<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:31:31 +0000</lastBuildDate>
    <item>
      <title>95aa171c-d323-4e93-ab3c-33453236468a</title>
      <link>https://vulnerability.circl.lu/sighting/95aa171c-d323-4e93-ab3c-33453236468a/export</link>
      <description>{"uuid": "95aa171c-d323-4e93-ab3c-33453236468a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56184", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7232", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56184\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-03-10T18:19:48.793Z\n\ud83d\udccf Modified: 2025-03-11T20:26:59.078Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2025-03-01", "creation_timestamp": "2025-03-11T20:41:27.000000Z"}</description>
      <content:encoded>{"uuid": "95aa171c-d323-4e93-ab3c-33453236468a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56184", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7232", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56184\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In static long dev_send of tipc_dev_ql, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-03-10T18:19:48.793Z\n\ud83d\udccf Modified: 2025-03-11T20:26:59.078Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2025-03-01", "creation_timestamp": "2025-03-11T20:41:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/95aa171c-d323-4e93-ab3c-33453236468a/export</guid>
      <pubDate>Tue, 11 Mar 2025 20:41:27 +0000</pubDate>
    </item>
    <item>
      <title>0a7a700e-0912-4a1c-8a7a-5af0384596d5</title>
      <link>https://vulnerability.circl.lu/sighting/0a7a700e-0912-4a1c-8a7a-5af0384596d5/export</link>
      <description>{"uuid": "0a7a700e-0912-4a1c-8a7a-5af0384596d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56181", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-11", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "0a7a700e-0912-4a1c-8a7a-5af0384596d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56181", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-11", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0a7a700e-0912-4a1c-8a7a-5af0384596d5/export</guid>
      <pubDate>Thu, 13 Mar 2025 11:00:00 +0000</pubDate>
    </item>
    <item>
      <title>001408a0-e640-4ae0-ad33-bc3bb4c3ee5b</title>
      <link>https://vulnerability.circl.lu/sighting/001408a0-e640-4ae0-ad33-bc3bb4c3ee5b/export</link>
      <description>{"uuid": "001408a0-e640-4ae0-ad33-bc3bb4c3ee5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56182", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-11", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "001408a0-e640-4ae0-ad33-bc3bb4c3ee5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56182", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-11", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/001408a0-e640-4ae0-ad33-bc3bb4c3ee5b/export</guid>
      <pubDate>Thu, 13 Mar 2025 11:00:00 +0000</pubDate>
    </item>
    <item>
      <title>0214d252-1738-43ff-9d50-b1ebe3dbea37</title>
      <link>https://vulnerability.circl.lu/sighting/0214d252-1738-43ff-9d50-b1ebe3dbea37/export</link>
      <description>{"uuid": "0214d252-1738-43ff-9d50-b1ebe3dbea37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56180", "type": "seen", "source": "https://gist.github.com/somprasongd/7e70d4aeffa65e3b65b61db9baeb480f", "content": "", "creation_timestamp": "2025-04-24T02:01:18.000000Z"}</description>
      <content:encoded>{"uuid": "0214d252-1738-43ff-9d50-b1ebe3dbea37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56180", "type": "seen", "source": "https://gist.github.com/somprasongd/7e70d4aeffa65e3b65b61db9baeb480f", "content": "", "creation_timestamp": "2025-04-24T02:01:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0214d252-1738-43ff-9d50-b1ebe3dbea37/export</guid>
      <pubDate>Thu, 24 Apr 2025 02:01:18 +0000</pubDate>
    </item>
    <item>
      <title>6cdd6286-bdca-4ba3-a870-be27c57cefdf</title>
      <link>https://vulnerability.circl.lu/sighting/6cdd6286-bdca-4ba3-a870-be27c57cefdf/export</link>
