<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:34:00 +0000</lastBuildDate>
    <item>
      <title>ac11fbb1-8d1d-44c9-b0a4-e3e53f0684ee</title>
      <link>https://vulnerability.circl.lu/sighting/ac11fbb1-8d1d-44c9-b0a4-e3e53f0684ee/export</link>
      <description>{"uuid": "ac11fbb1-8d1d-44c9-b0a4-e3e53f0684ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2012-4858", "type": "seen", "source": "https://t.me/arpsyndicate/2551", "content": "#ExploitObserverAlert\n\nCVE-2012-4858\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2012-4858. IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 does not properly validate Java serialized input, which allows remote attackers to execute arbitrary commands via unspecified vectors.\n\nFIRST-EPSS: 0.009070000\nNVD-IS: 10.0\nNVD-ES: 8.6", "creation_timestamp": "2024-01-06T15:30:41.000000Z"}</description>
      <content:encoded>{"uuid": "ac11fbb1-8d1d-44c9-b0a4-e3e53f0684ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2012-4858", "type": "seen", "source": "https://t.me/arpsyndicate/2551", "content": "#ExploitObserverAlert\n\nCVE-2012-4858\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2012-4858. IBM Cognos Business Intelligence (BI) 8.4.1 before IF1, 10.1 before IF2, 10.1.1 before IF2, and 10.2 before IF1 does not properly validate Java serialized input, which allows remote attackers to execute arbitrary commands via unspecified vectors.\n\nFIRST-EPSS: 0.009070000\nNVD-IS: 10.0\nNVD-ES: 8.6", "creation_timestamp": "2024-01-06T15:30:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ac11fbb1-8d1d-44c9-b0a4-e3e53f0684ee/export</guid>
      <pubDate>Sat, 06 Jan 2024 15:30:41 +0000</pubDate>
    </item>
  </channel>
</rss>
