<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 11:53:53 +0000</lastBuildDate>
    <item>
      <title>205c5313-0e16-4286-a55d-7abf893e6231</title>
      <link>https://vulnerability.circl.lu/sighting/205c5313-0e16-4286-a55d-7abf893e6231/export</link>
      <description>{"uuid": "205c5313-0e16-4286-a55d-7abf893e6231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loot2zwpsb32", "content": "", "creation_timestamp": "2025-05-08T21:15:08.889251Z"}</description>
      <content:encoded>{"uuid": "205c5313-0e16-4286-a55d-7abf893e6231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loot2zwpsb32", "content": "", "creation_timestamp": "2025-05-08T21:15:08.889251Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/205c5313-0e16-4286-a55d-7abf893e6231/export</guid>
      <pubDate>Thu, 08 May 2025 21:15:08 +0000</pubDate>
    </item>
    <item>
      <title>e805f4e9-8abc-4773-911b-d97b289e3fd9</title>
      <link>https://vulnerability.circl.lu/sighting/e805f4e9-8abc-4773-911b-d97b289e3fd9/export</link>
      <description>{"uuid": "e805f4e9-8abc-4773-911b-d97b289e3fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loot34hb6nh2", "content": "", "creation_timestamp": "2025-05-08T21:15:11.208325Z"}</description>
      <content:encoded>{"uuid": "e805f4e9-8abc-4773-911b-d97b289e3fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loot34hb6nh2", "content": "", "creation_timestamp": "2025-05-08T21:15:11.208325Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e805f4e9-8abc-4773-911b-d97b289e3fd9/export</guid>
      <pubDate>Thu, 08 May 2025 21:15:11 +0000</pubDate>
    </item>
    <item>
      <title>625c69a4-8197-4b5b-a184-92e7fb68d3c7</title>
      <link>https://vulnerability.circl.lu/sighting/625c69a4-8197-4b5b-a184-92e7fb68d3c7/export</link>
      <description>{"uuid": "625c69a4-8197-4b5b-a184-92e7fb68d3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq33qdq2h", "content": "", "creation_timestamp": "2025-05-08T22:32:22.782199Z"}</description>
      <content:encoded>{"uuid": "625c69a4-8197-4b5b-a184-92e7fb68d3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq33qdq2h", "content": "", "creation_timestamp": "2025-05-08T22:32:22.782199Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/625c69a4-8197-4b5b-a184-92e7fb68d3c7/export</guid>
      <pubDate>Thu, 08 May 2025 22:32:22 +0000</pubDate>
    </item>
    <item>
      <title>090cff8e-da6f-4252-bc6b-976bdaf74b0b</title>
      <link>https://vulnerability.circl.lu/sighting/090cff8e-da6f-4252-bc6b-976bdaf74b0b/export</link>
      <description>{"uuid": "090cff8e-da6f-4252-bc6b-976bdaf74b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq3gbva2r", "content": "", "creation_timestamp": "2025-05-08T22:32:24.717210Z"}</description>
      <content:encoded>{"uuid": "090cff8e-da6f-4252-bc6b-976bdaf74b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq3gbva2r", "content": "", "creation_timestamp": "2025-05-08T22:32:24.717210Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/090cff8e-da6f-4252-bc6b-976bdaf74b0b/export</guid>
      <pubDate>Thu, 08 May 2025 22:32:24 +0000</pubDate>
    </item>
    <item>
      <title>ebf0fc6b-061e-4072-a130-38ed61927de7</title>
      <link>https://vulnerability.circl.lu/sighting/ebf0fc6b-061e-4072-a130-38ed61927de7/export</link>
      <description>{"uuid": "ebf0fc6b-061e-4072-a130-38ed61927de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45798", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq3tyww2j", "content": "", "creation_timestamp": "2025-05-08T22:32:27.229893Z"}</description>
      <content:encoded>{"uuid": "ebf0fc6b-061e-4072-a130-38ed61927de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45798", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq3tyww2j", "content": "", "creation_timestamp": "2025-05-08T22:32:27.229893Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ebf0fc6b-061e-4072-a130-38ed61927de7/export</guid>
      <pubDate>Thu, 08 May 2025 22:32:27 +0000</pubDate>
    </item>
    <item>
      <title>f925d5f6-6113-4a72-82b3-f6a6fac5b951</title>
      <link>https://vulnerability.circl.lu/sighting/f925d5f6-6113-4a72-82b3-f6a6fac5b951/export</link>
      <description>{"uuid": "f925d5f6-6113-4a72-82b3-f6a6fac5b951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://t.me/cvedetector/24863", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45790 - TOTOLINK A3100R Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-45790 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : TOTOLINK A3100R V5.9c.1527 is vulnerable to Buffer Overflow via the priority parameter in the setMacQos interface of /lib/cste_modules/firewall.so. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:57.000000Z"}</description>
      <content:encoded>{"uuid": "f925d5f6-6113-4a72-82b3-f6a6fac5b951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://t.me/cvedetector/24863", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45790 - TOTOLINK A3100R Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-45790 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : TOTOLINK A3100R V5.9c.1527 is vulnerable to Buffer Overflow via the priority parameter in the setMacQos interface of /lib/cste_modules/firewall.so. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f925d5f6-6113-4a72-82b3-f6a6fac5b951/export</guid>
      <pubDate>Fri, 09 May 2025 00:18:57 +0000</pubDate>
    </item>
    <item>
      <title>6000ccc6-ae2e-41f9-aa79-3965fddbf569</title>
      <link>https://vulnerability.circl.lu/sighting/6000ccc6-ae2e-41f9-aa79-3965fddbf569/export</link>
