<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T06:10:19.526371+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cbb77333-7401-42c9-bcb3-7ec675dd8be5/export</id>
    <title>cbb77333-7401-42c9-bcb3-7ec675dd8be5</title>
    <updated>2026-05-10T06:10:19.710273+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cbb77333-7401-42c9-bcb3-7ec675dd8be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/scada/mypro_mgr_creds.rb", "content": "", "creation_timestamp": "2025-02-25T10:42:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cbb77333-7401-42c9-bcb3-7ec675dd8be5/export"/>
    <published>2025-02-25T10:42:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/551dd440-0cbc-45f9-9946-46924aacedfc/export</id>
    <title>551dd440-0cbc-45f9-9946-46924aacedfc</title>
    <updated>2026-05-10T06:10:19.710194+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "551dd440-0cbc-45f9-9946-46924aacedfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-26T02:35:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/551dd440-0cbc-45f9-9946-46924aacedfc/export"/>
    <published>2025-02-26T02:35:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7e7e7971-3c98-4ed2-a71e-3122618d34ac/export</id>
    <title>7e7e7971-3c98-4ed2-a71e-3122618d34ac</title>
    <updated>2026-05-10T06:10:19.710114+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7e7e7971-3c98-4ed2-a71e-3122618d34ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lj4blb2qxv2k", "content": "", "creation_timestamp": "2025-02-26T21:02:05.080634Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7e7e7971-3c98-4ed2-a71e-3122618d34ac/export"/>
    <published>2025-02-26T21:02:05.080634+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cad226d8-dbe4-4006-9ce6-759826973543/export</id>
    <title>cad226d8-dbe4-4006-9ce6-759826973543</title>
    <updated>2026-05-10T06:10:19.710034+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cad226d8-dbe4-4006-9ce6-759826973543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "https://bsky.app/profile/rajsamani.bsky.social/post/3ljhibmmnms2v", "content": "", "creation_timestamp": "2025-03-03T08:01:12.115093Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cad226d8-dbe4-4006-9ce6-759826973543/export"/>
    <published>2025-03-03T08:01:12.115093+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/34083f6b-f550-46d5-b188-2534c68ef97f/export</id>
    <title>34083f6b-f550-46d5-b188-2534c68ef97f</title>
    <updated>2026-05-10T06:10:19.709950+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "34083f6b-f550-46d5-b188-2534c68ef97f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22897", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6325", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22897\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.\n\ud83d\udccf Published: 2025-03-04T03:44:44.313Z\n\ud83d\udccf Modified: 2025-03-04T03:44:44.313Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", "creation_timestamp": "2025-03-04T04:34:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/34083f6b-f550-46d5-b188-2534c68ef97f/export"/>
    <published>2025-03-04T04:34:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a40e5236-5d8b-479d-8e03-0992fb4675f3/export</id>
    <title>a40e5236-5d8b-479d-8e03-0992fb4675f3</title>
    <updated>2026-05-10T06:10:19.709843+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a40e5236-5d8b-479d-8e03-0992fb4675f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22897", "type": "seen", "source": "https://t.me/cvedetector/19454", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22897 - OpenHarmony Buffer Overflow DOS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22897 \nPublished : March 4, 2025, 4:15 a.m. | 22\u00a0minutes ago \nDescription : in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T05:48:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a40e5236-5d8b-479d-8e03-0992fb4675f3/export"/>
    <published>2025-03-04T05:48:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/37715659-b006-4f59-a25e-30bcbd2b2339/export</id>
    <title>37715659-b006-4f59-a25e-30bcbd2b2339</title>
    <updated>2026-05-10T06:10:19.709745+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "37715659-b006-4f59-a25e-30bcbd2b2339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2289", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7534", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2289\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The Zegen - Church WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX endpoints in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import, export, and update theme options.\n\ud83d\udccf Published: 2025-03-14T05:24:02.910Z\n\ud83d\udccf Modified: 2025-03-14T05:24:02.910Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/a04db024-5198-490f-bf5f-d5bad1b21ce4?source=cve\n2. https://themeforest.net/item/zegen-church-wordpress-theme/25116823", "creation_timestamp": "2025-03-14T05:46:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/37715659-b006-4f59-a25e-30bcbd2b2339/export"/>
    <published>2025-03-14T05:46:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f5932984-5844-4b71-975c-1962be6de670/export</id>
    <title>f5932984-5844-4b71-975c-1962be6de670</title>
    <updated>2026-05-10T06:10:19.709642+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f5932984-5844-4b71-975c-1962be6de670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2289", "type": "seen", "source": "https://t.me/cvedetector/20263", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2289 - Zegen - Church WordPress Theme Unauthenticated AJAX Endpoint Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2289 \nPublished : March 14, 2025, 6:15 a.m. | 27\u00a0minutes ago \nDescription : The Zegen - Church WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX endpoints in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import, export, and update theme options. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T08:20:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f5932984-5844-4b71-975c-1962be6de670/export"/>
    <published>2025-03-14T08:20:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/887688ea-7976-4663-aabe-35327590b956/export</id>
    <title>887688ea-7976-4663-aabe-35327590b956</title>
    <updated>2026-05-10T06:10:19.709513+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "887688ea-7976-4663-aabe-35327590b956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22897", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/887688ea-7976-4663-aabe-35327590b956/export"/>
    <published>2025-08-19T13:26:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1205460e-496f-4f3e-9d94-15bdf95df4d5/export</id>
    <title>1205460e-496f-4f3e-9d94-15bdf95df4d5</title>
    <updated>2026-05-10T06:10:19.707587+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1205460e-496f-4f3e-9d94-15bdf95df4d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1205460e-496f-4f3e-9d94-15bdf95df4d5/export"/>
    <published>2025-10-23T21:13:04+00:00</published>
  </entry>
</feed>