      <description>{"uuid": "6cdd6286-bdca-4ba3-a870-be27c57cefdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56181", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17906", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56181\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC IPC BX-21A (All versions &amp;lt; V31.01.07), SIMATIC IPC BX-32A (All versions &amp;lt; V29.01.07), SIMATIC IPC BX-39A (All versions &amp;lt; V29.01.07), SIMATIC IPC BX-59A (All versions &amp;lt; V32.01.04), SIMATIC IPC PX-32A (All versions &amp;lt; V29.01.07), SIMATIC IPC PX-39A (All versions &amp;lt; V29.01.07), SIMATIC IPC PX-39A PRO (All versions &amp;lt; V29.01.07), SIMATIC IPC RC-543A (All versions), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC RW-543B (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC\u00a0IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions &amp;lt; V25.02.15), SIMATIC IPC647E (All versions &amp;lt; V25.02.15), SIMATIC IPC677E (All versions &amp;lt; V25.02.15), SIMATIC IPC847E (All versions &amp;lt; V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to alter the secure boot configuration without proper authorization by directly communicate with the flash controller.\n\ud83d\udccf Published: 2025-03-11T09:48:03.703Z\n\ud83d\udccf Modified: 2025-06-10T15:17:19.512Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-216014.html", "creation_timestamp": "2025-06-10T15:31:06.000000Z"}</description>
      <content:encoded>{"uuid": "6cdd6286-bdca-4ba3-a870-be27c57cefdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56181", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17906", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56181\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC IPC BX-21A (All versions &amp;lt; V31.01.07), SIMATIC IPC BX-32A (All versions &amp;lt; V29.01.07), SIMATIC IPC BX-39A (All versions &amp;lt; V29.01.07), SIMATIC IPC BX-59A (All versions &amp;lt; V32.01.04), SIMATIC IPC PX-32A (All versions &amp;lt; V29.01.07), SIMATIC IPC PX-39A (All versions &amp;lt; V29.01.07), SIMATIC IPC PX-39A PRO (All versions &amp;lt; V29.01.07), SIMATIC IPC RC-543A (All versions), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC RW-543B (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC\u00a0IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions &amp;lt; V25.02.15), SIMATIC IPC647E (All versions &amp;lt; V25.02.15), SIMATIC IPC677E (All versions &amp;lt; V25.02.15), SIMATIC IPC847E (All versions &amp;lt; V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to alter the secure boot configuration without proper authorization by directly communicate with the flash controller.\n\ud83d\udccf Published: 2025-03-11T09:48:03.703Z\n\ud83d\udccf Modified: 2025-06-10T15:17:19.512Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-216014.html", "creation_timestamp": "2025-06-10T15:31:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6cdd6286-bdca-4ba3-a870-be27c57cefdf/export</guid>
      <pubDate>Tue, 10 Jun 2025 15:31:06 +0000</pubDate>
    </item>
    <item>
      <title>393692b1-aad8-4d42-b875-ba462dfdb073</title>
      <link>https://vulnerability.circl.lu/sighting/393692b1-aad8-4d42-b875-ba462dfdb073/export</link>
      <description>{"uuid": "393692b1-aad8-4d42-b875-ba462dfdb073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56182", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17905", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56182\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All versions &amp;lt; V26.01.12), SIMATIC IPC BX-21A (All versions &amp;lt; V31.01.07), SIMATIC IPC BX-32A (All versions &amp;lt; V29.01.07), SIMATIC IPC BX-39A (All versions &amp;lt; V29.01.07), SIMATIC IPC BX-59A (All versions &amp;lt; V32.01.04), SIMATIC IPC PX-32A (All versions &amp;lt; V29.01.07), SIMATIC IPC PX-39A (All versions &amp;lt; V29.01.07), SIMATIC IPC PX-39A PRO (All versions &amp;lt; V29.01.07), SIMATIC IPC RC-543A (All versions), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC RW-543B (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC\u00a0IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions &amp;lt; V25.02.15), SIMATIC IPC647E (All versions &amp;lt; V25.02.15), SIMATIC IPC677E (All versions &amp;lt; V25.02.15), SIMATIC IPC847E (All versions &amp;lt; V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to disable the BIOS password without proper authorization by directly communicate with the flash controller.\n\ud83d\udccf Published: 2025-03-11T09:48:05.319Z\n\ud83d\udccf Modified: 2025-06-10T15:17:20.999Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-216014.html", "creation_timestamp": "2025-06-10T15:31:06.000000Z"}</description>
