<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T08:04:28.304148+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1f72da3f-3352-4e42-8a85-fd826afaf0b4/export</id>
    <title>1f72da3f-3352-4e42-8a85-fd826afaf0b4</title>
    <updated>2026-05-09T08:04:28.507262+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1f72da3f-3352-4e42-8a85-fd826afaf0b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "https://t.me/cvedetector/18445", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52902 - IBM Cognos Controller Hardcoded Database Password Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52902 \nPublished : Feb. 19, 2025, 3:15 p.m. | 1\u00a0hour, 14\u00a0minutes ago \nDescription : IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 client application contains hard coded database passwords in source code which could be used for unauthorized access to the system. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T17:54:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1f72da3f-3352-4e42-8a85-fd826afaf0b4/export"/>
    <published>2025-02-19T17:54:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5306fab2-d61f-4022-a0c7-ebc1c51b3e69/export</id>
    <title>5306fab2-d61f-4022-a0c7-ebc1c51b3e69</title>
    <updated>2026-05-09T08:04:28.507177+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5306fab2-d61f-4022-a0c7-ebc1c51b3e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7010", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52905\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user.\n\ud83d\udccf Published: 2025-03-10T16:05:13.550Z\n\ud83d\udccf Modified: 2025-03-10T16:31:09.992Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7185264", "creation_timestamp": "2025-03-10T16:38:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5306fab2-d61f-4022-a0c7-ebc1c51b3e69/export"/>
    <published>2025-03-10T16:38:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5636657b-5421-45af-bb3b-822b06f4a36d/export</id>
    <title>5636657b-5421-45af-bb3b-822b06f4a36d</title>
    <updated>2026-05-09T08:04:28.507089+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5636657b-5421-45af-bb3b-822b06f4a36d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://t.me/cvedetector/19967", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52905 - IBM Sterling B2B Integrator Privilege Escalation Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-52905 \nPublished : March 10, 2025, 4:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T19:02:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5636657b-5421-45af-bb3b-822b06f4a36d/export"/>
    <published>2025-03-10T19:02:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/99d8ef96-9641-4744-b539-9cba5c23f0fb/export</id>
    <title>99d8ef96-9641-4744-b539-9cba5c23f0fb</title>
    <updated>2026-05-09T08:04:28.507004+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "99d8ef96-9641-4744-b539-9cba5c23f0fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2cvzvlzd2e", "content": "", "creation_timestamp": "2025-03-10T19:45:49.964521Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/99d8ef96-9641-4744-b539-9cba5c23f0fb/export"/>
    <published>2025-03-10T19:45:49.964521+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/03d80ed2-049f-41e5-9e60-fd2a54aaaf22/export</id>
    <title>03d80ed2-049f-41e5-9e60-fd2a54aaaf22</title>
    <updated>2026-05-09T08:04:28.506918+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "03d80ed2-049f-41e5-9e60-fd2a54aaaf22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14416", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52903\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.\n\ud83d\udccf Published: 2025-05-01T22:15:48.366Z\n\ud83d\udccf Modified: 2025-05-01T22:15:48.366Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7232336", "creation_timestamp": "2025-05-01T23:17:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/03d80ed2-049f-41e5-9e60-fd2a54aaaf22/export"/>
    <published>2025-05-01T23:17:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/407396f7-18b4-4f7c-9e55-02c08e3fe0a8/export</id>
    <title>407396f7-18b4-4f7c-9e55-02c08e3fe0a8</title>
    <updated>2026-05-09T08:04:28.506832+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "407396f7-18b4-4f7c-9e55-02c08e3fe0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo5q5chown2h", "content": "", "creation_timestamp": "2025-05-02T02:01:26.223732Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/407396f7-18b4-4f7c-9e55-02c08e3fe0a8/export"/>
    <published>2025-05-02T02:01:26.223732+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/86928197-42f7-4c22-887c-a6b73ab7afe6/export</id>
    <title>86928197-42f7-4c22-887c-a6b73ab7afe6</title>
    <updated>2026-05-09T08:04:28.506728+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "86928197-42f7-4c22-887c-a6b73ab7afe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://t.me/cvedetector/24293", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52903 - IBM Db2 Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-52903 \nPublished : May 1, 2025, 11:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T03:23:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/86928197-42f7-4c22-887c-a6b73ab7afe6/export"/>
    <published>2025-05-02T03:23:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/179b7f48-d074-4858-9c57-3a964c15e400/export</id>
    <title>179b7f48-d074-4858-9c57-3a964c15e400</title>
    <updated>2026-05-09T08:04:28.506617+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "179b7f48-d074-4858-9c57-3a964c15e400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52900", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19797", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52900\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Cognos Analytics 11.2.0 through 12.2.4 Fix Pack 5 and 12.0.0 through 12.0.4 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-06-28T00:59:23.758Z\n\ud83d\udccf Modified: 2025-06-28T00:59:23.758Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7238163", "creation_timestamp": "2025-06-28T01:51:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/179b7f48-d074-4858-9c57-3a964c15e400/export"/>
    <published>2025-06-28T01:51:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9dd9c4a1-703d-4d67-b7f9-e45f80097213/export</id>
    <title>9dd9c4a1-703d-4d67-b7f9-e45f80097213</title>
    <updated>2026-05-09T08:04:28.506425+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9dd9c4a1-703d-4d67-b7f9-e45f80097213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52900", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsne2ph7g725", "content": "", "creation_timestamp": "2025-06-28T04:48:27.223896Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9dd9c4a1-703d-4d67-b7f9-e45f80097213/export"/>
    <published>2025-06-28T04:48:27.223896+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7689fbb4-eda5-42b7-b229-3e655fdfcb20/export</id>
    <title>7689fbb4-eda5-42b7-b229-3e655fdfcb20</title>
    <updated>2026-05-09T08:04:28.503485+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7689fbb4-eda5-42b7-b229-3e655fdfcb20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7689fbb4-eda5-42b7-b229-3e655fdfcb20/export"/>
    <published>2025-08-25T13:32:05+00:00</published>
  </entry>
</feed>
