https://cve.circl.lu/sightings/feed
Most recent sightings.
2025-02-23T14:24:21.113645+00:00
Vulnerability-Lookup
info@circl.lu
python-feedgen
Contains only the most 10 recent sightings.
https://cve.circl.lu/sighting/34b24527-3872-49ee-ac44-0ff2186d70ef/export
34b24527-3872-49ee-ac44-0ff2186d70ef
2025-02-23T14:24:21.166791+00:00
Cédric Bonhomme
http://cvepremium.circl.lu/user/cedric
{"uuid": "34b24527-3872-49ee-ac44-0ff2186d70ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2019-14656", "type": "exploited", "source": "https://www.exploit-db.com/exploits/23572", "creation_timestamp": "2025-01-24T10:04:21.889622Z"}
2025-01-24T10:04:21.889622+00:00
https://cve.circl.lu/sighting/5a8a33a5-5947-4c47-983c-78147d7ed493/export
5a8a33a5-5947-4c47-983c-78147d7ed493
2025-02-23T14:24:21.166451+00:00
Cédric Bonhomme
http://cvepremium.circl.lu/user/cedric
{"uuid": "5a8a33a5-5947-4c47-983c-78147d7ed493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2019-14656", "type": "confirmed", "source": "https://www.yealink.com/en/trust-center/security-advisories/cve-2019-14656-yealink-phone-privilege-escalation-vulnerabilities", "creation_timestamp": "2025-01-24T10:09:15.942014Z"}
2025-01-24T10:09:15.942014+00:00
https://cve.circl.lu/sighting/bf8fb48a-6d04-439e-b194-103a97c1e7ae/export
bf8fb48a-6d04-439e-b194-103a97c1e7ae
2025-02-23T14:24:21.163052+00:00
Cédric Bonhomme
http://cvepremium.circl.lu/user/cedric
{"uuid": "bf8fb48a-6d04-439e-b194-103a97c1e7ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2019-14656", "type": "exploited", "source": "https://sway.cloud.microsoft/3pCb559LYVuT0eig", "creation_timestamp": "2025-01-24T10:14:26.826817Z"}
2025-01-24T10:14:26.826817+00:00