<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:29:22.325734+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e8821736-369e-4670-811a-99e33f22d70b/export</id>
    <title>e8821736-369e-4670-811a-99e33f22d70b</title>
    <updated>2026-05-04T10:29:22.779046+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e8821736-369e-4670-811a-99e33f22d70b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25974", "type": "seen", "source": "https://t.me/ctinow/188250", "content": "https://ift.tt/qtX5A2V\nCVE-2024-25974", "creation_timestamp": "2024-02-20T09:31:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e8821736-369e-4670-811a-99e33f22d70b/export"/>
    <published>2024-02-20T09:31:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a631d7b0-963d-4eb4-b952-657343d0f703/export</id>
    <title>a631d7b0-963d-4eb4-b952-657343d0f703</title>
    <updated>2026-05-04T10:29:22.776309+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a631d7b0-963d-4eb4-b952-657343d0f703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25974", "type": "seen", "source": "https://t.me/arpsyndicate/3743", "content": "#ExploitObserverAlert\n\nCVE-2024-25974\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25974. The Frentix GmbH OpenOlat LMS is affected by stored a Cross-Site Scripting (XSS) vulnerability.\u00a0It is possible to upload files within the Media Center of OpenOlat version 18.1.5 (or lower) as an authenticated user without any other rights. Although the filetypes are limited, an SVG image containing an XSS payload can be uploaded.\u00a0After a successful upload the file can be shared with groups of users (including admins) who can be attacked with the JavaScript payload.", "creation_timestamp": "2024-02-21T07:46:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a631d7b0-963d-4eb4-b952-657343d0f703/export"/>
    <published>2024-02-21T07:46:41+00:00</published>
  </entry>
</feed>
