<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 23:02:48 +0000</lastBuildDate>
    <item>
      <title>f2de4a2f-ab5d-43af-bd58-9e29de0377ce</title>
      <link>https://vulnerability.circl.lu/sighting/f2de4a2f-ab5d-43af-bd58-9e29de0377ce/export</link>
      <description>{"uuid": "f2de4a2f-ab5d-43af-bd58-9e29de0377ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30570", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9725", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30570\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AliRezaMohammadi \u062f\u06a9\u0645\u0647\u060c \u0634\u0628\u06a9\u0647 \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u062e\u0631\u06cc\u062f allows SQL Injection. This issue affects \u062f\u06a9\u0645\u0647\u060c \u0634\u0628\u06a9\u0647 \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u062e\u0631\u06cc\u062f: from n/a through 2.0.6.\n\ud83d\udccf Published: 2025-03-24T13:47:04.976Z\n\ud83d\udccf Modified: 2025-03-31T18:22:34.552Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/dokme/vulnerability/wordpress-d-mh-shb-h-gtm-aa-khr-d-2-0-6-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:00.000000Z"}</description>
      <content:encoded>{"uuid": "f2de4a2f-ab5d-43af-bd58-9e29de0377ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30570", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9725", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30570\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AliRezaMohammadi \u062f\u06a9\u0645\u0647\u060c \u0634\u0628\u06a9\u0647 \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u062e\u0631\u06cc\u062f allows SQL Injection. This issue affects \u062f\u06a9\u0645\u0647\u060c \u0634\u0628\u06a9\u0647 \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u062e\u0631\u06cc\u062f: from n/a through 2.0.6.\n\ud83d\udccf Published: 2025-03-24T13:47:04.976Z\n\ud83d\udccf Modified: 2025-03-31T18:22:34.552Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/dokme/vulnerability/wordpress-d-mh-shb-h-gtm-aa-khr-d-2-0-6-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2de4a2f-ab5d-43af-bd58-9e29de0377ce/export</guid>
      <pubDate>Mon, 31 Mar 2025 18:32:00 +0000</pubDate>
    </item>
    <item>
      <title>bab6820e-35e0-4c35-9012-38d30c91f1b4</title>
      <link>https://vulnerability.circl.lu/sighting/bab6820e-35e0-4c35-9012-38d30c91f1b4/export</link>
      <description>{"uuid": "bab6820e-35e0-4c35-9012-38d30c91f1b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30571", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9726", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30571\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in STEdb Corp. STEdb Forms allows SQL Injection. This issue affects STEdb Forms: from n/a through 1.0.4.\n\ud83d\udccf Published: 2025-03-24T13:47:05.603Z\n\ud83d\udccf Modified: 2025-03-31T18:22:10.981Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/stedb-forms/vulnerability/wordpress-stedb-forms-1-0-4-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:04.000000Z"}</description>
      <content:encoded>{"uuid": "bab6820e-35e0-4c35-9012-38d30c91f1b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30571", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9726", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30571\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in STEdb Corp. STEdb Forms allows SQL Injection. This issue affects STEdb Forms: from n/a through 1.0.4.\n\ud83d\udccf Published: 2025-03-24T13:47:05.603Z\n\ud83d\udccf Modified: 2025-03-31T18:22:10.981Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/stedb-forms/vulnerability/wordpress-stedb-forms-1-0-4-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bab6820e-35e0-4c35-9012-38d30c91f1b4/export</guid>
      <pubDate>Mon, 31 Mar 2025 18:32:04 +0000</pubDate>
    </item>
    <item>
      <title>fb2b1e20-f202-4a51-908b-15135a8d841e</title>
      <link>https://vulnerability.circl.lu/sighting/fb2b1e20-f202-4a51-908b-15135a8d841e/export</link>
      <description>{"uuid": "fb2b1e20-f202-4a51-908b-15135a8d841e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30572", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9727", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30572\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Igor Yavych Simple Rating allows Stored XSS. This issue affects Simple Rating: from n/a through 1.4.\n\ud83d\udccf Published: 2025-03-24T13:47:06.245Z\n\ud83d\udccf Modified: 2025-03-31T18:21:46.541Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/simple-rating/vulnerability/wordpress-simple-rating-plugin-1-4-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:06.000000Z"}</description>
      <content:encoded>{"uuid": "fb2b1e20-f202-4a51-908b-15135a8d841e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30572", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9727", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30572\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Igor Yavych Simple Rating allows Stored XSS. This issue affects Simple Rating: from n/a through 1.4.\n\ud83d\udccf Published: 2025-03-24T13:47:06.245Z\n\ud83d\udccf Modified: 2025-03-31T18:21:46.541Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/simple-rating/vulnerability/wordpress-simple-rating-plugin-1-4-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fb2b1e20-f202-4a51-908b-15135a8d841e/export</guid>
      <pubDate>Mon, 31 Mar 2025 18:32:06 +0000</pubDate>
    </item>
    <item>
      <title>61689cab-0360-41da-85be-d2456dea2bda</title>
      <link>https://vulnerability.circl.lu/sighting/61689cab-0360-41da-85be-d2456dea2bda/export</link>
      <description>{"uuid": "61689cab-0360-41da-85be-d2456dea2bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30573", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9730", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30573\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mrdenny My Default Post Content allows Stored XSS. This issue affects My Default Post Content: from n/a through 0.7.3.\n\ud83d\udccf Published: 2025-03-24T13:47:06.873Z\n\ud83d\udccf Modified: 2025-03-31T18:21:11.041Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/my-default-post-content/vulnerability/wordpress-my-default-post-content-0-7-3-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:09.000000Z"}</description>