      <description>{"uuid": "6000ccc6-ae2e-41f9-aa79-3965fddbf569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://t.me/cvedetector/24864", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45797 - TOTOlink A950RG Buffer Overflow Vulnerability in NoticeUrl Parameter\", \n  \"Content\": \"CVE ID : CVE-2025-45797 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : TOTOlink A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the NoticeUrl parameter in the setNoticeCfg interface of /lib/cste_modules/system.so. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:58.000000Z"}</description>
      <content:encoded>{"uuid": "6000ccc6-ae2e-41f9-aa79-3965fddbf569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://t.me/cvedetector/24864", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45797 - TOTOlink A950RG Buffer Overflow Vulnerability in NoticeUrl Parameter\", \n  \"Content\": \"CVE ID : CVE-2025-45797 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : TOTOlink A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the NoticeUrl parameter in the setNoticeCfg interface of /lib/cste_modules/system.so. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6000ccc6-ae2e-41f9-aa79-3965fddbf569/export</guid>
      <pubDate>Fri, 09 May 2025 00:18:58 +0000</pubDate>
    </item>
    <item>
      <title>f25b6cc1-2a17-4dec-abd4-84633d2d8843</title>
      <link>https://vulnerability.circl.lu/sighting/f25b6cc1-2a17-4dec-abd4-84633d2d8843/export</link>
      <description>{"uuid": "f25b6cc1-2a17-4dec-abd4-84633d2d8843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45798", "type": "seen", "source": "https://t.me/cvedetector/24865", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45798 - TOTOLINK A950RG Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-45798 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : A command execution vulnerability exists in the TOTOLINK A950RG V4.1.2cu.5204_B20210112. The vulnerability is located in the setNoticeCfg interface within the /lib/cste_modules/system.so library, specifically in the processing of the IpTo parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:59.000000Z"}</description>
      <content:encoded>{"uuid": "f25b6cc1-2a17-4dec-abd4-84633d2d8843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45798", "type": "seen", "source": "https://t.me/cvedetector/24865", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45798 - TOTOLINK A950RG Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-45798 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : A command execution vulnerability exists in the TOTOLINK A950RG V4.1.2cu.5204_B20210112. The vulnerability is located in the setNoticeCfg interface within the /lib/cste_modules/system.so library, specifically in the processing of the IpTo parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f25b6cc1-2a17-4dec-abd4-84633d2d8843/export</guid>
      <pubDate>Fri, 09 May 2025 00:18:59 +0000</pubDate>
    </item>
    <item>
      <title>19dfe7d4-2fea-49be-85d3-5617b1d52d60</title>
      <link>https://vulnerability.circl.lu/sighting/19dfe7d4-2fea-49be-85d3-5617b1d52d60/export</link>
      <description>{"uuid": "19dfe7d4-2fea-49be-85d3-5617b1d52d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4579", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16437", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4579\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The WP Content Security Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the blocked-uri and effective-directive  parameters in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-05-15T01:59:23.874Z\n\ud83d\udccf Modified: 2025-05-15T01:59:23.874Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f3c4ba08-a9fa-439a-a887-b8c113f78e20?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L597\n3. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L612\n4. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L659", "creation_timestamp": "2025-05-15T02:32:10.000000Z"}</description>
      <content:encoded>{"uuid": "19dfe7d4-2fea-49be-85d3-5617b1d52d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4579", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16437", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4579\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The WP Content Security Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the blocked-uri and effective-directive  parameters in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-05-15T01:59:23.874Z\n\ud83d\udccf Modified: 2025-05-15T01:59:23.874Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f3c4ba08-a9fa-439a-a887-b8c113f78e20?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L597\n3. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L612\n4. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L659", "creation_timestamp": "2025-05-15T02:32:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/19dfe7d4-2fea-49be-85d3-5617b1d52d60/export</guid>
      <pubDate>Thu, 15 May 2025 02:32:10 +0000</pubDate>
    </item>
    <item>
      <title>31d1e74f-3425-4cbb-8812-52c47fd6351e</title>
      <link>https://vulnerability.circl.lu/sighting/31d1e74f-3425-4cbb-8812-52c47fd6351e/export</link>
      <description>{"uuid": "31d1e74f-3425-4cbb-8812-52c47fd6351e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4579", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp6jdx32gf2p", "content": "", "creation_timestamp": "2025-05-15T02:57:35.144083Z"}</description>
      <content:encoded>{"uuid": "31d1e74f-3425-4cbb-8812-52c47fd6351e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4579", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp6jdx32gf2p", "content": "", "creation_timestamp": "2025-05-15T02:57:35.144083Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/31d1e74f-3425-4cbb-8812-52c47fd6351e/export</guid>
      <pubDate>Thu, 15 May 2025 02:57:35 +0000</pubDate>
    </item>
  </channel>
</rss>
