<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T18:51:11.074425+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/df900823-30ec-4267-81fc-1af07ed44c7d/export</id>
    <title>df900823-30ec-4267-81fc-1af07ed44c7d</title>
    <updated>2026-05-06T18:51:11.519131+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "df900823-30ec-4267-81fc-1af07ed44c7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdfbrvuv722", "content": "", "creation_timestamp": "2025-01-09T19:16:09.662148Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/df900823-30ec-4267-81fc-1af07ed44c7d/export"/>
    <published>2025-01-09T19:16:09.662148+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fc7bf77c-b68e-4b26-9245-a653260d9993/export</id>
    <title>fc7bf77c-b68e-4b26-9245-a653260d9993</title>
    <updated>2026-05-06T18:51:11.519024+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fc7bf77c-b68e-4b26-9245-a653260d9993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1028", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13251\n\ud83d\udd39 Description: Incorrect Privilege Assignment vulnerability in Drupal Registration role allows Privilege Escalation.This issue affects Registration role: from 0.0.0 before 2.0.1.\n\ud83d\udccf Published: 2025-01-09T18:58:16.356Z\n\ud83d\udccf Modified: 2025-01-09T18:58:16.356Z\n\ud83d\udd17 References:\n1. https://www.drupal.org/sa-contrib-2024-015", "creation_timestamp": "2025-01-09T19:17:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fc7bf77c-b68e-4b26-9245-a653260d9993/export"/>
    <published>2025-01-09T19:17:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5f8e986b-2a1a-47b7-9c19-5efe3a7acf24/export</id>
    <title>5f8e986b-2a1a-47b7-9c19-5efe3a7acf24</title>
    <updated>2026-05-06T18:51:11.518909+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5f8e986b-2a1a-47b7-9c19-5efe3a7acf24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfdgka4cjw2q", "content": "", "creation_timestamp": "2025-01-09T19:38:50.046893Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5f8e986b-2a1a-47b7-9c19-5efe3a7acf24/export"/>
    <published>2025-01-09T19:38:50.046893+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/267738f6-5b39-4f7f-9798-beb50314125f/export</id>
    <title>267738f6-5b39-4f7f-9798-beb50314125f</title>
    <updated>2026-05-06T18:51:11.518745+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "267738f6-5b39-4f7f-9798-beb50314125f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://t.me/cvedetector/14890", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13251 - Drupal Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13251 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Privilege Assignment vulnerability in Drupal Registration role allows Privilege Escalation.This issue affects Registration role: from 0.0.0 before 2.0.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/267738f6-5b39-4f7f-9798-beb50314125f/export"/>
    <published>2025-01-09T21:06:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f9a765ae-f0fc-413d-aa80-78ab9f5adb9c/export</id>
    <title>f9a765ae-f0fc-413d-aa80-78ab9f5adb9c</title>
    <updated>2026-05-06T18:51:11.516963+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f9a765ae-f0fc-413d-aa80-78ab9f5adb9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13251", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316675395599", "content": "", "creation_timestamp": "2025-01-10T17:48:54.353227Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f9a765ae-f0fc-413d-aa80-78ab9f5adb9c/export"/>
    <published>2025-01-10T17:48:54.353227+00:00</published>
  </entry>
</feed>
