<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 03:17:11 +0000</lastBuildDate>
    <item>
      <title>928ed72a-cf76-47e5-8d3d-f81c5cd61cf7</title>
      <link>https://vulnerability.circl.lu/sighting/928ed72a-cf76-47e5-8d3d-f81c5cd61cf7/export</link>
      <description>{"uuid": "928ed72a-cf76-47e5-8d3d-f81c5cd61cf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24836", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4400", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24836\n\ud83d\udd25 CVSS Score: 7.1 (CVSS_V3)\n\ud83d\udd39 Description: With a specially crafted Python script, an attacker could send \ncontinuous startMeasurement commands over an unencrypted Bluetooth \nconnection to the affected device. This would prevent the device from \nconnecting to a clinician's app to take patient readings and ostensibly \nflood it with requests, resulting in a denial-of-service condition.\n\ud83d\udccf Published: 2025-02-14T00:30:44Z\n\ud83d\udccf Modified: 2025-02-14T00:30:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-24836\n2. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-044-01\n3. https://www.qardio.com/about-us/#contact", "creation_timestamp": "2025-02-14T01:16:44.000000Z"}</description>
      <content:encoded>{"uuid": "928ed72a-cf76-47e5-8d3d-f81c5cd61cf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24836", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4400", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24836\n\ud83d\udd25 CVSS Score: 7.1 (CVSS_V3)\n\ud83d\udd39 Description: With a specially crafted Python script, an attacker could send \ncontinuous startMeasurement commands over an unencrypted Bluetooth \nconnection to the affected device. This would prevent the device from \nconnecting to a clinician's app to take patient readings and ostensibly \nflood it with requests, resulting in a denial-of-service condition.\n\ud83d\udccf Published: 2025-02-14T00:30:44Z\n\ud83d\udccf Modified: 2025-02-14T00:30:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-24836\n2. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-044-01\n3. https://www.qardio.com/about-us/#contact", "creation_timestamp": "2025-02-14T01:16:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/928ed72a-cf76-47e5-8d3d-f81c5cd61cf7/export</guid>
      <pubDate>Fri, 14 Feb 2025 01:16:44 +0000</pubDate>
    </item>
    <item>
      <title>5f0b0cec-74b1-4ea1-9216-9af5563068d0</title>
      <link>https://vulnerability.circl.lu/sighting/5f0b0cec-74b1-4ea1-9216-9af5563068d0/export</link>
      <description>{"uuid": "5f0b0cec-74b1-4ea1-9216-9af5563068d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24832", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5816", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24832\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: Arbitrary file overwrite during home directory recovery due to improper symbolic link handling. The following products are affected: Acronis Backup plugin for cPanel &amp;amp; WHM (Linux) before build 1.8.4.866, Acronis Backup plugin for cPanel &amp;amp; WHM (Linux) before build 1.9.1.892, Acronis Backup extension for Plesk (Linux) before build 1.8.7.615.\n\ud83d\udccf Published: 2025-02-27T23:00:16.679Z\n\ud83d\udccf Modified: 2025-02-27T23:00:16.679Z\n\ud83d\udd17 References:\n1. https://security-advisory.acronis.com/advisories/SEC-7649", "creation_timestamp": "2025-02-27T23:25:37.000000Z"}</description>
      <content:encoded>{"uuid": "5f0b0cec-74b1-4ea1-9216-9af5563068d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24832", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5816", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24832\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: Arbitrary file overwrite during home directory recovery due to improper symbolic link handling. The following products are affected: Acronis Backup plugin for cPanel &amp;amp; WHM (Linux) before build 1.8.4.866, Acronis Backup plugin for cPanel &amp;amp; WHM (Linux) before build 1.9.1.892, Acronis Backup extension for Plesk (Linux) before build 1.8.7.615.\n\ud83d\udccf Published: 2025-02-27T23:00:16.679Z\n\ud83d\udccf Modified: 2025-02-27T23:00:16.679Z\n\ud83d\udd17 References:\n1. https://security-advisory.acronis.com/advisories/SEC-7649", "creation_timestamp": "2025-02-27T23:25:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5f0b0cec-74b1-4ea1-9216-9af5563068d0/export</guid>
      <pubDate>Thu, 27 Feb 2025 23:25:37 +0000</pubDate>
    </item>
    <item>
      <title>c86d7c90-f29d-446b-827e-10004b0383bf</title>
      <link>https://vulnerability.circl.lu/sighting/c86d7c90-f29d-446b-827e-10004b0383bf/export</link>
      <description>{"uuid": "c86d7c90-f29d-446b-827e-10004b0383bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24832", "type": "seen", "source": "https://t.me/cvedetector/19096", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24832 - Acronis Backup File Overwrite Symbolic Link Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24832 \nPublished : Feb. 27, 2025, 11:15 p.m. | 31\u00a0minutes ago \nDescription : Arbitrary file overwrite during home directory recovery due to improper symbolic link handling. The following products are affected: Acronis Backup plugin for cPanel &amp;amp; WHM (Linux) before build 1.8.4.866, Acronis Backup plugin for cPanel &amp;amp; WHM (Linux) before build 1.9.1.892, Acronis Backup extension for Plesk (Linux) before build 1.8.7.615. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T01:08:09.000000Z"}</description>
