<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T01:40:20.843760+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2b9fe65d-5f32-430d-bab7-7eefabe33c66/export</id>
    <title>2b9fe65d-5f32-430d-bab7-7eefabe33c66</title>
    <updated>2026-05-10T01:40:21.270223+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2b9fe65d-5f32-430d-bab7-7eefabe33c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26662", "type": "seen", "source": "https://t.me/cvedetector/25154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26662 - Apache Data Services Management Console Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26662 \nPublished : May 13, 2025, 1:15 a.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : The Data Services Management Console does not sufficiently encode user-controlled inputs, allowing an attacker to inject malicious script. When a targeted victim, who is already logged in, clicks on the compromised link, the injected script gets executed within the scope of victim\ufffds browser. This potentially leads to an impact on confidentiality and integrity. Availability is not impacted. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T05:30:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2b9fe65d-5f32-430d-bab7-7eefabe33c66/export"/>
    <published>2025-05-13T05:30:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/84b969b6-c8a1-4ff0-ac75-1509e6b573a6/export</id>
    <title>84b969b6-c8a1-4ff0-ac75-1509e6b573a6</title>
    <updated>2026-05-10T01:40:21.266212+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "84b969b6-c8a1-4ff0-ac75-1509e6b573a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26662", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16133", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26662\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Data Services Management Console does not sufficiently encode user-controlled inputs, allowing an attacker to inject malicious script. When a targeted victim, who is already logged in, clicks on the compromised link, the injected script gets executed within the scope of victim\ufffds browser. This potentially leads to an impact on confidentiality and integrity. Availability is not impacted.\n\ud83d\udccf Published: 2025-05-13T00:09:05.682Z\n\ud83d\udccf Modified: 2025-05-13T14:06:48.738Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3558755\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-05-13T14:30:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/84b969b6-c8a1-4ff0-ac75-1509e6b573a6/export"/>
    <published>2025-05-13T14:30:56+00:00</published>
  </entry>
</feed>
