<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T19:14:26.720028+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bf49b829-e6a6-4dcb-ae03-c350ca9412ae/export</id>
    <title>bf49b829-e6a6-4dcb-ae03-c350ca9412ae</title>
    <updated>2026-05-10T19:14:26.880324+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bf49b829-e6a6-4dcb-ae03-c350ca9412ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47770", "type": "seen", "source": "https://t.me/cvedetector/24999", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47770 - Apache HTTP Server Cross-Site Request Forgery\", \n  \"Content\": \"CVE ID : CVE-2025-47770 \nPublished : May 10, 2025, 3:15 a.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-10T07:16:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bf49b829-e6a6-4dcb-ae03-c350ca9412ae/export"/>
    <published>2025-05-10T07:16:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8e54ee8f-89ee-4774-8ac7-722a315d2263/export</id>
    <title>8e54ee8f-89ee-4774-8ac7-722a315d2263</title>
    <updated>2026-05-10T19:14:26.880241+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8e54ee8f-89ee-4774-8ac7-722a315d2263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47777", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp5gqaqhwm2t", "content": "", "creation_timestamp": "2025-05-14T16:38:10.037797Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8e54ee8f-89ee-4774-8ac7-722a315d2263/export"/>
    <published>2025-05-14T16:38:10.037797+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6a97b176-be89-4ccf-9e39-bef8dc841057/export</id>
    <title>6a97b176-be89-4ccf-9e39-bef8dc841057</title>
    <updated>2026-05-10T19:14:26.880150+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6a97b176-be89-4ccf-9e39-bef8dc841057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47778", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16358", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47778\n\ud83d\udd25 CVSS Score: 6.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U)\n\ud83d\udd39 Description: Sulu is an open-source PHP content management system based on the Symfony framework. Starting in versions 2.5.21, 2.6.5, and 3.0.0-alpha1, an admin user can upload SVG which may load external data via XML DOM library. This can be used for insecure XML External Entity References. The problem has been patched in versions 2.6.9, 2.5.25, and 3.0.0-alpha3. As a workaround, one may patch the effect file `src/Sulu/Bundle/MediaBundle/FileInspector/SvgFileInspector.php` manually.\n\ud83d\udccf Published: 2025-05-14T15:29:08.187Z\n\ud83d\udccf Modified: 2025-05-14T18:13:14.564Z\n\ud83d\udd17 References:\n1. https://github.com/sulu/sulu/security/advisories/GHSA-f6rx-hf55-4255\n2. https://github.com/sulu/sulu/commit/02f52fca04eb9495b9b4a0c5cc64cf23bc27f544\n3. https://github.com/sulu/sulu/blob/2.6/src/Sulu/Bundle/MediaBundle/FileInspector/SvgFileInspector.php", "creation_timestamp": "2025-05-14T18:31:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6a97b176-be89-4ccf-9e39-bef8dc841057/export"/>
    <published>2025-05-14T18:31:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/772d4f2d-5f71-40a4-ac81-7065370cce96/export</id>
    <title>772d4f2d-5f71-40a4-ac81-7065370cce96</title>
    <updated>2026-05-10T19:14:26.880068+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "772d4f2d-5f71-40a4-ac81-7065370cce96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47774", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpa7ba277n2p", "content": "", "creation_timestamp": "2025-05-15T19:02:31.586244Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/772d4f2d-5f71-40a4-ac81-7065370cce96/export"/>
    <published>2025-05-15T19:02:31.586244+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/26f4b4cf-3a77-4041-86d1-a2074641a4cf/export</id>
    <title>26f4b4cf-3a77-4041-86d1-a2074641a4cf</title>
    <updated>2026-05-10T19:14:26.879980+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "26f4b4cf-3a77-4041-86d1-a2074641a4cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4777", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16686", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4777\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in PHPGurukul Park Ticketing Management System 2.0. It has been classified as critical. This affects an unknown part of the file /view-foreigner-ticket.php. The manipulation of the argument viewid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-16T13:00:07.306Z\n\ud83d\udccf Modified: 2025-05-16T13:00:07.306Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309075\n2. https://vuldb.com/?ctiid.309075\n3. https://vuldb.com/?submit.572155\n4. https://github.com/f1rstb100d/myCVE/issues/3\n5. https://phpgurukul.com/", "creation_timestamp": "2025-05-16T13:35:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/26f4b4cf-3a77-4041-86d1-a2074641a4cf/export"/>
    <published>2025-05-16T13:35:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/05c44e1f-0182-443b-9e6a-46b1d462e7cb/export</id>
    <title>05c44e1f-0182-443b-9e6a-46b1d462e7cb</title>
    <updated>2026-05-10T19:14:26.879899+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "05c44e1f-0182-443b-9e6a-46b1d462e7cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47779", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114552721469007874", "content": "", "creation_timestamp": "2025-05-22T17:43:36.884775Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/05c44e1f-0182-443b-9e6a-46b1d462e7cb/export"/>
    <published>2025-05-22T17:43:36.884775+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/80aeb019-7fab-47de-928b-afcabc40c226/export</id>
    <title>80aeb019-7fab-47de-928b-afcabc40c226</title>
    <updated>2026-05-10T19:14:26.879812+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "80aeb019-7fab-47de-928b-afcabc40c226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47771", "type": "published-proof-of-concept", "source": "Telegram/S1Qn3Mgp8Fycfi30xks_bWkIDSfEWmvKzQ9DV8ScyPxkMsw", "content": "", "creation_timestamp": "2025-06-20T00:31:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/80aeb019-7fab-47de-928b-afcabc40c226/export"/>
    <published>2025-06-20T00:31:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/adbaafb5-3875-4a7c-9b76-f9f3606a727d/export</id>
    <title>adbaafb5-3875-4a7c-9b76-f9f3606a727d</title>
    <updated>2026-05-10T19:14:26.879719+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "adbaafb5-3875-4a7c-9b76-f9f3606a727d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47776", "type": "seen", "source": "https://infosec.exchange/users/harrysintonen/statuses/115474480965441636", "content": "", "creation_timestamp": "2025-11-01T12:39:08.634750Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/adbaafb5-3875-4a7c-9b76-f9f3606a727d/export"/>
    <published>2025-11-01T12:39:08.634750+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fd8c6173-ced1-473f-97b2-c05c0fb910d5/export</id>
    <title>fd8c6173-ced1-473f-97b2-c05c0fb910d5</title>
    <updated>2026-05-10T19:14:26.879594+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fd8c6173-ced1-473f-97b2-c05c0fb910d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47776", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m4th3xwrvsv2", "content": "", "creation_timestamp": "2025-11-04T21:10:59.388858Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fd8c6173-ced1-473f-97b2-c05c0fb910d5/export"/>
    <published>2025-11-04T21:10:59.388858+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/144b6c95-eb83-432e-b745-d17c457ce0ce/export</id>
    <title>144b6c95-eb83-432e-b745-d17c457ce0ce</title>
    <updated>2026-05-10T19:14:26.876080+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "144b6c95-eb83-432e-b745-d17c457ce0ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47773", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5cgjmkl5z2s", "content": "", "creation_timestamp": "2025-11-10T20:10:25.634573Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/144b6c95-eb83-432e-b745-d17c457ce0ce/export"/>
    <published>2025-11-10T20:10:25.634573+00:00</published>
  </entry>
</feed>
