<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T14:09:49.561439+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1d4ce23c-3cde-45eb-98bb-58ed07975c23/export</id>
    <title>1d4ce23c-3cde-45eb-98bb-58ed07975c23</title>
    <updated>2026-05-07T14:09:49.828600+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1d4ce23c-3cde-45eb-98bb-58ed07975c23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13256", "type": "seen", "source": "https://t.me/cvedetector/14886", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13256 - Drupal Email Contact Access Bypass Weakness\", \n  \"Content\": \"CVE ID : CVE-2024-13256 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Insufficient Granularity of Access Control vulnerability in Drupal Email Contact allows Forceful Browsing.This issue affects Email Contact: from 0.0.0 before 2.0.4. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1d4ce23c-3cde-45eb-98bb-58ed07975c23/export"/>
    <published>2025-01-09T21:06:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/048d5f55-e25b-45c7-9b3a-9eac0632a521/export</id>
    <title>048d5f55-e25b-45c7-9b3a-9eac0632a521</title>
    <updated>2026-05-07T14:09:49.828473+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "048d5f55-e25b-45c7-9b3a-9eac0632a521", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://t.me/cvedetector/14888", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13258 - \"Drupal JSON API Unauthorized Access\"\", \n  \"Content\": \"CVE ID : CVE-2024-13258 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Authorization vulnerability in Drupal Drupal REST &amp;amp; JSON API Authentication allows Forceful Browsing.This issue affects Drupal REST &amp;amp; JSON API Authentication: from 0.0.0 before 2.0.13. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/048d5f55-e25b-45c7-9b3a-9eac0632a521/export"/>
    <published>2025-01-09T21:06:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/01313ff3-019c-4d2b-83fa-32e85da5aec8/export</id>
    <title>01313ff3-019c-4d2b-83fa-32e85da5aec8</title>
    <updated>2026-05-07T14:09:49.828392+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "01313ff3-019c-4d2b-83fa-32e85da5aec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13257", "type": "seen", "source": "https://t.me/cvedetector/14887", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13257 - Drupal Commerce Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-13257 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Authorization vulnerability in Drupal Commerce View Receipt allows Forceful Browsing.This issue affects Commerce View Receipt: from 0.0.0 before 1.0.3. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/01313ff3-019c-4d2b-83fa-32e85da5aec8/export"/>
    <published>2025-01-09T21:06:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d304a5f2-088d-4724-96a2-b2c0cdf15f6b/export</id>
    <title>d304a5f2-088d-4724-96a2-b2c0cdf15f6b</title>
    <updated>2026-05-07T14:09:49.828300+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d304a5f2-088d-4724-96a2-b2c0cdf15f6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13259", "type": "seen", "source": "https://t.me/cvedetector/14889", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13259 - \"Drupal Image Sizes Sensitive Information Insertion Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13259 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Insertion of Sensitive Information Into Sent Data vulnerability in Drupal Image Sizes allows Forceful Browsing.This issue affects Image Sizes: from 0.0.0 before 3.0.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d304a5f2-088d-4724-96a2-b2c0cdf15f6b/export"/>
    <published>2025-01-09T21:06:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/267738f6-5b39-4f7f-9798-beb50314125f/export</id>
    <title>267738f6-5b39-4f7f-9798-beb50314125f</title>
    <updated>2026-05-07T14:09:49.828211+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "267738f6-5b39-4f7f-9798-beb50314125f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://t.me/cvedetector/14890", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13251 - Drupal Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13251 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Privilege Assignment vulnerability in Drupal Registration role allows Privilege Escalation.This issue affects Registration role: from 0.0.0 before 2.0.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/267738f6-5b39-4f7f-9798-beb50314125f/export"/>
    <published>2025-01-09T21:06:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/18899566-d014-45ab-9879-57c552a2b4df/export</id>
    <title>18899566-d014-45ab-9879-57c552a2b4df</title>
    <updated>2026-05-07T14:09:49.828094+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "18899566-d014-45ab-9879-57c552a2b4df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13252", "type": "seen", "source": "https://t.me/cvedetector/14891", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13252 - Drupal TacJS Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-13252 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal TacJS allows Cross-Site Scripting (XSS).This issue affects TacJS: from 0.0.0 before 6.5.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:07:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/18899566-d014-45ab-9879-57c552a2b4df/export"/>
    <published>2025-01-09T21:07:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f2cb9c1a-0c7e-47e8-a3c9-b85ab9bf8843/export</id>
    <title>f2cb9c1a-0c7e-47e8-a3c9-b85ab9bf8843</title>
    <updated>2026-05-07T14:09:49.827980+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f2cb9c1a-0c7e-47e8-a3c9-b85ab9bf8843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13250", "type": "seen", "source": "https://t.me/cvedetector/14899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13250 - Drupal Symfony Mailer Lite CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-13250 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Drupal Drupal Symfony Mailer Lite allows Cross Site Request Forgery.This issue affects Drupal Symfony Mailer Lite: from 0.0.0 before 1.0.6. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:07:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f2cb9c1a-0c7e-47e8-a3c9-b85ab9bf8843/export"/>
    <published>2025-01-09T21:07:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f9a765ae-f0fc-413d-aa80-78ab9f5adb9c/export</id>
    <title>f9a765ae-f0fc-413d-aa80-78ab9f5adb9c</title>
    <updated>2026-05-07T14:09:49.827871+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f9a765ae-f0fc-413d-aa80-78ab9f5adb9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316675395599", "content": "", "creation_timestamp": "2025-01-10T17:48:54.353227Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f9a765ae-f0fc-413d-aa80-78ab9f5adb9c/export"/>
    <published>2025-01-10T17:48:54.353227+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/09bad3ec-0ef5-4f5e-94ea-669d3175bd9f/export</id>
    <title>09bad3ec-0ef5-4f5e-94ea-669d3175bd9f</title>
    <updated>2026-05-07T14:09:49.827707+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "09bad3ec-0ef5-4f5e-94ea-669d3175bd9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316847032256", "content": "", "creation_timestamp": "2025-01-10T17:48:58.737344Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/09bad3ec-0ef5-4f5e-94ea-669d3175bd9f/export"/>
    <published>2025-01-10T17:48:58.737344+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7e79ab99-ec20-4232-9932-65f1d2477e0c/export</id>
    <title>7e79ab99-ec20-4232-9932-65f1d2477e0c</title>
    <updated>2026-05-07T14:09:49.823834+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7e79ab99-ec20-4232-9932-65f1d2477e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13253", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316779208716", "content": "", "creation_timestamp": "2025-01-10T17:48:58.922242Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7e79ab99-ec20-4232-9932-65f1d2477e0c/export"/>
    <published>2025-01-10T17:48:58.922242+00:00</published>
  </entry>
</feed>
