<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T05:43:25.130533+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5282da29-1ee3-4e56-910e-0b567d37a273/export</id>
    <title>5282da29-1ee3-4e56-910e-0b567d37a273</title>
    <updated>2026-05-10T05:43:25.369483+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cvepremium.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5282da29-1ee3-4e56-910e-0b567d37a273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21394", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4855", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21394\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Excel Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2025-02-11T17:58:38.564Z\n\ud83d\udccf Modified: 2025-02-21T04:56:21.545Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21394", "creation_timestamp": "2025-02-21T05:18:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5282da29-1ee3-4e56-910e-0b567d37a273/export"/>
    <published>2025-02-21T05:18:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e56a169f-9b84-43e5-b181-7cf7ec8c4741/export</id>
    <title>e56a169f-9b84-43e5-b181-7cf7ec8c4741</title>
    <updated>2026-05-10T05:43:25.369409+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cvepremium.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e56a169f-9b84-43e5-b181-7cf7ec8c4741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21397", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4963", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21397\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Office Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2025-02-11T17:58:39.109Z\n\ud83d\udccf Modified: 2025-02-21T18:43:09.168Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21397", "creation_timestamp": "2025-02-21T19:18:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e56a169f-9b84-43e5-b181-7cf7ec8c4741/export"/>
    <published>2025-02-21T19:18:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5fd17c28-24d2-4a9f-9039-f50a8e594343/export</id>
    <title>5fd17c28-24d2-4a9f-9039-f50a8e594343</title>
    <updated>2026-05-10T05:43:25.369328+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cvepremium.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5fd17c28-24d2-4a9f-9039-f50a8e594343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21392", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4964", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21392\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Office Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2025-02-11T17:58:38.001Z\n\ud83d\udccf Modified: 2025-02-21T18:43:07.934Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21392", "creation_timestamp": "2025-02-21T19:18:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5fd17c28-24d2-4a9f-9039-f50a8e594343/export"/>
    <published>2025-02-21T19:18:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cfe3ae61-8d15-43a8-9030-f1f6b5e25d13/export</id>
    <title>cfe3ae61-8d15-43a8-9030-f1f6b5e25d13</title>
    <updated>2026-05-10T05:43:25.369247+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cvepremium.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cfe3ae61-8d15-43a8-9030-f1f6b5e25d13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21390", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4965", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21390\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Excel Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2025-02-11T17:58:37.409Z\n\ud83d\udccf Modified: 2025-02-21T18:43:07.339Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21390", "creation_timestamp": "2025-02-21T19:18:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cfe3ae61-8d15-43a8-9030-f1f6b5e25d13/export"/>
    <published>2025-02-21T19:18:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ce5888ee-2325-4362-b62d-ab91556d6964/export</id>
    <title>ce5888ee-2325-4362-b62d-ab91556d6964</title>
    <updated>2026-05-10T05:43:25.369172+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cvepremium.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ce5888ee-2325-4362-b62d-ab91556d6964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21391", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ce5888ee-2325-4362-b62d-ab91556d6964/export"/>
    <published>2025-02-23T02:11:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cb9cb6f2-618e-47f9-85b8-7b61b591e266/export</id>
    <title>cb9cb6f2-618e-47f9-85b8-7b61b591e266</title>
    <updated>2026-05-10T05:43:25.369094+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cvepremium.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cb9cb6f2-618e-47f9-85b8-7b61b591e266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21396", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3litxpizds3q2", "content": "", "creation_timestamp": "2025-02-23T13:44:19.224476Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cb9cb6f2-618e-47f9-85b8-7b61b591e266/export"/>
    <published>2025-02-23T13:44:19.224476+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a5ef5db5-b45d-4215-87f7-ae1c7e4b6a0a/export</id>
    <title>a5ef5db5-b45d-4215-87f7-ae1c7e4b6a0a</title>
    <updated>2026-05-10T05:43:25.369001+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cvepremium.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a5ef5db5-b45d-4215-87f7-ae1c7e4b6a0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21396", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3livwnkvmgrl2", "content": "", "creation_timestamp": "2025-02-24T08:30:40.471082Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a5ef5db5-b45d-4215-87f7-ae1c7e4b6a0a/export"/>
    <published>2025-02-24T08:30:40.471082+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/66e46003-a487-4bb4-87ab-66651499e33f/export</id>
    <title>66e46003-a487-4bb4-87ab-66651499e33f</title>
    <updated>2026-05-10T05:43:25.368895+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cvepremium.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "66e46003-a487-4bb4-87ab-66651499e33f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21391", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lpub6swxgm2t", "content": "", "creation_timestamp": "2025-05-23T18:30:08.706562Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/66e46003-a487-4bb4-87ab-66651499e33f/export"/>
    <published>2025-05-23T18:30:08.706562+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/33c2d50a-f8d2-4122-885b-b88e47b3e9ad/export</id>
    <title>33c2d50a-f8d2-4122-885b-b88e47b3e9ad</title>
    <updated>2026-05-10T05:43:25.367924+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cvepremium.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "33c2d50a-f8d2-4122-885b-b88e47b3e9ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21396", "type": "seen", "source": "MISP/ca7dfd4e-d0b5-4d10-8982-36d9f6e53c8e", "content": "", "creation_timestamp": "2025-09-01T13:53:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/33c2d50a-f8d2-4122-885b-b88e47b3e9ad/export"/>
    <published>2025-09-01T13:53:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3384d21b-b9f0-462b-af61-156b858ac766/export</id>
    <title>3384d21b-b9f0-462b-af61-156b858ac766</title>
    <updated>2026-05-10T05:43:25.365667+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://cvepremium.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "3384d21b-b9f0-462b-af61-156b858ac766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-21391", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/d319f2c3-f296-4a74-907e-272219dae38a", "content": "", "creation_timestamp": "2026-02-02T12:26:14.466118Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3384d21b-b9f0-462b-af61-156b858ac766/export"/>
    <published>2026-02-02T12:26:14.466118+00:00</published>
  </entry>
</feed>
