<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 06:10:18 +0000</lastBuildDate>
    <item>
      <title>cbb77333-7401-42c9-bcb3-7ec675dd8be5</title>
      <link>https://vulnerability.circl.lu/sighting/cbb77333-7401-42c9-bcb3-7ec675dd8be5/export</link>
      <description>{"uuid": "cbb77333-7401-42c9-bcb3-7ec675dd8be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/scada/mypro_mgr_creds.rb", "content": "", "creation_timestamp": "2025-02-25T10:42:49.000000Z"}</description>
      <content:encoded>{"uuid": "cbb77333-7401-42c9-bcb3-7ec675dd8be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/scada/mypro_mgr_creds.rb", "content": "", "creation_timestamp": "2025-02-25T10:42:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cbb77333-7401-42c9-bcb3-7ec675dd8be5/export</guid>
      <pubDate>Tue, 25 Feb 2025 10:42:49 +0000</pubDate>
    </item>
    <item>
      <title>551dd440-0cbc-45f9-9946-46924aacedfc</title>
      <link>https://vulnerability.circl.lu/sighting/551dd440-0cbc-45f9-9946-46924aacedfc/export</link>
      <description>{"uuid": "551dd440-0cbc-45f9-9946-46924aacedfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-26T02:35:25.000000Z"}</description>
      <content:encoded>{"uuid": "551dd440-0cbc-45f9-9946-46924aacedfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-26T02:35:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/551dd440-0cbc-45f9-9946-46924aacedfc/export</guid>
      <pubDate>Wed, 26 Feb 2025 02:35:25 +0000</pubDate>
    </item>
    <item>
      <title>7e7e7971-3c98-4ed2-a71e-3122618d34ac</title>
      <link>https://vulnerability.circl.lu/sighting/7e7e7971-3c98-4ed2-a71e-3122618d34ac/export</link>
      <description>{"uuid": "7e7e7971-3c98-4ed2-a71e-3122618d34ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lj4blb2qxv2k", "content": "", "creation_timestamp": "2025-02-26T21:02:05.080634Z"}</description>
      <content:encoded>{"uuid": "7e7e7971-3c98-4ed2-a71e-3122618d34ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lj4blb2qxv2k", "content": "", "creation_timestamp": "2025-02-26T21:02:05.080634Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7e7e7971-3c98-4ed2-a71e-3122618d34ac/export</guid>
      <pubDate>Wed, 26 Feb 2025 21:02:05 +0000</pubDate>
    </item>
    <item>
      <title>cad226d8-dbe4-4006-9ce6-759826973543</title>
      <link>https://vulnerability.circl.lu/sighting/cad226d8-dbe4-4006-9ce6-759826973543/export</link>
      <description>{"uuid": "cad226d8-dbe4-4006-9ce6-759826973543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "https://bsky.app/profile/rajsamani.bsky.social/post/3ljhibmmnms2v", "content": "", "creation_timestamp": "2025-03-03T08:01:12.115093Z"}</description>
      <content:encoded>{"uuid": "cad226d8-dbe4-4006-9ce6-759826973543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "https://bsky.app/profile/rajsamani.bsky.social/post/3ljhibmmnms2v", "content": "", "creation_timestamp": "2025-03-03T08:01:12.115093Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cad226d8-dbe4-4006-9ce6-759826973543/export</guid>
      <pubDate>Mon, 03 Mar 2025 08:01:12 +0000</pubDate>
    </item>
    <item>
      <title>34083f6b-f550-46d5-b188-2534c68ef97f</title>
      <link>https://vulnerability.circl.lu/sighting/34083f6b-f550-46d5-b188-2534c68ef97f/export</link>
      <description>{"uuid": "34083f6b-f550-46d5-b188-2534c68ef97f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22897", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6325", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22897\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.\n\ud83d\udccf Published: 2025-03-04T03:44:44.313Z\n\ud83d\udccf Modified: 2025-03-04T03:44:44.313Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", "creation_timestamp": "2025-03-04T04:34:31.000000Z"}</description>
      <content:encoded>{"uuid": "34083f6b-f550-46d5-b188-2534c68ef97f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22897", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6325", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22897\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow.\n\ud83d\udccf Published: 2025-03-04T03:44:44.313Z\n\ud83d\udccf Modified: 2025-03-04T03:44:44.313Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md", "creation_timestamp": "2025-03-04T04:34:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/34083f6b-f550-46d5-b188-2534c68ef97f/export</guid>
      <pubDate>Tue, 04 Mar 2025 04:34:31 +0000</pubDate>
    </item>
    <item>
      <title>a40e5236-5d8b-479d-8e03-0992fb4675f3</title>
      <link>https://vulnerability.circl.lu/sighting/a40e5236-5d8b-479d-8e03-0992fb4675f3/export</link>
      <description>{"uuid": "a40e5236-5d8b-479d-8e03-0992fb4675f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22897", "type": "seen", "source": "https://t.me/cvedetector/19454", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22897 - OpenHarmony Buffer Overflow DOS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22897 \nPublished : March 4, 2025, 4:15 a.m. | 22\u00a0minutes ago \nDescription : in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T05:48:04.000000Z"}</description>
