<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 18:22:41 +0000</lastBuildDate>
    <item>
      <title>cf6fb5c0-d29f-40eb-afba-1de2c74e470f</title>
      <link>https://vulnerability.circl.lu/sighting/cf6fb5c0-d29f-40eb-afba-1de2c74e470f/export</link>
      <description>{"uuid": "cf6fb5c0-d29f-40eb-afba-1de2c74e470f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793626161781850", "content": "", "creation_timestamp": "2025-01-08T16:15:38.729517Z"}</description>
      <content:encoded>{"uuid": "cf6fb5c0-d29f-40eb-afba-1de2c74e470f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793626161781850", "content": "", "creation_timestamp": "2025-01-08T16:15:38.729517Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cf6fb5c0-d29f-40eb-afba-1de2c74e470f/export</guid>
      <pubDate>Wed, 08 Jan 2025 16:15:38 +0000</pubDate>
    </item>
    <item>
      <title>6420eaa1-eaa4-4e95-97e8-42b0111056be</title>
      <link>https://vulnerability.circl.lu/sighting/6420eaa1-eaa4-4e95-97e8-42b0111056be/export</link>
      <description>{"uuid": "6420eaa1-eaa4-4e95-97e8-42b0111056be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfakrgao2a2x", "content": "", "creation_timestamp": "2025-01-08T16:16:23.788005Z"}</description>
      <content:encoded>{"uuid": "6420eaa1-eaa4-4e95-97e8-42b0111056be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfakrgao2a2x", "content": "", "creation_timestamp": "2025-01-08T16:16:23.788005Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6420eaa1-eaa4-4e95-97e8-42b0111056be/export</guid>
      <pubDate>Wed, 08 Jan 2025 16:16:23 +0000</pubDate>
    </item>
    <item>
      <title>10001f30-5e29-489b-90cc-dd9651d642d9</title>
      <link>https://vulnerability.circl.lu/sighting/10001f30-5e29-489b-90cc-dd9651d642d9/export</link>
      <description>{"uuid": "10001f30-5e29-489b-90cc-dd9651d642d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb4yjj42e", "content": "", "creation_timestamp": "2025-01-08T16:43:06.676972Z"}</description>
      <content:encoded>{"uuid": "10001f30-5e29-489b-90cc-dd9651d642d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb4yjj42e", "content": "", "creation_timestamp": "2025-01-08T16:43:06.676972Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/10001f30-5e29-489b-90cc-dd9651d642d9/export</guid>
      <pubDate>Wed, 08 Jan 2025 16:43:06 +0000</pubDate>
    </item>
    <item>
      <title>587f12fa-f9cc-4d63-b172-4d8c4bbf1c80</title>
      <link>https://vulnerability.circl.lu/sighting/587f12fa-f9cc-4d63-b172-4d8c4bbf1c80/export</link>
      <description>{"uuid": "587f12fa-f9cc-4d63-b172-4d8c4bbf1c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb5r73o2b", "content": "", "creation_timestamp": "2025-01-08T16:43:09.831704Z"}</description>
      <content:encoded>{"uuid": "587f12fa-f9cc-4d63-b172-4d8c4bbf1c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb5r73o2b", "content": "", "creation_timestamp": "2025-01-08T16:43:09.831704Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/587f12fa-f9cc-4d63-b172-4d8c4bbf1c80/export</guid>
      <pubDate>Wed, 08 Jan 2025 16:43:09 +0000</pubDate>
    </item>
    <item>
      <title>0d9a07f1-d2d0-4a7c-a3d8-f2c8daa3e9e1</title>
      <link>https://vulnerability.circl.lu/sighting/0d9a07f1-d2d0-4a7c-a3d8-f2c8daa3e9e1/export</link>
      <description>{"uuid": "0d9a07f1-d2d0-4a7c-a3d8-f2c8daa3e9e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113793757744423238", "content": "", "creation_timestamp": "2025-01-08T16:49:07.291950Z"}</description>
      <content:encoded>{"uuid": "0d9a07f1-d2d0-4a7c-a3d8-f2c8daa3e9e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113793757744423238", "content": "", "creation_timestamp": "2025-01-08T16:49:07.291950Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0d9a07f1-d2d0-4a7c-a3d8-f2c8daa3e9e1/export</guid>
      <pubDate>Wed, 08 Jan 2025 16:49:07 +0000</pubDate>
    </item>
    <item>
      <title>9f6a3527-1b80-46f1-a0f5-0194604264c9</title>
      <link>https://vulnerability.circl.lu/sighting/9f6a3527-1b80-46f1-a0f5-0194604264c9/export</link>
      <description>{"uuid": "9f6a3527-1b80-46f1-a0f5-0194604264c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://t.me/cvedetector/14691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22137 - Pingvin Share File Traversal\", \n  \"Content\": \"CVE ID : CVE-2025-22137 \nPublished : Jan. 8, 2025, 4:15 p.m. | 43\u00a0minutes ago \nDescription : Pingvin Share is a self-hosted file sharing platform and an alternative for WeTransfer. This vulnerability allows an authenticated or unauthenticated (if anonymous shares are allowed) user to overwrite arbitrary files on the server, including sensitive system files, via HTTP POST requests. The issue has been patched in version 1.4.0. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T18:19:09.000000Z"}</description>
      <content:encoded>{"uuid": "9f6a3527-1b80-46f1-a0f5-0194604264c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://t.me/cvedetector/14691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22137 - Pingvin Share File Traversal\", \n  \"Content\": \"CVE ID : CVE-2025-22137 \nPublished : Jan. 8, 2025, 4:15 p.m. | 43\u00a0minutes ago \nDescription : Pingvin Share is a self-hosted file sharing platform and an alternative for WeTransfer. This vulnerability allows an authenticated or unauthenticated (if anonymous shares are allowed) user to overwrite arbitrary files on the server, including sensitive system files, via HTTP POST requests. The issue has been patched in version 1.4.0. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T18:19:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9f6a3527-1b80-46f1-a0f5-0194604264c9/export</guid>
      <pubDate>Wed, 08 Jan 2025 18:19:09 +0000</pubDate>
    </item>
  </channel>
</rss>
