<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T10:59:01.654344+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/829cad72-d1fa-4a68-af22-f2c9d49b2e6b/export</id>
    <title>829cad72-d1fa-4a68-af22-f2c9d49b2e6b</title>
    <updated>2026-05-10T10:59:02.029577+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "829cad72-d1fa-4a68-af22-f2c9d49b2e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30590", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114217956857966440", "content": "", "creation_timestamp": "2025-03-24T14:48:31.476879Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/829cad72-d1fa-4a68-af22-f2c9d49b2e6b/export"/>
    <published>2025-03-24T14:48:31.476879+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/933b5221-3bb5-4c22-bd89-0ed9394ea5be/export</id>
    <title>933b5221-3bb5-4c22-bd89-0ed9394ea5be</title>
    <updated>2026-05-10T10:59:02.029454+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "933b5221-3bb5-4c22-bd89-0ed9394ea5be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30599", "type": "seen", "source": "https://t.me/cvedetector/20965", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30599 - WordPress Parallax Content Slider Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-30599 \nPublished : March 24, 2025, 2:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wp-maverick WP Parallax Content Slider allows Stored XSS. This issue affects WP Parallax Content Slider: from n/a through 0.9.8. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T16:43:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/933b5221-3bb5-4c22-bd89-0ed9394ea5be/export"/>
    <published>2025-03-24T16:43:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f57b320e-48f8-4640-b81d-9bdddb5b8a86/export</id>
    <title>f57b320e-48f8-4640-b81d-9bdddb5b8a86</title>
    <updated>2026-05-10T10:59:02.029355+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f57b320e-48f8-4640-b81d-9bdddb5b8a86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30598", "type": "seen", "source": "https://t.me/cvedetector/20970", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30598 - Link OSS Upload CSRF\", \n  \"Content\": \"CVE ID : CVE-2025-30598 \nPublished : March 24, 2025, 2:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Link OSS Upload allows Cross Site Request Forgery. This issue affects OSS Upload: from n/a through 4.8.9. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T16:43:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f57b320e-48f8-4640-b81d-9bdddb5b8a86/export"/>
    <published>2025-03-24T16:43:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/25894871-51db-4e3c-b74b-7b14c92d43ae/export</id>
    <title>25894871-51db-4e3c-b74b-7b14c92d43ae</title>
    <updated>2026-05-10T10:59:02.029256+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "25894871-51db-4e3c-b74b-7b14c92d43ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30590", "type": "seen", "source": "https://t.me/cvedetector/20972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30590 - Flickr SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-30590 \nPublished : March 24, 2025, 2:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Dourou Flickr set slideshows allows SQL Injection. This issue affects Flickr set slideshows: from n/a through 0.9. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-24T16:44:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/25894871-51db-4e3c-b74b-7b14c92d43ae/export"/>
    <published>2025-03-24T16:44:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eae95e8c-4558-40a1-b5ac-98161d0ec7bf/export</id>
    <title>eae95e8c-4558-40a1-b5ac-98161d0ec7bf</title>
    <updated>2026-05-10T10:59:02.029149+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eae95e8c-4558-40a1-b5ac-98161d0ec7bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30590", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3ll5exfdrar22", "content": "", "creation_timestamp": "2025-03-24T18:25:32.420426Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eae95e8c-4558-40a1-b5ac-98161d0ec7bf/export"/>
    <published>2025-03-24T18:25:32.420426+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0f29bcba-d9b5-40fb-be98-b6170dd20e9d/export</id>
    <title>0f29bcba-d9b5-40fb-be98-b6170dd20e9d</title>
    <updated>2026-05-10T10:59:02.029044+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0f29bcba-d9b5-40fb-be98-b6170dd20e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3059", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9780", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3059\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Vulnerability in Drupal Profile Private.This issue affects Profile Private: *.*.\n\ud83d\udccf Published: 2025-03-31T22:21:16.972Z\n\ud83d\udccf Modified: 2025-03-31T22:21:16.972Z\n\ud83d\udd17 References:\n1. https://www.drupal.org/sa-contrib-2025-002", "creation_timestamp": "2025-03-31T22:31:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0f29bcba-d9b5-40fb-be98-b6170dd20e9d/export"/>
    <published>2025-03-31T22:31:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/81667e47-2a35-4689-97a8-eb28447c71a4/export</id>
    <title>81667e47-2a35-4689-97a8-eb28447c71a4</title>
    <updated>2026-05-10T10:59:02.028873+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "81667e47-2a35-4689-97a8-eb28447c71a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3059", "type": "seen", "source": "https://t.me/cvedetector/21679", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3059 - Drupal Profile Private Unauthenticated File Upload\", \n  \"Content\": \"CVE ID : CVE-2025-3059 \nPublished : March 31, 2025, 11:15 p.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : Vulnerability in Drupal Profile Private.This issue affects Profile Private: *.*. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T03:35:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/81667e47-2a35-4689-97a8-eb28447c71a4/export"/>
    <published>2025-04-01T03:35:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bed3b3e8-7182-4cc4-b8c7-499990fb7e34/export</id>
    <title>bed3b3e8-7182-4cc4-b8c7-499990fb7e34</title>
    <updated>2026-05-10T10:59:02.025348+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bed3b3e8-7182-4cc4-b8c7-499990fb7e34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30594", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9936", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30594\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Include URL allows Path Traversal. This issue affects Include URL: from n/a through 0.3.5.\n\ud83d\udccf Published: 2025-04-01T05:31:35.172Z\n\ud83d\udccf Modified: 2025-04-01T16:17:52.683Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/include-url/vulnerability/wordpress-include-url-0-3-5-arbitrary-file-download-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-01T16:32:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bed3b3e8-7182-4cc4-b8c7-499990fb7e34/export"/>
    <published>2025-04-01T16:32:17+00:00</published>
  </entry>
</feed>
