<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T11:53:56.620988+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/205c5313-0e16-4286-a55d-7abf893e6231/export</id>
    <title>205c5313-0e16-4286-a55d-7abf893e6231</title>
    <updated>2026-05-10T11:53:56.769337+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "205c5313-0e16-4286-a55d-7abf893e6231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loot2zwpsb32", "content": "", "creation_timestamp": "2025-05-08T21:15:08.889251Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/205c5313-0e16-4286-a55d-7abf893e6231/export"/>
    <published>2025-05-08T21:15:08.889251+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e805f4e9-8abc-4773-911b-d97b289e3fd9/export</id>
    <title>e805f4e9-8abc-4773-911b-d97b289e3fd9</title>
    <updated>2026-05-10T11:53:56.769262+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e805f4e9-8abc-4773-911b-d97b289e3fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loot34hb6nh2", "content": "", "creation_timestamp": "2025-05-08T21:15:11.208325Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e805f4e9-8abc-4773-911b-d97b289e3fd9/export"/>
    <published>2025-05-08T21:15:11.208325+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/625c69a4-8197-4b5b-a184-92e7fb68d3c7/export</id>
    <title>625c69a4-8197-4b5b-a184-92e7fb68d3c7</title>
    <updated>2026-05-10T11:53:56.769188+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "625c69a4-8197-4b5b-a184-92e7fb68d3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq33qdq2h", "content": "", "creation_timestamp": "2025-05-08T22:32:22.782199Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/625c69a4-8197-4b5b-a184-92e7fb68d3c7/export"/>
    <published>2025-05-08T22:32:22.782199+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/090cff8e-da6f-4252-bc6b-976bdaf74b0b/export</id>
    <title>090cff8e-da6f-4252-bc6b-976bdaf74b0b</title>
    <updated>2026-05-10T11:53:56.769104+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "090cff8e-da6f-4252-bc6b-976bdaf74b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq3gbva2r", "content": "", "creation_timestamp": "2025-05-08T22:32:24.717210Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/090cff8e-da6f-4252-bc6b-976bdaf74b0b/export"/>
    <published>2025-05-08T22:32:24.717210+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ebf0fc6b-061e-4072-a130-38ed61927de7/export</id>
    <title>ebf0fc6b-061e-4072-a130-38ed61927de7</title>
    <updated>2026-05-10T11:53:56.769021+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ebf0fc6b-061e-4072-a130-38ed61927de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45798", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq3tyww2j", "content": "", "creation_timestamp": "2025-05-08T22:32:27.229893Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ebf0fc6b-061e-4072-a130-38ed61927de7/export"/>
    <published>2025-05-08T22:32:27.229893+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f925d5f6-6113-4a72-82b3-f6a6fac5b951/export</id>
    <title>f925d5f6-6113-4a72-82b3-f6a6fac5b951</title>
    <updated>2026-05-10T11:53:56.768934+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f925d5f6-6113-4a72-82b3-f6a6fac5b951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://t.me/cvedetector/24863", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45790 - TOTOLINK A3100R Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-45790 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : TOTOLINK A3100R V5.9c.1527 is vulnerable to Buffer Overflow via the priority parameter in the setMacQos interface of /lib/cste_modules/firewall.so. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f925d5f6-6113-4a72-82b3-f6a6fac5b951/export"/>
    <published>2025-05-09T00:18:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6000ccc6-ae2e-41f9-aa79-3965fddbf569/export</id>
    <title>6000ccc6-ae2e-41f9-aa79-3965fddbf569</title>
    <updated>2026-05-10T11:53:56.768847+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6000ccc6-ae2e-41f9-aa79-3965fddbf569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://t.me/cvedetector/24864", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45797 - TOTOlink A950RG Buffer Overflow Vulnerability in NoticeUrl Parameter\", \n  \"Content\": \"CVE ID : CVE-2025-45797 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : TOTOlink A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the NoticeUrl parameter in the setNoticeCfg interface of /lib/cste_modules/system.so. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6000ccc6-ae2e-41f9-aa79-3965fddbf569/export"/>
    <published>2025-05-09T00:18:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f25b6cc1-2a17-4dec-abd4-84633d2d8843/export</id>
    <title>f25b6cc1-2a17-4dec-abd4-84633d2d8843</title>
    <updated>2026-05-10T11:53:56.768752+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f25b6cc1-2a17-4dec-abd4-84633d2d8843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45798", "type": "seen", "source": "https://t.me/cvedetector/24865", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45798 - TOTOLINK A950RG Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-45798 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : A command execution vulnerability exists in the TOTOLINK A950RG V4.1.2cu.5204_B20210112. The vulnerability is located in the setNoticeCfg interface within the /lib/cste_modules/system.so library, specifically in the processing of the IpTo parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f25b6cc1-2a17-4dec-abd4-84633d2d8843/export"/>
    <published>2025-05-09T00:18:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/19dfe7d4-2fea-49be-85d3-5617b1d52d60/export</id>
    <title>19dfe7d4-2fea-49be-85d3-5617b1d52d60</title>
    <updated>2026-05-10T11:53:56.768617+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "19dfe7d4-2fea-49be-85d3-5617b1d52d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4579", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16437", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4579\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The WP Content Security Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the blocked-uri and effective-directive  parameters in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-05-15T01:59:23.874Z\n\ud83d\udccf Modified: 2025-05-15T01:59:23.874Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f3c4ba08-a9fa-439a-a887-b8c113f78e20?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L597\n3. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L612\n4. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L659", "creation_timestamp": "2025-05-15T02:32:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/19dfe7d4-2fea-49be-85d3-5617b1d52d60/export"/>
    <published>2025-05-15T02:32:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/31d1e74f-3425-4cbb-8812-52c47fd6351e/export</id>
    <title>31d1e74f-3425-4cbb-8812-52c47fd6351e</title>
    <updated>2026-05-10T11:53:56.766731+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "31d1e74f-3425-4cbb-8812-52c47fd6351e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4579", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp6jdx32gf2p", "content": "", "creation_timestamp": "2025-05-15T02:57:35.144083Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/31d1e74f-3425-4cbb-8812-52c47fd6351e/export"/>
    <published>2025-05-15T02:57:35.144083+00:00</published>
  </entry>
</feed>
