https://cve.circl.lu/sightings/feed Most recent sightings. 2025-02-23T14:24:21.113645+00:00 Vulnerability-Lookup info@circl.lu python-feedgen Contains only the most 10 recent sightings. https://cve.circl.lu/sighting/34b24527-3872-49ee-ac44-0ff2186d70ef/export 34b24527-3872-49ee-ac44-0ff2186d70ef 2025-02-23T14:24:21.166791+00:00 Cédric Bonhomme http://cvepremium.circl.lu/user/cedric {"uuid": "34b24527-3872-49ee-ac44-0ff2186d70ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2019-14656", "type": "exploited", "source": "https://www.exploit-db.com/exploits/23572", "creation_timestamp": "2025-01-24T10:04:21.889622Z"} 2025-01-24T10:04:21.889622+00:00 https://cve.circl.lu/sighting/5a8a33a5-5947-4c47-983c-78147d7ed493/export 5a8a33a5-5947-4c47-983c-78147d7ed493 2025-02-23T14:24:21.166451+00:00 Cédric Bonhomme http://cvepremium.circl.lu/user/cedric {"uuid": "5a8a33a5-5947-4c47-983c-78147d7ed493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2019-14656", "type": "confirmed", "source": "https://www.yealink.com/en/trust-center/security-advisories/cve-2019-14656-yealink-phone-privilege-escalation-vulnerabilities", "creation_timestamp": "2025-01-24T10:09:15.942014Z"} 2025-01-24T10:09:15.942014+00:00 https://cve.circl.lu/sighting/bf8fb48a-6d04-439e-b194-103a97c1e7ae/export bf8fb48a-6d04-439e-b194-103a97c1e7ae 2025-02-23T14:24:21.163052+00:00 Cédric Bonhomme http://cvepremium.circl.lu/user/cedric {"uuid": "bf8fb48a-6d04-439e-b194-103a97c1e7ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2019-14656", "type": "exploited", "source": "https://sway.cloud.microsoft/3pCb559LYVuT0eig", "creation_timestamp": "2025-01-24T10:14:26.826817Z"} 2025-01-24T10:14:26.826817+00:00