<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T16:06:02.994085+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/873d196a-9dce-4d15-b859-3e5c888300e4/export</id>
    <title>873d196a-9dce-4d15-b859-3e5c888300e4</title>
    <updated>2026-05-05T16:06:03.273555+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "873d196a-9dce-4d15-b859-3e5c888300e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12006", "type": "seen", "source": "https://t.me/cvedetector/15234", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12006 - W3 Total Cache Unauthorized Data Modification\", \n  \"Content\": \"CVE ID : CVE-2024-12006 \nPublished : Jan. 14, 2025, 7:15 a.m. | 38\u00a0minutes ago \nDescription : The W3 Total Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 2.8.1. This makes it possible for unauthenticated attackers to deactivate the plugin as well as activate and deactivate plugin extensions. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T08:58:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/873d196a-9dce-4d15-b859-3e5c888300e4/export"/>
    <published>2025-01-14T08:58:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2ec84f40-3969-4762-ac4d-7fdc4f9d97bb/export</id>
    <title>2ec84f40-3969-4762-ac4d-7fdc4f9d97bb</title>
    <updated>2026-05-05T16:06:03.273481+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2ec84f40-3969-4762-ac4d-7fdc4f9d97bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113865629807346067", "content": "", "creation_timestamp": "2025-01-21T09:27:07.693885Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2ec84f40-3969-4762-ac4d-7fdc4f9d97bb/export"/>
    <published>2025-01-21T09:27:07.693885+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a8ad8d6c-e2ad-4aa4-ae7a-7e20d36559d8/export</id>
    <title>a8ad8d6c-e2ad-4aa4-ae7a-7e20d36559d8</title>
    <updated>2026-05-05T16:06:03.273402+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a8ad8d6c-e2ad-4aa4-ae7a-7e20d36559d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2383", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12005\n\ud83d\udd39 Description: The WP-BibTeX plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.1. This is due to missing or incorrect nonce validation on the wp_bibtex_option_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-01-21T09:21:09.602Z\n\ud83d\udccf Modified: 2025-01-21T09:21:09.602Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/077538e2-ef9a-490f-9188-31f9cb82aaf7?source=cve\n2. https://wordpress.org/plugins/wp-bibtex/#developers\n3. https://plugins.trac.wordpress.org/browser/wp-bibtex/trunk/wp-bibtex-options.php#L55\n4. https://plugins.trac.wordpress.org/changeset/3225023", "creation_timestamp": "2025-01-21T10:01:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a8ad8d6c-e2ad-4aa4-ae7a-7e20d36559d8/export"/>
    <published>2025-01-21T10:01:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a4991dc-cf58-46fc-8644-513a094e12b1/export</id>
    <title>4a4991dc-cf58-46fc-8644-513a094e12b1</title>
    <updated>2026-05-05T16:06:03.273329+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a4991dc-cf58-46fc-8644-513a094e12b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgamnzcv6g2j", "content": "", "creation_timestamp": "2025-01-21T10:15:28.980285Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a4991dc-cf58-46fc-8644-513a094e12b1/export"/>
    <published>2025-01-21T10:15:28.980285+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/43168818-2c44-48cd-a918-6ddbb6ba1f9f/export</id>
    <title>43168818-2c44-48cd-a918-6ddbb6ba1f9f</title>
    <updated>2026-05-05T16:06:03.273255+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "43168818-2c44-48cd-a918-6ddbb6ba1f9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgaoklkoip2e", "content": "", "creation_timestamp": "2025-01-21T10:49:21.521963Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/43168818-2c44-48cd-a918-6ddbb6ba1f9f/export"/>
    <published>2025-01-21T10:49:21.521963+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7c812632-0caa-4e85-b328-668c9698e42f/export</id>
    <title>7c812632-0caa-4e85-b328-668c9698e42f</title>
    <updated>2026-05-05T16:06:03.273173+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7c812632-0caa-4e85-b328-668c9698e42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12005", "type": "seen", "source": "https://t.me/cvedetector/15912", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12005 - \"WordPress WP-BibTeX CSRF\"\", \n  \"Content\": \"CVE ID : CVE-2024-12005 \nPublished : Jan. 21, 2025, 10:15 a.m. | 38\u00a0minutes ago \nDescription : The WP-BibTeX plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.1. This is due to missing or incorrect nonce validation on the wp_bibtex_option_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T11:56:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7c812632-0caa-4e85-b328-668c9698e42f/export"/>
    <published>2025-01-21T11:56:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e0673db1-d496-40fa-9243-6a091a1aef40/export</id>
    <title>e0673db1-d496-40fa-9243-6a091a1aef40</title>
    <updated>2026-05-05T16:06:03.273086+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e0673db1-d496-40fa-9243-6a091a1aef40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12009", "type": "seen", "source": "https://t.me/cvedetector/20028", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12009 - Zyxel EX5601-T1 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12009 \nPublished : March 11, 2025, 2:15 a.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : A post-authentication command injection vulnerability in the \"ZyEE\" function of the Zyxel EX5601-T1 firmware version V5.70(ACDZ.3.6)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T05:05:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e0673db1-d496-40fa-9243-6a091a1aef40/export"/>
    <published>2025-03-11T05:05:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e5ecd5cc-bc13-4fd5-a3df-3bbd5fcf852e/export</id>
    <title>e5ecd5cc-bc13-4fd5-a3df-3bbd5fcf852e</title>
    <updated>2026-05-05T16:06:03.273002+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e5ecd5cc-bc13-4fd5-a3df-3bbd5fcf852e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12009", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk3ey3rdoh2h", "content": "", "creation_timestamp": "2025-03-11T05:55:25.546478Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e5ecd5cc-bc13-4fd5-a3df-3bbd5fcf852e/export"/>
    <published>2025-03-11T05:55:25.546478+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c0bb31e5-81fa-47dd-a7b7-e504e929d083/export</id>
    <title>c0bb31e5-81fa-47dd-a7b7-e504e929d083</title>
    <updated>2026-05-05T16:06:03.272894+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c0bb31e5-81fa-47dd-a7b7-e504e929d083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12008", "type": "seen", "source": "Telegram/fSuv2KpyfIksaa8qqgqv5fCpt00UzRfooou1l9gqHjc-A0g", "content": "", "creation_timestamp": "2025-03-11T22:00:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c0bb31e5-81fa-47dd-a7b7-e504e929d083/export"/>
    <published>2025-03-11T22:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a5296a20-7234-4d4a-8b1a-0a3c41e4fb36/export</id>
    <title>a5296a20-7234-4d4a-8b1a-0a3c41e4fb36</title>
    <updated>2026-05-05T16:06:03.268975+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a5296a20-7234-4d4a-8b1a-0a3c41e4fb36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12008", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmuxxzvqyr2t", "content": "", "creation_timestamp": "2025-04-15T21:02:27.785007Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a5296a20-7234-4d4a-8b1a-0a3c41e4fb36/export"/>
    <published>2025-04-15T21:02:27.785007+00:00</published>
  </entry>
</feed>