      <content:encoded>{"uuid": "c86d7c90-f29d-446b-827e-10004b0383bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24832", "type": "seen", "source": "https://t.me/cvedetector/19096", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24832 - Acronis Backup File Overwrite Symbolic Link Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24832 \nPublished : Feb. 27, 2025, 11:15 p.m. | 31\u00a0minutes ago \nDescription : Arbitrary file overwrite during home directory recovery due to improper symbolic link handling. The following products are affected: Acronis Backup plugin for cPanel &amp;amp; WHM (Linux) before build 1.8.4.866, Acronis Backup plugin for cPanel &amp;amp; WHM (Linux) before build 1.9.1.892, Acronis Backup extension for Plesk (Linux) before build 1.8.7.615. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T01:08:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c86d7c90-f29d-446b-827e-10004b0383bf/export</guid>
      <pubDate>Fri, 28 Feb 2025 01:08:09 +0000</pubDate>
    </item>
    <item>
      <title>dea88c55-f21d-4d95-8cf8-dd786e68d839</title>
      <link>https://vulnerability.circl.lu/sighting/dea88c55-f21d-4d95-8cf8-dd786e68d839/export</link>
      <description>{"uuid": "dea88c55-f21d-4d95-8cf8-dd786e68d839", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2483", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10040", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2483\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Gift Certificate Creator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018receip_address\u2019 parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-04-02T09:21:45.192Z\n\ud83d\udccf Modified: 2025-04-02T09:21:45.192Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/adbebe61-3adc-4ba1-8767-863dc2310cad?source=cve\n2. https://plugins.trac.wordpress.org/browser/gift-certificate-creator/trunk/giftcertificates.php#L312\n3. https://wordpress.org/plugins/gift-certificate-creator/#developers", "creation_timestamp": "2025-04-02T09:34:22.000000Z"}</description>
      <content:encoded>{"uuid": "dea88c55-f21d-4d95-8cf8-dd786e68d839", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2483", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10040", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2483\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Gift Certificate Creator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018receip_address\u2019 parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-04-02T09:21:45.192Z\n\ud83d\udccf Modified: 2025-04-02T09:21:45.192Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/adbebe61-3adc-4ba1-8767-863dc2310cad?source=cve\n2. https://plugins.trac.wordpress.org/browser/gift-certificate-creator/trunk/giftcertificates.php#L312\n3. https://wordpress.org/plugins/gift-certificate-creator/#developers", "creation_timestamp": "2025-04-02T09:34:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dea88c55-f21d-4d95-8cf8-dd786e68d839/export</guid>
      <pubDate>Wed, 02 Apr 2025 09:34:22 +0000</pubDate>
    </item>
    <item>
      <title>35e78394-62ef-40db-a961-6389a85a6e38</title>
      <link>https://vulnerability.circl.lu/sighting/35e78394-62ef-40db-a961-6389a85a6e38/export</link>
      <description>{"uuid": "35e78394-62ef-40db-a961-6389a85a6e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2483", "type": "seen", "source": "https://t.me/cvedetector/21858", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2483 - WordPress Gift Certificate Creator Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2483 \nPublished : April 2, 2025, 10:15 a.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : The Gift Certificate Creator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018receip_address\u2019 parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T14:58:59.000000Z"}</description>
      <content:encoded>{"uuid": "35e78394-62ef-40db-a961-6389a85a6e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2483", "type": "seen", "source": "https://t.me/cvedetector/21858", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2483 - WordPress Gift Certificate Creator Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2483 \nPublished : April 2, 2025, 10:15 a.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : The Gift Certificate Creator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018receip_address\u2019 parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T14:58:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/35e78394-62ef-40db-a961-6389a85a6e38/export</guid>
      <pubDate>Wed, 02 Apr 2025 14:58:59 +0000</pubDate>
    </item>
    <item>
      <title>923257d5-0462-46ef-b377-0fd85c3349bd</title>
      <link>https://vulnerability.circl.lu/sighting/923257d5-0462-46ef-b377-0fd85c3349bd/export</link>
      <description>{"uuid": "923257d5-0462-46ef-b377-0fd85c3349bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24839", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwfurl7k62v", "content": "", "creation_timestamp": "2025-04-16T10:43:46.503422Z"}</description>
      <content:encoded>{"uuid": "923257d5-0462-46ef-b377-0fd85c3349bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24839", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwfurl7k62v", "content": "", "creation_timestamp": "2025-04-16T10:43:46.503422Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/923257d5-0462-46ef-b377-0fd85c3349bd/export</guid>
      <pubDate>Wed, 16 Apr 2025 10:43:46 +0000</pubDate>
