<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T12:03:52.302299+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/776a178a-a3fb-4380-976c-6e73b49d1c92/export</id>
    <title>776a178a-a3fb-4380-976c-6e73b49d1c92</title>
    <updated>2026-05-09T12:03:52.446136+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "776a178a-a3fb-4380-976c-6e73b49d1c92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3440", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16532", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3440\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Security Guardium 11.5 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-05-15T15:40:34.829Z\n\ud83d\udccf Modified: 2025-05-15T16:08:14.229Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7233600", "creation_timestamp": "2025-05-15T16:35:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/776a178a-a3fb-4380-976c-6e73b49d1c92/export"/>
    <published>2025-05-15T16:35:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/78db2bae-adb8-4f78-8241-7e9f8edb3eb6/export</id>
    <title>78db2bae-adb8-4f78-8241-7e9f8edb3eb6</title>
    <updated>2026-05-09T12:03:52.446055+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "78db2bae-adb8-4f78-8241-7e9f8edb3eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34400", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115691003669191782", "content": "", "creation_timestamp": "2025-12-09T18:23:42.481996Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/78db2bae-adb8-4f78-8241-7e9f8edb3eb6/export"/>
    <published>2025-12-09T18:23:42.481996+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e27ba394-d8e1-495e-aac5-599709214915/export</id>
    <title>e27ba394-d8e1-495e-aac5-599709214915</title>
    <updated>2026-05-09T12:03:52.445977+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e27ba394-d8e1-495e-aac5-599709214915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34401", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115691003669191782", "content": "", "creation_timestamp": "2025-12-09T18:23:42.553052Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e27ba394-d8e1-495e-aac5-599709214915/export"/>
    <published>2025-12-09T18:23:42.553052+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/280b1a9e-fe59-45dd-b38d-5ca7d9a42820/export</id>
    <title>280b1a9e-fe59-45dd-b38d-5ca7d9a42820</title>
    <updated>2026-05-09T12:03:52.445898+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "280b1a9e-fe59-45dd-b38d-5ca7d9a42820", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34402", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115691003669191782", "content": "", "creation_timestamp": "2025-12-09T18:23:42.626505Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/280b1a9e-fe59-45dd-b38d-5ca7d9a42820/export"/>
    <published>2025-12-09T18:23:42.626505+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cde073a6-ed30-489b-93eb-a965739cb890/export</id>
    <title>cde073a6-ed30-489b-93eb-a965739cb890</title>
    <updated>2026-05-09T12:03:52.445817+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cde073a6-ed30-489b-93eb-a965739cb890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34403", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115691003669191782", "content": "", "creation_timestamp": "2025-12-09T18:23:42.695135Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cde073a6-ed30-489b-93eb-a965739cb890/export"/>
    <published>2025-12-09T18:23:42.695135+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6117c1a2-228e-4cb3-8041-1f6e4237d31c/export</id>
    <title>6117c1a2-228e-4cb3-8041-1f6e4237d31c</title>
    <updated>2026-05-09T12:03:52.445703+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6117c1a2-228e-4cb3-8041-1f6e4237d31c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34404", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115691003669191782", "content": "", "creation_timestamp": "2025-12-09T18:23:42.765765Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6117c1a2-228e-4cb3-8041-1f6e4237d31c/export"/>
    <published>2025-12-09T18:23:42.765765+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/431f55a7-a22d-4052-8f56-2c9741fbc9ad/export</id>
    <title>431f55a7-a22d-4052-8f56-2c9741fbc9ad</title>
    <updated>2026-05-09T12:03:52.445582+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "431f55a7-a22d-4052-8f56-2c9741fbc9ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34406", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115691003669191782", "content": "", "creation_timestamp": "2025-12-09T18:23:42.835543Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/431f55a7-a22d-4052-8f56-2c9741fbc9ad/export"/>
    <published>2025-12-09T18:23:42.835543+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a9841e90-fe0c-480f-b2f5-b4d7a95ecdfa/export</id>
    <title>a9841e90-fe0c-480f-b2f5-b4d7a95ecdfa</title>
    <updated>2026-05-09T12:03:52.445302+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a9841e90-fe0c-480f-b2f5-b4d7a95ecdfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34407", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115691003669191782", "content": "", "creation_timestamp": "2025-12-09T18:23:42.903564Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a9841e90-fe0c-480f-b2f5-b4d7a95ecdfa/export"/>
    <published>2025-12-09T18:23:42.903564+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/53499c36-2dae-4646-a256-6c4911007fe9/export</id>
    <title>53499c36-2dae-4646-a256-6c4911007fe9</title>
    <updated>2026-05-09T12:03:52.444898+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "53499c36-2dae-4646-a256-6c4911007fe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34408", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115691003669191782", "content": "", "creation_timestamp": "2025-12-09T18:23:42.971399Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/53499c36-2dae-4646-a256-6c4911007fe9/export"/>
    <published>2025-12-09T18:23:42.971399+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb4c3dba-47be-4855-8763-9254f36253cc/export</id>
    <title>eb4c3dba-47be-4855-8763-9254f36253cc</title>
    <updated>2026-05-09T12:03:52.441746+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb4c3dba-47be-4855-8763-9254f36253cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34409", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115691003669191782", "content": "", "creation_timestamp": "2025-12-09T18:23:43.040681Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb4c3dba-47be-4855-8763-9254f36253cc/export"/>
    <published>2025-12-09T18:23:43.040681+00:00</published>
  </entry>
</feed>
