<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T08:00:07.643907+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/161eb4ba-08bb-40a5-891b-10dc81b60a31/export</id>
    <title>161eb4ba-08bb-40a5-891b-10dc81b60a31</title>
    <updated>2026-05-08T08:00:07.935264+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "161eb4ba-08bb-40a5-891b-10dc81b60a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43948", "type": "seen", "source": "https://t.me/cvedetector/23546", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43948 - Codemers KLIMS Python Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43948 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : Codemers KLIMS 1.6.DEV allows Python code injection. A user can provide Python code as an input value for a parameter or qualifier (such as for sorting), which will get executed on the server side. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/161eb4ba-08bb-40a5-891b-10dc81b60a31/export"/>
    <published>2025-04-22T22:35:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9f808bb5-c72c-4a45-bd21-a445cf4f97d6/export</id>
    <title>9f808bb5-c72c-4a45-bd21-a445cf4f97d6</title>
    <updated>2026-05-08T08:00:07.935130+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9f808bb5-c72c-4a45-bd21-a445cf4f97d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43949", "type": "seen", "source": "https://t.me/cvedetector/23547", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43949 - MuM MapEdit SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43949 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : MuM (aka Mensch und Maschine) MapEdit (aka mapedit-web) 24.2.3 is vulnerable to SQL Injection that allows an attacker to execute malicious SQL statements that control a web application's database server. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9f808bb5-c72c-4a45-bd21-a445cf4f97d6/export"/>
    <published>2025-04-22T22:35:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/17972f29-d917-4a8b-964b-7a0b0f831880/export</id>
    <title>17972f29-d917-4a8b-964b-7a0b0f831880</title>
    <updated>2026-05-08T08:00:07.935020+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "17972f29-d917-4a8b-964b-7a0b0f831880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43946", "type": "seen", "source": "https://t.me/cvedetector/23551", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43946 - TCPWave DDI Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43946 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : TCPWave DDI 11.34P1C2 allows Remote Code Execution via Unrestricted File Upload (combined with Path Traversal). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/17972f29-d917-4a8b-964b-7a0b0f831880/export"/>
    <published>2025-04-22T22:35:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/73b8a204-8568-40b4-8375-f416f22c7dc5/export</id>
    <title>73b8a204-8568-40b4-8375-f416f22c7dc5</title>
    <updated>2026-05-08T08:00:07.934929+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "73b8a204-8568-40b4-8375-f416f22c7dc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43946", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114388062049466593", "content": "", "creation_timestamp": "2025-04-23T15:48:33.728618Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/73b8a204-8568-40b4-8375-f416f22c7dc5/export"/>
    <published>2025-04-23T15:48:33.728618+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7044aa5d-80c7-4b26-bbfb-6684ebe45736/export</id>
    <title>7044aa5d-80c7-4b26-bbfb-6684ebe45736</title>
    <updated>2026-05-08T08:00:07.934835+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7044aa5d-80c7-4b26-bbfb-6684ebe45736", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43949", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114388062099300044", "content": "", "creation_timestamp": "2025-04-23T15:48:35.776914Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7044aa5d-80c7-4b26-bbfb-6684ebe45736/export"/>
    <published>2025-04-23T15:48:35.776914+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/198930e3-1d16-4580-a9f5-6c83682b81e3/export</id>
    <title>198930e3-1d16-4580-a9f5-6c83682b81e3</title>
    <updated>2026-05-08T08:00:07.934728+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "198930e3-1d16-4580-a9f5-6c83682b81e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43949", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnjaypinu72o", "content": "", "creation_timestamp": "2025-04-23T22:37:01.850445Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/198930e3-1d16-4580-a9f5-6c83682b81e3/export"/>
    <published>2025-04-23T22:37:01.850445+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e52907c4-71cc-401f-a5e8-2c19f5f180e8/export</id>
    <title>e52907c4-71cc-401f-a5e8-2c19f5f180e8</title>
    <updated>2026-05-08T08:00:07.934621+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e52907c4-71cc-401f-a5e8-2c19f5f180e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43946", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13440", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43946\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TCPWave DDI 11.34P1C2 allows Remote Code Execution via Unrestricted File Upload (combined with Path Traversal).\n\ud83d\udccf Published: 2025-04-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T14:50:18.146Z\n\ud83d\udd17 References:\n1. https://tcpwave.com/ddi-dns-dhcp-ipam\n2. https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2025-43946", "creation_timestamp": "2025-04-25T15:07:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e52907c4-71cc-401f-a5e8-2c19f5f180e8/export"/>
    <published>2025-04-25T15:07:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5b73af81-d968-4177-867e-fd7ba6cfc59a/export</id>
    <title>5b73af81-d968-4177-867e-fd7ba6cfc59a</title>
    <updated>2026-05-08T08:00:07.934502+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5b73af81-d968-4177-867e-fd7ba6cfc59a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43941", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4gc3cmbjv2a", "content": "", "creation_timestamp": "2025-10-30T15:36:17.881449Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5b73af81-d968-4177-867e-fd7ba6cfc59a/export"/>
    <published>2025-10-30T15:36:17.881449+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6e873077-0303-4ba1-a623-4c2f03e2d04d/export</id>
    <title>6e873077-0303-4ba1-a623-4c2f03e2d04d</title>
    <updated>2026-05-08T08:00:07.934275+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6e873077-0303-4ba1-a623-4c2f03e2d04d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43940", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4ge5fmeax2s", "content": "", "creation_timestamp": "2025-10-30T16:13:15.522077Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6e873077-0303-4ba1-a623-4c2f03e2d04d/export"/>
    <published>2025-10-30T16:13:15.522077+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2957cbb8-4faa-4793-9bab-3c187776da55/export</id>
    <title>2957cbb8-4faa-4793-9bab-3c187776da55</title>
    <updated>2026-05-08T08:00:07.930103+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2957cbb8-4faa-4793-9bab-3c187776da55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43942", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4gepcgri52q", "content": "", "creation_timestamp": "2025-10-30T16:23:16.195233Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2957cbb8-4faa-4793-9bab-3c187776da55/export"/>
    <published>2025-10-30T16:23:16.195233+00:00</published>
  </entry>
</feed>
