<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T17:33:59.088261+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c2b0b0c-7697-4273-b81f-b8bce726c079/export</id>
    <title>8c2b0b0c-7697-4273-b81f-b8bce726c079</title>
    <updated>2026-05-04T17:33:59.282984+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c2b0b0c-7697-4273-b81f-b8bce726c079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13288", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1149", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13288\n\ud83d\udd39 Description: Deserialization of Untrusted Data vulnerability in Drupal Monster Menus allows Object Injection.This issue affects Monster Menus: from 0.0.0 before 9.3.4, from 9.4.0 before 9.4.2.\n\ud83d\udccf Published: 2025-01-09T20:14:17.954Z\n\ud83d\udccf Modified: 2025-01-10T14:51:10.361Z\n\ud83d\udd17 References:\n1. https://www.drupal.org/sa-contrib-2024-052", "creation_timestamp": "2025-01-10T15:03:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c2b0b0c-7697-4273-b81f-b8bce726c079/export"/>
    <published>2025-01-10T15:03:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2b9e9fab-d577-44a1-8296-c7b917aaa4b6/export</id>
    <title>2b9e9fab-d577-44a1-8296-c7b917aaa4b6</title>
    <updated>2026-05-04T17:33:59.282913+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2b9e9fab-d577-44a1-8296-c7b917aaa4b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13287", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13287\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Views SVG Animation allows Cross-Site Scripting (XSS).This issue affects Views SVG Animation: from 0.0.0 before 1.0.1.\n\ud83d\udccf Published: 2025-01-09T20:13:41.775Z\n\ud83d\udccf Modified: 2025-01-10T16:56:41.515Z\n\ud83d\udd17 References:\n1. https://www.drupal.org/sa-contrib-2024-051", "creation_timestamp": "2025-01-10T17:03:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2b9e9fab-d577-44a1-8296-c7b917aaa4b6/export"/>
    <published>2025-01-10T17:03:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a14e6fe8-fc78-4b7e-af62-c1fbe89f98ea/export</id>
    <title>a14e6fe8-fc78-4b7e-af62-c1fbe89f98ea</title>
    <updated>2026-05-04T17:33:59.282826+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a14e6fe8-fc78-4b7e-af62-c1fbe89f98ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13289", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1184", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13289\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Cookiebot + GTM allows Cross-Site Scripting (XSS).This issue affects Cookiebot + GTM: from 0.0.0 before 1.0.18.\n\ud83d\udccf Published: 2025-01-09T20:15:15.665Z\n\ud83d\udccf Modified: 2025-01-10T16:32:37.239Z\n\ud83d\udd17 References:\n1. https://www.drupal.org/sa-contrib-2024-055", "creation_timestamp": "2025-01-10T17:05:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a14e6fe8-fc78-4b7e-af62-c1fbe89f98ea/export"/>
    <published>2025-01-10T17:05:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/34e8c4a7-992f-43c4-8b71-114700acef72/export</id>
    <title>34e8c4a7-992f-43c4-8b71-114700acef72</title>
    <updated>2026-05-04T17:33:59.282742+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "34e8c4a7-992f-43c4-8b71-114700acef72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13280", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805317190326121", "content": "", "creation_timestamp": "2025-01-10T17:49:02.125841Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/34e8c4a7-992f-43c4-8b71-114700acef72/export"/>
    <published>2025-01-10T17:49:02.125841+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8779c6e9-59f2-476d-b22f-f8294f2da3fa/export</id>
    <title>8779c6e9-59f2-476d-b22f-f8294f2da3fa</title>
    <updated>2026-05-04T17:33:59.282668+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8779c6e9-59f2-476d-b22f-f8294f2da3fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13281", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805317256140608", "content": "", "creation_timestamp": "2025-01-10T17:49:02.678431Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8779c6e9-59f2-476d-b22f-f8294f2da3fa/export"/>
    <published>2025-01-10T17:49:02.678431+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c715a12c-37aa-4378-b40c-563729118c2a/export</id>
    <title>c715a12c-37aa-4378-b40c-563729118c2a</title>
    <updated>2026-05-04T17:33:59.282587+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c715a12c-37aa-4378-b40c-563729118c2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13285", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805317423339214", "content": "", "creation_timestamp": "2025-01-10T17:49:03.182234Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c715a12c-37aa-4378-b40c-563729118c2a/export"/>
    <published>2025-01-10T17:49:03.182234+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d405b411-e56c-4e08-987c-0c6e06a1b99b/export</id>
    <title>d405b411-e56c-4e08-987c-0c6e06a1b99b</title>
    <updated>2026-05-04T17:33:59.282505+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d405b411-e56c-4e08-987c-0c6e06a1b99b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13282", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805317310556652", "content": "", "creation_timestamp": "2025-01-10T17:49:03.439374Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d405b411-e56c-4e08-987c-0c6e06a1b99b/export"/>
    <published>2025-01-10T17:49:03.439374+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/853907b4-c678-4041-bcf0-49d0ccf07466/export</id>
    <title>853907b4-c678-4041-bcf0-49d0ccf07466</title>
    <updated>2026-05-04T17:33:59.282425+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "853907b4-c678-4041-bcf0-49d0ccf07466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13284", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805317355559677", "content": "", "creation_timestamp": "2025-01-10T17:49:03.506149Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/853907b4-c678-4041-bcf0-49d0ccf07466/export"/>
    <published>2025-01-10T17:49:03.506149+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/16bc699c-d03e-4a2d-af83-e3c77026b82b/export</id>
    <title>16bc699c-d03e-4a2d-af83-e3c77026b82b</title>
    <updated>2026-05-04T17:33:59.282323+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "16bc699c-d03e-4a2d-af83-e3c77026b82b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13281", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffr5zcuxv2i", "content": "", "creation_timestamp": "2025-01-10T17:54:09.161629Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/16bc699c-d03e-4a2d-af83-e3c77026b82b/export"/>
    <published>2025-01-10T17:54:09.161629+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/63a8fef9-6953-4286-846e-8d5af9d64849/export</id>
    <title>63a8fef9-6953-4286-846e-8d5af9d64849</title>
    <updated>2026-05-04T17:33:59.280040+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "63a8fef9-6953-4286-846e-8d5af9d64849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13285", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffr5zjuv42y", "content": "", "creation_timestamp": "2025-01-10T17:54:10.407640Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/63a8fef9-6953-4286-846e-8d5af9d64849/export"/>
    <published>2025-01-10T17:54:10.407640+00:00</published>
  </entry>
</feed>
