<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 10:11:53 +0000</lastBuildDate>
    <item>
      <title>e8821736-369e-4670-811a-99e33f22d70b</title>
      <link>https://vulnerability.circl.lu/sighting/e8821736-369e-4670-811a-99e33f22d70b/export</link>
      <description>{"uuid": "e8821736-369e-4670-811a-99e33f22d70b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25974", "type": "seen", "source": "https://t.me/ctinow/188250", "content": "https://ift.tt/qtX5A2V\nCVE-2024-25974", "creation_timestamp": "2024-02-20T09:31:46.000000Z"}</description>
      <content:encoded>{"uuid": "e8821736-369e-4670-811a-99e33f22d70b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25974", "type": "seen", "source": "https://t.me/ctinow/188250", "content": "https://ift.tt/qtX5A2V\nCVE-2024-25974", "creation_timestamp": "2024-02-20T09:31:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e8821736-369e-4670-811a-99e33f22d70b/export</guid>
      <pubDate>Tue, 20 Feb 2024 09:31:46 +0000</pubDate>
    </item>
    <item>
      <title>a631d7b0-963d-4eb4-b952-657343d0f703</title>
      <link>https://vulnerability.circl.lu/sighting/a631d7b0-963d-4eb4-b952-657343d0f703/export</link>
      <description>{"uuid": "a631d7b0-963d-4eb4-b952-657343d0f703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25974", "type": "seen", "source": "https://t.me/arpsyndicate/3743", "content": "#ExploitObserverAlert\n\nCVE-2024-25974\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25974. The Frentix GmbH OpenOlat LMS is affected by stored a Cross-Site Scripting (XSS) vulnerability.\u00a0It is possible to upload files within the Media Center of OpenOlat version 18.1.5 (or lower) as an authenticated user without any other rights. Although the filetypes are limited, an SVG image containing an XSS payload can be uploaded.\u00a0After a successful upload the file can be shared with groups of users (including admins) who can be attacked with the JavaScript payload.", "creation_timestamp": "2024-02-21T07:46:41.000000Z"}</description>
      <content:encoded>{"uuid": "a631d7b0-963d-4eb4-b952-657343d0f703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25974", "type": "seen", "source": "https://t.me/arpsyndicate/3743", "content": "#ExploitObserverAlert\n\nCVE-2024-25974\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25974. The Frentix GmbH OpenOlat LMS is affected by stored a Cross-Site Scripting (XSS) vulnerability.\u00a0It is possible to upload files within the Media Center of OpenOlat version 18.1.5 (or lower) as an authenticated user without any other rights. Although the filetypes are limited, an SVG image containing an XSS payload can be uploaded.\u00a0After a successful upload the file can be shared with groups of users (including admins) who can be attacked with the JavaScript payload.", "creation_timestamp": "2024-02-21T07:46:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a631d7b0-963d-4eb4-b952-657343d0f703/export</guid>
      <pubDate>Wed, 21 Feb 2024 07:46:41 +0000</pubDate>
    </item>
  </channel>
</rss>
