996344b79d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790627139586478", "content": "", "creation_timestamp": "2025-01-08T03:32:58.005442Z"}</description>
      <content:encoded>{"uuid": "1cc7ebd6-63e8-4e37-bf4d-d9996344b79d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790627139586478", "content": "", "creation_timestamp": "2025-01-08T03:32:58.005442Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1cc7ebd6-63e8-4e37-bf4d-d9996344b79d/export</guid>
      <pubDate>Wed, 08 Jan 2025 03:32:58 +0000</pubDate>
    </item>
    <item>
      <title>ebf46cfb-6e34-462b-8f27-512f866ac7c2</title>
      <link>https://vulnerability.circl.lu/sighting/ebf46cfb-6e34-462b-8f27-512f866ac7c2/export</link>
      <description>{"uuid": "ebf46cfb-6e34-462b-8f27-512f866ac7c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/615", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54121\n\ud83d\udd39 Description: Startup control vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2025-01-08T03:24:36.500Z\n\ud83d\udccf Modified: 2025-01-08T03:24:36.500Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:38:07.000000Z"}</description>
      <content:encoded>{"uuid": "ebf46cfb-6e34-462b-8f27-512f866ac7c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/615", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54121\n\ud83d\udd39 Description: Startup control vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2025-01-08T03:24:36.500Z\n\ud83d\udccf Modified: 2025-01-08T03:24:36.500Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:38:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ebf46cfb-6e34-462b-8f27-512f866ac7c2/export</guid>
      <pubDate>Wed, 08 Jan 2025 03:38:07 +0000</pubDate>
    </item>
    <item>
      <title>f43da63f-3ce6-42d2-934f-412e0e8535df</title>
      <link>https://vulnerability.circl.lu/sighting/f43da63f-3ce6-42d2-934f-412e0e8535df/export</link>
      <description>{"uuid": "f43da63f-3ce6-42d2-934f-412e0e8535df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54120", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/636", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54120\n\ud83d\udd39 Description: Race condition vulnerability in the distributed notification module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2025-01-08T02:27:52.416Z\n\ud83d\udccf Modified: 2025-01-08T02:27:52.416Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:41:08.000000Z"}</description>
      <content:encoded>{"uuid": "f43da63f-3ce6-42d2-934f-412e0e8535df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54120", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/636", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54120\n\ud83d\udd39 Description: Race condition vulnerability in the distributed notification module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2025-01-08T02:27:52.416Z\n\ud83d\udccf Modified: 2025-01-08T02:27:52.416Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:41:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f43da63f-3ce6-42d2-934f-412e0e8535df/export</guid>
      <pubDate>Wed, 08 Jan 2025 03:41:08 +0000</pubDate>
    </item>
    <item>
      <title>1fd465dd-d659-4e28-8069-f5043f9487b2</title>
      <link>https://vulnerability.circl.lu/sighting/1fd465dd-d659-4e28-8069-f5043f9487b2/export</link>
      <description>{"uuid": "1fd465dd-d659-4e28-8069-f5043f9487b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54120", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7bapse6c25", "content": "", "creation_timestamp": "2025-01-08T03:53:21.290979Z"}</description>
      <content:encoded>{"uuid": "1fd465dd-d659-4e28-8069-f5043f9487b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54120", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7bapse6c25", "content": "", "creation_timestamp": "2025-01-08T03:53:21.290979Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1fd465dd-d659-4e28-8069-f5043f9487b2/export</guid>
      <pubDate>Wed, 08 Jan 2025 03:53:21 +0000</pubDate>
    </item>
    <item>
      <title>62590e1b-9568-437e-9be5-dc30fb372a1e</title>
      <link>https://vulnerability.circl.lu/sighting/62590e1b-9568-437e-9be5-dc30fb372a1e/export</link>
      <description>{"uuid": "62590e1b-9568-437e-9be5-dc30fb372a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7cj465lo25", "content": "", "creation_timestamp": "2025-01-08T04:15:55.222153Z"}</description>
      <content:encoded>{"uuid": "62590e1b-9568-437e-9be5-dc30fb372a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7cj465lo25", "content": "", "creation_timestamp": "2025-01-08T04:15:55.222153Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/62590e1b-9568-437e-9be5-dc30fb372a1e/export</guid>
      <pubDate>Wed, 08 Jan 2025 04:15:55 +0000</pubDate>
    </item>
    <item>
      <title>4b5d78a0-93cc-4496-80b8-09b58e6c8aca</title>
      <link>https://vulnerability.circl.lu/sighting/4b5d78a0-93cc-4496-80b8-09b58e6c8aca/export</link>
      <description>{"uuid": "4b5d78a0-93cc-4496-80b8-09b58e6c8aca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54120", "type": "seen", "source": "https://t.me/cvedetector/14631", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54120 - Apache Distributed Notification Service Race Condition Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54120 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Race condition vulnerability in the distributed notification module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:33.000000Z"}</description>
      <content:encoded>{"uuid": "4b5d78a0-93cc-4496-80b8-09b58e6c8aca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54120", "type": "seen", "source": "https://t.me/cvedetector/14631", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54120 - Apache Distributed Notification Service Race Condition Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54120 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Race condition vulnerability in the distributed notification module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4b5d78a0-93cc-4496-80b8-09b58e6c8aca/export</guid>
      <pubDate>Wed, 08 Jan 2025 04:56:33 +0000</pubDate>
    </item>
    <item>
      <title>955b612b-d581-41eb-90e1-288e70be495b</title>
      <link>https://vulnerability.circl.lu/sighting/955b612b-d581-41eb-90e1-288e70be495b/export</link>
      <description>{"uuid": "955b612b-d581-41eb-90e1-288e70be495b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4nrzlg2u", "content": "", "creation_timestamp": "2025-01-08T05:38:27.875841Z"}</description>
      <content:encoded>{"uuid": "955b612b-d581-41eb-90e1-288e70be495b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4nrzlg2u", "content": "", "creation_timestamp": "2025-01-08T05:38:27.875841Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/955b612b-d581-41eb-90e1-288e70be495b/export</guid>
      <pubDate>Wed, 08 Jan 2025 05:38:27 +0000</pubDate>
    </item>
    <item>
      <title>a1db1c88-b98a-48cd-93f2-29e2493f2187</title>
      <link>https://vulnerability.circl.lu/sighting/a1db1c88-b98a-48cd-93f2-29e2493f2187/export</link>
      <description>{"uuid": "a1db1c88-b98a-48cd-93f2-29e2493f2187", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://t.me/cvedetector/14641", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54121 - Oracle Ability Startup Control Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54121 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Startup control vulnerability in the ability module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:45.000000Z"}</description>
      <content:encoded>{"uuid": "a1db1c88-b98a-48cd-93f2-29e2493f2187", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54121", "type": "seen", "source": "https://t.me/cvedetector/14641", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54121 - Oracle Ability Startup Control Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54121 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Startup control vulnerability in the ability module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a1db1c88-b98a-48cd-93f2-29e2493f2187/export</guid>
      <pubDate>Wed, 08 Jan 2025 05:46:45 +0000</pubDate>
    </item>
  </channel>
</rss>
