<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 21:47:38 +0000</lastBuildDate>
    <item>
      <title>f20a6f18-52d7-4501-a9c7-045e5df972e9</title>
      <link>https://vulnerability.circl.lu/sighting/f20a6f18-52d7-4501-a9c7-045e5df972e9/export</link>
      <description>{"uuid": "f20a6f18-52d7-4501-a9c7-045e5df972e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56196", "type": "seen", "source": "https://t.me/cvedetector/19699", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56196 - Apache Traffic Server Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56196 \nPublished : March 6, 2025, 12:15 p.m. | 1\u00a0hour, 52\u00a0minutes ago \nDescription : Improper Access Control vulnerability in Apache Traffic Server.  \n  \nThis issue affects Apache Traffic Server: from 10.0.0 through 10.0.3.  \n  \nUsers are recommended to upgrade to version 10.0.4, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T15:30:41.000000Z"}</description>
      <content:encoded>{"uuid": "f20a6f18-52d7-4501-a9c7-045e5df972e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56196", "type": "seen", "source": "https://t.me/cvedetector/19699", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56196 - Apache Traffic Server Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56196 \nPublished : March 6, 2025, 12:15 p.m. | 1\u00a0hour, 52\u00a0minutes ago \nDescription : Improper Access Control vulnerability in Apache Traffic Server.  \n  \nThis issue affects Apache Traffic Server: from 10.0.0 through 10.0.3.  \n  \nUsers are recommended to upgrade to version 10.0.4, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T15:30:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f20a6f18-52d7-4501-a9c7-045e5df972e9/export</guid>
      <pubDate>Thu, 06 Mar 2025 15:30:41 +0000</pubDate>
    </item>
    <item>
      <title>1c5b424e-abe7-44b9-a278-ae8ed17aff99</title>
      <link>https://vulnerability.circl.lu/sighting/1c5b424e-abe7-44b9-a278-ae8ed17aff99/export</link>
      <description>{"uuid": "1c5b424e-abe7-44b9-a278-ae8ed17aff99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56196", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljptkycffy2f", "content": "", "creation_timestamp": "2025-03-06T15:44:34.141727Z"}</description>
      <content:encoded>{"uuid": "1c5b424e-abe7-44b9-a278-ae8ed17aff99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56196", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljptkycffy2f", "content": "", "creation_timestamp": "2025-03-06T15:44:34.141727Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1c5b424e-abe7-44b9-a278-ae8ed17aff99/export</guid>
      <pubDate>Thu, 06 Mar 2025 15:44:34 +0000</pubDate>
    </item>
    <item>
      <title>365df756-d8de-493b-b17f-b5209475656b</title>
      <link>https://vulnerability.circl.lu/sighting/365df756-d8de-493b-b17f-b5209475656b/export</link>
      <description>{"uuid": "365df756-d8de-493b-b17f-b5209475656b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56195", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljptkyuatu2q", "content": "", "creation_timestamp": "2025-03-06T15:44:35.168020Z"}</description>
      <content:encoded>{"uuid": "365df756-d8de-493b-b17f-b5209475656b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56195", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljptkyuatu2q", "content": "", "creation_timestamp": "2025-03-06T15:44:35.168020Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/365df756-d8de-493b-b17f-b5209475656b/export</guid>
      <pubDate>Thu, 06 Mar 2025 15:44:35 +0000</pubDate>
    </item>
    <item>
      <title>c7410394-5ca8-441a-96c8-f6cc2d55f1a0</title>
      <link>https://vulnerability.circl.lu/sighting/c7410394-5ca8-441a-96c8-f6cc2d55f1a0/export</link>
      <description>{"uuid": "c7410394-5ca8-441a-96c8-f6cc2d55f1a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56192", "type": "seen", "source": "https://t.me/cvedetector/19980", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56192 - WiLink Notify GScan Event Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56192 \nPublished : March 10, 2025, 9:15 p.m. | 17\u00a0minutes ago \nDescription : In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T23:13:33.000000Z"}</description>
      <content:encoded>{"uuid": "c7410394-5ca8-441a-96c8-f6cc2d55f1a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56192", "type": "seen", "source": "https://t.me/cvedetector/19980", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56192 - WiLink Notify GScan Event Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56192 \nPublished : March 10, 2025, 9:15 p.m. | 17\u00a0minutes ago \nDescription : In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T23:13:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c7410394-5ca8-441a-96c8-f6cc2d55f1a0/export</guid>
      <pubDate>Mon, 10 Mar 2025 23:13:33 +0000</pubDate>
    </item>
    <item>
      <title>e900553d-0171-4ec8-aa15-7855621e9405</title>
      <link>https://vulnerability.circl.lu/sighting/e900553d-0171-4ec8-aa15-7855621e9405/export</link>
      <description>{"uuid": "e900553d-0171-4ec8-aa15-7855621e9405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56191", "type": "seen", "source": "https://t.me/cvedetector/19986", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56191 - D-Link DHD Elevation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2024-56191 \nPublished : March 10, 2025, 9:15 p.m. | 17\u00a0minutes ago \nDescription : In dhd_process_full_gscan_result of dhd_pno.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T23:13:40.000000Z"}</description>