    </item>
    <item>
      <title>0a584ec5-b298-435a-b0fb-136822f25e9c</title>
      <link>https://vulnerability.circl.lu/sighting/0a584ec5-b298-435a-b0fb-136822f25e9c/export</link>
      <description>{"uuid": "0a584ec5-b298-435a-b0fb-136822f25e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24839", "type": "seen", "source": "https://t.me/cvedetector/23062", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24839 - Mattermost AI Bot Triggering Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24839 \nPublished : April 16, 2025, 8:15 a.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : Mattermost versions 10.5.x &amp;lt;=&amp;lt;=&amp;lt;=\nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T11:51:00.000000Z"}</description>
      <content:encoded>{"uuid": "0a584ec5-b298-435a-b0fb-136822f25e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24839", "type": "seen", "source": "https://t.me/cvedetector/23062", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24839 - Mattermost AI Bot Triggering Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24839 \nPublished : April 16, 2025, 8:15 a.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : Mattermost versions 10.5.x &amp;lt;=&amp;lt;=&amp;lt;=\nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T11:51:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0a584ec5-b298-435a-b0fb-136822f25e9c/export</guid>
      <pubDate>Wed, 16 Apr 2025 11:51:00 +0000</pubDate>
    </item>
    <item>
      <title>c2129df5-b72b-440e-9bfc-dc82122cb8de</title>
      <link>https://vulnerability.circl.lu/sighting/c2129df5-b72b-440e-9bfc-dc82122cb8de/export</link>
      <description>{"uuid": "c2129df5-b72b-440e-9bfc-dc82122cb8de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24831", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13175", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24831\n\ud83d\udd25 CVSS Score: 6.6 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Local privilege escalation due to unquoted search path vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378.\n\ud83d\udccf Published: 2025-01-31T12:42:57.048Z\n\ud83d\udccf Modified: 2025-04-24T03:55:25.585Z\n\ud83d\udd17 References:\n1. https://security-advisory.acronis.com/advisories/SEC-6153", "creation_timestamp": "2025-04-24T04:05:52.000000Z"}</description>
      <content:encoded>{"uuid": "c2129df5-b72b-440e-9bfc-dc82122cb8de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24831", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13175", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24831\n\ud83d\udd25 CVSS Score: 6.6 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Local privilege escalation due to unquoted search path vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378.\n\ud83d\udccf Published: 2025-01-31T12:42:57.048Z\n\ud83d\udccf Modified: 2025-04-24T03:55:25.585Z\n\ud83d\udd17 References:\n1. https://security-advisory.acronis.com/advisories/SEC-6153", "creation_timestamp": "2025-04-24T04:05:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c2129df5-b72b-440e-9bfc-dc82122cb8de/export</guid>
      <pubDate>Thu, 24 Apr 2025 04:05:52 +0000</pubDate>
    </item>
    <item>
      <title>f9a33518-3bae-4ee0-acf7-3526cdeb98e8</title>
      <link>https://vulnerability.circl.lu/sighting/f9a33518-3bae-4ee0-acf7-3526cdeb98e8/export</link>
      <description>{"uuid": "f9a33518-3bae-4ee0-acf7-3526cdeb98e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24830", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13176", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24830\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378.\n\ud83d\udccf Published: 2025-01-31T12:43:13.267Z\n\ud83d\udccf Modified: 2025-04-24T03:55:24.177Z\n\ud83d\udd17 References:\n1. https://security-advisory.acronis.com/advisories/SEC-7829", "creation_timestamp": "2025-04-24T04:05:54.000000Z"}</description>
      <content:encoded>{"uuid": "f9a33518-3bae-4ee0-acf7-3526cdeb98e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24830", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13176", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24830\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378.\n\ud83d\udccf Published: 2025-01-31T12:43:13.267Z\n\ud83d\udccf Modified: 2025-04-24T03:55:24.177Z\n\ud83d\udd17 References:\n1. https://security-advisory.acronis.com/advisories/SEC-7829", "creation_timestamp": "2025-04-24T04:05:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f9a33518-3bae-4ee0-acf7-3526cdeb98e8/export</guid>
      <pubDate>Thu, 24 Apr 2025 04:05:54 +0000</pubDate>
    </item>
    <item>
      <title>b9dbc664-360d-4184-b0de-0acba5214a32</title>
      <link>https://vulnerability.circl.lu/sighting/b9dbc664-360d-4184-b0de-0acba5214a32/export</link>
      <description>{"uuid": "b9dbc664-360d-4184-b0de-0acba5214a32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24838", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5epojx7ff2n", "content": "", "creation_timestamp": "2025-11-11T17:59:33.708141Z"}</description>
      <content:encoded>{"uuid": "b9dbc664-360d-4184-b0de-0acba5214a32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24838", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5epojx7ff2n", "content": "", "creation_timestamp": "2025-11-11T17:59:33.708141Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b9dbc664-360d-4184-b0de-0acba5214a32/export</guid>
      <pubDate>Tue, 11 Nov 2025 17:59:33 +0000</pubDate>
    </item>
  </channel>
</rss>
