<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 10:07:20 +0000</lastBuildDate>
    <item>
      <title>87f34bde-046e-41cf-ae17-6a36722b309c</title>
      <link>https://vulnerability.circl.lu/sighting/87f34bde-046e-41cf-ae17-6a36722b309c/export</link>
      <description>{"uuid": "87f34bde-046e-41cf-ae17-6a36722b309c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0062", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7094", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0062\n\ud83d\udd25 CVSS Score: 4.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: SAP BusinessObjects Business Intelligence Platform allows an attacker to inject JavaScript code in Web Intelligence reports. This code is then executed in the victim's browser each time the vulnerable page is visited by the victim. On successful exploitation, an attacker could cause limited impact on confidentiality and integrity within the scope of victim\ufffds browser. There is no impact on availability. This vulnerability occurs only when script/html execution is enabled by the administrator in Central Management Console.\n\ud83d\udccf Published: 2025-03-11T00:31:18.755Z\n\ud83d\udccf Modified: 2025-03-11T02:18:37.752Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3557459\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-03-11T02:40:00.000000Z"}</description>
      <content:encoded>{"uuid": "87f34bde-046e-41cf-ae17-6a36722b309c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0062", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7094", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0062\n\ud83d\udd25 CVSS Score: 4.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: SAP BusinessObjects Business Intelligence Platform allows an attacker to inject JavaScript code in Web Intelligence reports. This code is then executed in the victim's browser each time the vulnerable page is visited by the victim. On successful exploitation, an attacker could cause limited impact on confidentiality and integrity within the scope of victim\ufffds browser. There is no impact on availability. This vulnerability occurs only when script/html execution is enabled by the administrator in Central Management Console.\n\ud83d\udccf Published: 2025-03-11T00:31:18.755Z\n\ud83d\udccf Modified: 2025-03-11T02:18:37.752Z\n\ud83d\udd17 References:\n1. https://me.sap.com/notes/3557459\n2. https://url.sap/sapsecuritypatchday", "creation_timestamp": "2025-03-11T02:40:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/87f34bde-046e-41cf-ae17-6a36722b309c/export</guid>
      <pubDate>Tue, 11 Mar 2025 02:40:00 +0000</pubDate>
    </item>
    <item>
      <title>916c87fb-61f0-4b4f-8329-40de69346735</title>
      <link>https://vulnerability.circl.lu/sighting/916c87fb-61f0-4b4f-8329-40de69346735/export</link>
      <description>{"uuid": "916c87fb-61f0-4b4f-8329-40de69346735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0062", "type": "seen", "source": "Telegram/W16YNhvaPFH5aaCoIJr66ZMJnbqyCF-hyto53ail-VrXh7cE", "content": "", "creation_timestamp": "2025-03-11T04:41:14.000000Z"}</description>
      <content:encoded>{"uuid": "916c87fb-61f0-4b4f-8329-40de69346735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0062", "type": "seen", "source": "Telegram/W16YNhvaPFH5aaCoIJr66ZMJnbqyCF-hyto53ail-VrXh7cE", "content": "", "creation_timestamp": "2025-03-11T04:41:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/916c87fb-61f0-4b4f-8329-40de69346735/export</guid>
      <pubDate>Tue, 11 Mar 2025 04:41:14 +0000</pubDate>
    </item>
  </channel>
</rss>