      <content:encoded>{"uuid": "e900553d-0171-4ec8-aa15-7855621e9405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56191", "type": "seen", "source": "https://t.me/cvedetector/19986", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56191 - D-Link DHD Elevation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2024-56191 \nPublished : March 10, 2025, 9:15 p.m. | 17\u00a0minutes ago \nDescription : In dhd_process_full_gscan_result of dhd_pno.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T23:13:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e900553d-0171-4ec8-aa15-7855621e9405/export</guid>
      <pubDate>Mon, 10 Mar 2025 23:13:40 +0000</pubDate>
    </item>
    <item>
      <title>abdfcbe5-01a7-4e8c-b87b-735054074a28</title>
      <link>https://vulnerability.circl.lu/sighting/abdfcbe5-01a7-4e8c-b87b-735054074a28/export</link>
      <description>{"uuid": "abdfcbe5-01a7-4e8c-b87b-735054074a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56191", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2qmorykz2h", "content": "", "creation_timestamp": "2025-03-10T23:51:10.130788Z"}</description>
      <content:encoded>{"uuid": "abdfcbe5-01a7-4e8c-b87b-735054074a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56191", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2qmorykz2h", "content": "", "creation_timestamp": "2025-03-10T23:51:10.130788Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/abdfcbe5-01a7-4e8c-b87b-735054074a28/export</guid>
      <pubDate>Mon, 10 Mar 2025 23:51:10 +0000</pubDate>
    </item>
    <item>
      <title>b0200659-5560-4ab8-92d7-75821678d5d1</title>
      <link>https://vulnerability.circl.lu/sighting/b0200659-5560-4ab8-92d7-75821678d5d1/export</link>
      <description>{"uuid": "b0200659-5560-4ab8-92d7-75821678d5d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56192", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2qmpg7dd2h", "content": "", "creation_timestamp": "2025-03-10T23:51:12.099615Z"}</description>
      <content:encoded>{"uuid": "b0200659-5560-4ab8-92d7-75821678d5d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56192", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2qmpg7dd2h", "content": "", "creation_timestamp": "2025-03-10T23:51:12.099615Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b0200659-5560-4ab8-92d7-75821678d5d1/export</guid>
      <pubDate>Mon, 10 Mar 2025 23:51:12 +0000</pubDate>
    </item>
    <item>
      <title>3ee14b41-92af-46c7-a8f7-3e696a6ab945</title>
      <link>https://vulnerability.circl.lu/sighting/3ee14b41-92af-46c7-a8f7-3e696a6ab945/export</link>
      <description>{"uuid": "3ee14b41-92af-46c7-a8f7-3e696a6ab945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56193", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17657", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56193\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a possible disclosure of Bluetooth adapter details due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-05-27T15:41:27.429Z\n\ud83d\udccf Modified: 2025-05-27T15:41:27.429Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2025-05-01", "creation_timestamp": "2025-05-27T15:49:14.000000Z"}</description>
      <content:encoded>{"uuid": "3ee14b41-92af-46c7-a8f7-3e696a6ab945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56193", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17657", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56193\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a possible disclosure of Bluetooth adapter details due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-05-27T15:41:27.429Z\n\ud83d\udccf Modified: 2025-05-27T15:41:27.429Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2025-05-01", "creation_timestamp": "2025-05-27T15:49:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3ee14b41-92af-46c7-a8f7-3e696a6ab945/export</guid>
      <pubDate>Tue, 27 May 2025 15:49:14 +0000</pubDate>
    </item>
    <item>
      <title>3634aca9-8610-48ee-9818-1f8f30336a97</title>
      <link>https://vulnerability.circl.lu/sighting/3634aca9-8610-48ee-9818-1f8f30336a97/export</link>
      <description>{"uuid": "3634aca9-8610-48ee-9818-1f8f30336a97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56193", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq65wel6lt22", "content": "", "creation_timestamp": "2025-05-27T17:02:24.336441Z"}</description>
      <content:encoded>{"uuid": "3634aca9-8610-48ee-9818-1f8f30336a97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56193", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq65wel6lt22", "content": "", "creation_timestamp": "2025-05-27T17:02:24.336441Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3634aca9-8610-48ee-9818-1f8f30336a97/export</guid>
      <pubDate>Tue, 27 May 2025 17:02:24 +0000</pubDate>
    </item>
    <item>
      <title>67afb179-b973-4259-bea9-03f85301d3da</title>
      <link>https://vulnerability.circl.lu/sighting/67afb179-b973-4259-bea9-03f85301d3da/export</link>
      <description>{"uuid": "67afb179-b973-4259-bea9-03f85301d3da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56190", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxz7leb54j2i", "content": "", "creation_timestamp": "2025-09-04T13:06:12.136894Z"}</description>
      <content:encoded>{"uuid": "67afb179-b973-4259-bea9-03f85301d3da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56190", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxz7leb54j2i", "content": "", "creation_timestamp": "2025-09-04T13:06:12.136894Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/67afb179-b973-4259-bea9-03f85301d3da/export</guid>
      <pubDate>Thu, 04 Sep 2025 13:06:12 +0000</pubDate>
    </item>
  </channel>
</rss>
