<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 10:37:48 +0000</lastBuildDate>
    <item>
      <title>28b92013-c3be-4916-9ac4-c5bd3eb4e168</title>
      <link>https://vulnerability.circl.lu/sighting/28b92013-c3be-4916-9ac4-c5bd3eb4e168/export</link>
      <description>{"uuid": "28b92013-c3be-4916-9ac4-c5bd3eb4e168", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2887", "type": "seen", "source": "https://t.me/cvedetector/21344", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2887 - Apache Target Rollback Detection Vulnerability (Client Side Attack)\", \n  \"Content\": \"CVE ID : CVE-2025-2887 \nPublished : March 27, 2025, 11:15 p.m. | 38\u00a0minutes ago \nDescription : During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T01:01:07.000000Z"}</description>
      <content:encoded>{"uuid": "28b92013-c3be-4916-9ac4-c5bd3eb4e168", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2887", "type": "seen", "source": "https://t.me/cvedetector/21344", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2887 - Apache Target Rollback Detection Vulnerability (Client Side Attack)\", \n  \"Content\": \"CVE ID : CVE-2025-2887 \nPublished : March 27, 2025, 11:15 p.m. | 38\u00a0minutes ago \nDescription : During a target rollback, the client fails to detect the rollback for delegated targets. This could cause the client to fetch a target from an incorrect source, altering the target contents. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T01:01:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/28b92013-c3be-4916-9ac4-c5bd3eb4e168/export</guid>
      <pubDate>Fri, 28 Mar 2025 01:01:07 +0000</pubDate>
    </item>
    <item>
      <title>c5a168be-7bbb-4cbf-9e4b-47cc01628abd</title>
      <link>https://vulnerability.circl.lu/sighting/c5a168be-7bbb-4cbf-9e4b-47cc01628abd/export</link>
      <description>{"uuid": "c5a168be-7bbb-4cbf-9e4b-47cc01628abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28878", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "c5a168be-7bbb-4cbf-9e4b-47cc01628abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28878", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c5a168be-7bbb-4cbf-9e4b-47cc01628abd/export</guid>
      <pubDate>Wed, 13 Aug 2025 13:26:34 +0000</pubDate>
    </item>
    <item>
      <title>25045bb9-1212-4e0c-80bc-c2a50a0662ab</title>
      <link>https://vulnerability.circl.lu/sighting/25045bb9-1212-4e0c-80bc-c2a50a0662ab/export</link>
      <description>{"uuid": "25045bb9-1212-4e0c-80bc-c2a50a0662ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28870", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "25045bb9-1212-4e0c-80bc-c2a50a0662ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28870", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/25045bb9-1212-4e0c-80bc-c2a50a0662ab/export</guid>
      <pubDate>Wed, 13 Aug 2025 13:26:34 +0000</pubDate>
    </item>
    <item>
      <title>3b543b65-a4c9-481f-8962-68e236238244</title>
      <link>https://vulnerability.circl.lu/sighting/3b543b65-a4c9-481f-8962-68e236238244/export</link>
      <description>{"uuid": "3b543b65-a4c9-481f-8962-68e236238244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28876", "type": "published-proof-of-concept", "source": "Telegram/qaiUzY0jU3lsWkLczH5jpfSLcodDVE0N-CXW3vtlinmUY8k", "content": "", "creation_timestamp": "2026-04-01T21:29:15.000000Z"}</description>
      <content:encoded>{"uuid": "3b543b65-a4c9-481f-8962-68e236238244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28876", "type": "published-proof-of-concept", "source": "Telegram/qaiUzY0jU3lsWkLczH5jpfSLcodDVE0N-CXW3vtlinmUY8k", "content": "", "creation_timestamp": "2026-04-01T21:29:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3b543b65-a4c9-481f-8962-68e236238244/export</guid>
      <pubDate>Wed, 01 Apr 2026 21:29:15 +0000</pubDate>
    </item>
    <item>
      <title>ed1db2e0-acac-4c29-a482-b02f07a79e5d</title>
      <link>https://vulnerability.circl.lu/sighting/ed1db2e0-acac-4c29-a482-b02f07a79e5d/export</link>
      <description>{"uuid": "ed1db2e0-acac-4c29-a482-b02f07a79e5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28872", "type": "published-proof-of-concept", "source": "Telegram/qaiUzY0jU3lsWkLczH5jpfSLcodDVE0N-CXW3vtlinmUY8k", "content": "", "creation_timestamp": "2026-04-01T21:29:15.000000Z"}</description>
      <content:encoded>{"uuid": "ed1db2e0-acac-4c29-a482-b02f07a79e5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-28872", "type": "published-proof-of-concept", "source": "Telegram/qaiUzY0jU3lsWkLczH5jpfSLcodDVE0N-CXW3vtlinmUY8k", "content": "", "creation_timestamp": "2026-04-01T21:29:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ed1db2e0-acac-4c29-a482-b02f07a79e5d/export</guid>
      <pubDate>Wed, 01 Apr 2026 21:29:15 +0000</pubDate>
    </item>
  </channel>
</rss>