      <content:encoded>{"uuid": "393692b1-aad8-4d42-b875-ba462dfdb073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56182", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17905", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56182\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All versions &amp;lt; V26.01.12), SIMATIC IPC BX-21A (All versions &amp;lt; V31.01.07), SIMATIC IPC BX-32A (All versions &amp;lt; V29.01.07), SIMATIC IPC BX-39A (All versions &amp;lt; V29.01.07), SIMATIC IPC BX-59A (All versions &amp;lt; V32.01.04), SIMATIC IPC PX-32A (All versions &amp;lt; V29.01.07), SIMATIC IPC PX-39A (All versions &amp;lt; V29.01.07), SIMATIC IPC PX-39A PRO (All versions &amp;lt; V29.01.07), SIMATIC IPC RC-543A (All versions), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC RW-543B (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC\u00a0IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions &amp;lt; V25.02.15), SIMATIC IPC647E (All versions &amp;lt; V25.02.15), SIMATIC IPC677E (All versions &amp;lt; V25.02.15), SIMATIC IPC847E (All versions &amp;lt; V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to disable the BIOS password without proper authorization by directly communicate with the flash controller.\n\ud83d\udccf Published: 2025-03-11T09:48:05.319Z\n\ud83d\udccf Modified: 2025-06-10T15:17:20.999Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-216014.html", "creation_timestamp": "2025-06-10T15:31:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/393692b1-aad8-4d42-b875-ba462dfdb073/export</guid>
      <pubDate>Tue, 10 Jun 2025 15:31:06 +0000</pubDate>
    </item>
    <item>
      <title>1287b603-3f86-4129-b77f-c74ed9896356</title>
      <link>https://vulnerability.circl.lu/sighting/1287b603-3f86-4129-b77f-c74ed9896356/export</link>
      <description>{"uuid": "1287b603-3f86-4129-b77f-c74ed9896356", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56186", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}</description>
      <content:encoded>{"uuid": "1287b603-3f86-4129-b77f-c74ed9896356", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56186", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1287b603-3f86-4129-b77f-c74ed9896356/export</guid>
      <pubDate>Sat, 16 Aug 2025 01:45:14 +0000</pubDate>
    </item>
    <item>
      <title>a5c09b47-38af-49a4-9999-f644bd032077</title>
      <link>https://vulnerability.circl.lu/sighting/a5c09b47-38af-49a4-9999-f644bd032077/export</link>
      <description>{"uuid": "a5c09b47-38af-49a4-9999-f644bd032077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56186", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:32.000000Z"}</description>
      <content:encoded>{"uuid": "a5c09b47-38af-49a4-9999-f644bd032077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56186", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a5c09b47-38af-49a4-9999-f644bd032077/export</guid>
      <pubDate>Tue, 19 Aug 2025 04:06:32 +0000</pubDate>
    </item>
    <item>
      <title>30beea8e-2b2b-4bfa-909c-643d784ffd6a</title>
      <link>https://vulnerability.circl.lu/sighting/30beea8e-2b2b-4bfa-909c-643d784ffd6a/export</link>
      <description>{"uuid": "30beea8e-2b2b-4bfa-909c-643d784ffd6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56189", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxz7cftn7x2d", "content": "", "creation_timestamp": "2025-09-04T13:01:11.846045Z"}</description>
      <content:encoded>{"uuid": "30beea8e-2b2b-4bfa-909c-643d784ffd6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56189", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxz7cftn7x2d", "content": "", "creation_timestamp": "2025-09-04T13:01:11.846045Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/30beea8e-2b2b-4bfa-909c-643d784ffd6a/export</guid>
      <pubDate>Thu, 04 Sep 2025 13:01:11 +0000</pubDate>
    </item>
    <item>
      <title>1dea6136-adf3-46b7-a77f-fb2bd0f30a32</title>
      <link>https://vulnerability.circl.lu/sighting/1dea6136-adf3-46b7-a77f-fb2bd0f30a32/export</link>
      <description>{"uuid": "1dea6136-adf3-46b7-a77f-fb2bd0f30a32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-56180", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "1dea6136-adf3-46b7-a77f-fb2bd0f30a32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-56180", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1dea6136-adf3-46b7-a77f-fb2bd0f30a32/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