      <content:encoded>{"uuid": "a40e5236-5d8b-479d-8e03-0992fb4675f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22897", "type": "seen", "source": "https://t.me/cvedetector/19454", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22897 - OpenHarmony Buffer Overflow DOS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22897 \nPublished : March 4, 2025, 4:15 a.m. | 22\u00a0minutes ago \nDescription : in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through buffer overflow. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T05:48:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a40e5236-5d8b-479d-8e03-0992fb4675f3/export</guid>
      <pubDate>Tue, 04 Mar 2025 05:48:04 +0000</pubDate>
    </item>
    <item>
      <title>37715659-b006-4f59-a25e-30bcbd2b2339</title>
      <link>https://vulnerability.circl.lu/sighting/37715659-b006-4f59-a25e-30bcbd2b2339/export</link>
      <description>{"uuid": "37715659-b006-4f59-a25e-30bcbd2b2339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2289", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7534", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2289\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The Zegen - Church WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX endpoints in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import, export, and update theme options.\n\ud83d\udccf Published: 2025-03-14T05:24:02.910Z\n\ud83d\udccf Modified: 2025-03-14T05:24:02.910Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/a04db024-5198-490f-bf5f-d5bad1b21ce4?source=cve\n2. https://themeforest.net/item/zegen-church-wordpress-theme/25116823", "creation_timestamp": "2025-03-14T05:46:53.000000Z"}</description>
      <content:encoded>{"uuid": "37715659-b006-4f59-a25e-30bcbd2b2339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2289", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7534", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2289\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The Zegen - Church WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX endpoints in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import, export, and update theme options.\n\ud83d\udccf Published: 2025-03-14T05:24:02.910Z\n\ud83d\udccf Modified: 2025-03-14T05:24:02.910Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/a04db024-5198-490f-bf5f-d5bad1b21ce4?source=cve\n2. https://themeforest.net/item/zegen-church-wordpress-theme/25116823", "creation_timestamp": "2025-03-14T05:46:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/37715659-b006-4f59-a25e-30bcbd2b2339/export</guid>
      <pubDate>Fri, 14 Mar 2025 05:46:53 +0000</pubDate>
    </item>
    <item>
      <title>f5932984-5844-4b71-975c-1962be6de670</title>
      <link>https://vulnerability.circl.lu/sighting/f5932984-5844-4b71-975c-1962be6de670/export</link>
      <description>{"uuid": "f5932984-5844-4b71-975c-1962be6de670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2289", "type": "seen", "source": "https://t.me/cvedetector/20263", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2289 - Zegen - Church WordPress Theme Unauthenticated AJAX Endpoint Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2289 \nPublished : March 14, 2025, 6:15 a.m. | 27\u00a0minutes ago \nDescription : The Zegen - Church WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX endpoints in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import, export, and update theme options. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T08:20:42.000000Z"}</description>
      <content:encoded>{"uuid": "f5932984-5844-4b71-975c-1962be6de670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2289", "type": "seen", "source": "https://t.me/cvedetector/20263", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2289 - Zegen - Church WordPress Theme Unauthenticated AJAX Endpoint Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2289 \nPublished : March 14, 2025, 6:15 a.m. | 27\u00a0minutes ago \nDescription : The Zegen - Church WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX endpoints in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import, export, and update theme options. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T08:20:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f5932984-5844-4b71-975c-1962be6de670/export</guid>
      <pubDate>Fri, 14 Mar 2025 08:20:42 +0000</pubDate>
    </item>
    <item>
      <title>887688ea-7976-4663-aabe-35327590b956</title>
      <link>https://vulnerability.circl.lu/sighting/887688ea-7976-4663-aabe-35327590b956/export</link>
      <description>{"uuid": "887688ea-7976-4663-aabe-35327590b956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22897", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}</description>
      <content:encoded>{"uuid": "887688ea-7976-4663-aabe-35327590b956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22897", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/887688ea-7976-4663-aabe-35327590b956/export</guid>
      <pubDate>Tue, 19 Aug 2025 13:26:46 +0000</pubDate>
    </item>
    <item>
      <title>1205460e-496f-4f3e-9d94-15bdf95df4d5</title>
      <link>https://vulnerability.circl.lu/sighting/1205460e-496f-4f3e-9d94-15bdf95df4d5/export</link>
      <description>{"uuid": "1205460e-496f-4f3e-9d94-15bdf95df4d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}</description>
      <content:encoded>{"uuid": "1205460e-496f-4f3e-9d94-15bdf95df4d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22896", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1205460e-496f-4f3e-9d94-15bdf95df4d5/export</guid>
      <pubDate>Thu, 23 Oct 2025 21:13:04 +0000</pubDate>
    </item>
  </channel>
</rss>