      <content:encoded>{"uuid": "61689cab-0360-41da-85be-d2456dea2bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30573", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9730", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30573\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mrdenny My Default Post Content allows Stored XSS. This issue affects My Default Post Content: from n/a through 0.7.3.\n\ud83d\udccf Published: 2025-03-24T13:47:06.873Z\n\ud83d\udccf Modified: 2025-03-31T18:21:11.041Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/my-default-post-content/vulnerability/wordpress-my-default-post-content-0-7-3-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/61689cab-0360-41da-85be-d2456dea2bda/export</guid>
      <pubDate>Mon, 31 Mar 2025 18:32:09 +0000</pubDate>
    </item>
    <item>
      <title>2b4b6cc2-87a8-45d1-b748-f76b83d4f154</title>
      <link>https://vulnerability.circl.lu/sighting/2b4b6cc2-87a8-45d1-b748-f76b83d4f154/export</link>
      <description>{"uuid": "2b4b6cc2-87a8-45d1-b748-f76b83d4f154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30574", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9733", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30574\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jenst Mobile Navigation allows Stored XSS. This issue affects Mobile Navigation: from n/a through 1.5.\n\ud83d\udccf Published: 2025-03-24T13:47:07.506Z\n\ud83d\udccf Modified: 2025-03-31T18:20:27.795Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/mobile-navigation/vulnerability/wordpress-mobile-navigation-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:11.000000Z"}</description>
      <content:encoded>{"uuid": "2b4b6cc2-87a8-45d1-b748-f76b83d4f154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30574", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9733", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30574\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jenst Mobile Navigation allows Stored XSS. This issue affects Mobile Navigation: from n/a through 1.5.\n\ud83d\udccf Published: 2025-03-24T13:47:07.506Z\n\ud83d\udccf Modified: 2025-03-31T18:20:27.795Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/mobile-navigation/vulnerability/wordpress-mobile-navigation-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2b4b6cc2-87a8-45d1-b748-f76b83d4f154/export</guid>
      <pubDate>Mon, 31 Mar 2025 18:32:11 +0000</pubDate>
    </item>
    <item>
      <title>0bbf3e8a-970c-4719-846d-cce22342ea48</title>
      <link>https://vulnerability.circl.lu/sighting/0bbf3e8a-970c-4719-846d-cce22342ea48/export</link>
      <description>{"uuid": "0bbf3e8a-970c-4719-846d-cce22342ea48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30575", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9734", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30575\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arefly Login Redirect allows Stored XSS. This issue affects Login Redirect: from n/a through 1.0.5.\n\ud83d\udccf Published: 2025-03-24T13:47:08.143Z\n\ud83d\udccf Modified: 2025-03-31T18:20:05.626Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/login-redirect/vulnerability/wordpress-login-redirect-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:12.000000Z"}</description>
      <content:encoded>{"uuid": "0bbf3e8a-970c-4719-846d-cce22342ea48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30575", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9734", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30575\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arefly Login Redirect allows Stored XSS. This issue affects Login Redirect: from n/a through 1.0.5.\n\ud83d\udccf Published: 2025-03-24T13:47:08.143Z\n\ud83d\udccf Modified: 2025-03-31T18:20:05.626Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/login-redirect/vulnerability/wordpress-login-redirect-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-31T18:32:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0bbf3e8a-970c-4719-846d-cce22342ea48/export</guid>
      <pubDate>Mon, 31 Mar 2025 18:32:12 +0000</pubDate>
    </item>
    <item>
      <title>42387d82-2ad5-4af0-adc0-640c8bcf3eb0</title>
      <link>https://vulnerability.circl.lu/sighting/42387d82-2ad5-4af0-adc0-640c8bcf3eb0/export</link>
      <description>{"uuid": "42387d82-2ad5-4af0-adc0-640c8bcf3eb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3057", "type": "seen", "source": "https://t.me/cvedetector/21657", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3057 - Drupal Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-3057 \nPublished : March 31, 2025, 10:15 p.m. | 51\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Drupal core allows Cross-Site Scripting (XSS).This issue affects Drupal core: from 8.0.0 before 10.3.13, from 10.4.0 before 10.4.3, from 11.0.0 before 11.0.12, from 11.1.0 before 11.1.3. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T01:54:26.000000Z"}</description>
      <content:encoded>{"uuid": "42387d82-2ad5-4af0-adc0-640c8bcf3eb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3057", "type": "seen", "source": "https://t.me/cvedetector/21657", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3057 - Drupal Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-3057 \nPublished : March 31, 2025, 10:15 p.m. | 51\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Drupal core allows Cross-Site Scripting (XSS).This issue affects Drupal core: from 8.0.0 before 10.3.13, from 10.4.0 before 10.4.3, from 11.0.0 before 11.0.12, from 11.1.0 before 11.1.3. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T01:54:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/42387d82-2ad5-4af0-adc0-640c8bcf3eb0/export</guid>
      <pubDate>Tue, 01 Apr 2025 01:54:26 +0000</pubDate>
    </item>
  </channel>
</rss>
