<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 08:00:07 +0000</lastBuildDate>
    <item>
      <title>161eb4ba-08bb-40a5-891b-10dc81b60a31</title>
      <link>https://vulnerability.circl.lu/sighting/161eb4ba-08bb-40a5-891b-10dc81b60a31/export</link>
      <description>{"uuid": "161eb4ba-08bb-40a5-891b-10dc81b60a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43948", "type": "seen", "source": "https://t.me/cvedetector/23546", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43948 - Codemers KLIMS Python Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43948 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : Codemers KLIMS 1.6.DEV allows Python code injection. A user can provide Python code as an input value for a parameter or qualifier (such as for sorting), which will get executed on the server side. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:23.000000Z"}</description>
      <content:encoded>{"uuid": "161eb4ba-08bb-40a5-891b-10dc81b60a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43948", "type": "seen", "source": "https://t.me/cvedetector/23546", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43948 - Codemers KLIMS Python Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43948 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : Codemers KLIMS 1.6.DEV allows Python code injection. A user can provide Python code as an input value for a parameter or qualifier (such as for sorting), which will get executed on the server side. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/161eb4ba-08bb-40a5-891b-10dc81b60a31/export</guid>
      <pubDate>Tue, 22 Apr 2025 22:35:23 +0000</pubDate>
    </item>
    <item>
      <title>9f808bb5-c72c-4a45-bd21-a445cf4f97d6</title>
      <link>https://vulnerability.circl.lu/sighting/9f808bb5-c72c-4a45-bd21-a445cf4f97d6/export</link>
      <description>{"uuid": "9f808bb5-c72c-4a45-bd21-a445cf4f97d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43949", "type": "seen", "source": "https://t.me/cvedetector/23547", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43949 - MuM MapEdit SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43949 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : MuM (aka Mensch und Maschine) MapEdit (aka mapedit-web) 24.2.3 is vulnerable to SQL Injection that allows an attacker to execute malicious SQL statements that control a web application's database server. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:24.000000Z"}</description>
      <content:encoded>{"uuid": "9f808bb5-c72c-4a45-bd21-a445cf4f97d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43949", "type": "seen", "source": "https://t.me/cvedetector/23547", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43949 - MuM MapEdit SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43949 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : MuM (aka Mensch und Maschine) MapEdit (aka mapedit-web) 24.2.3 is vulnerable to SQL Injection that allows an attacker to execute malicious SQL statements that control a web application's database server. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9f808bb5-c72c-4a45-bd21-a445cf4f97d6/export</guid>
      <pubDate>Tue, 22 Apr 2025 22:35:24 +0000</pubDate>
    </item>
    <item>
      <title>17972f29-d917-4a8b-964b-7a0b0f831880</title>
      <link>https://vulnerability.circl.lu/sighting/17972f29-d917-4a8b-964b-7a0b0f831880/export</link>
      <description>{"uuid": "17972f29-d917-4a8b-964b-7a0b0f831880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43946", "type": "seen", "source": "https://t.me/cvedetector/23551", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43946 - TCPWave DDI Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43946 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : TCPWave DDI 11.34P1C2 allows Remote Code Execution via Unrestricted File Upload (combined with Path Traversal). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:30.000000Z"}</description>
      <content:encoded>{"uuid": "17972f29-d917-4a8b-964b-7a0b0f831880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43946", "type": "seen", "source": "https://t.me/cvedetector/23551", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43946 - TCPWave DDI Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43946 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : TCPWave DDI 11.34P1C2 allows Remote Code Execution via Unrestricted File Upload (combined with Path Traversal). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/17972f29-d917-4a8b-964b-7a0b0f831880/export</guid>
      <pubDate>Tue, 22 Apr 2025 22:35:30 +0000</pubDate>
    </item>
    <item>
      <title>73b8a204-8568-40b4-8375-f416f22c7dc5</title>
      <link>https://vulnerability.circl.lu/sighting/73b8a204-8568-40b4-8375-f416f22c7dc5/export</link>
      <description>{"uuid": "73b8a204-8568-40b4-8375-f416f22c7dc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43946", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114388062049466593", "content": "", "creation_timestamp": "2025-04-23T15:48:33.728618Z"}</description>
      <content:encoded>{"uuid": "73b8a204-8568-40b4-8375-f416f22c7dc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43946", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114388062049466593", "content": "", "creation_timestamp": "2025-04-23T15:48:33.728618Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/73b8a204-8568-40b4-8375-f416f22c7dc5/export</guid>
      <pubDate>Wed, 23 Apr 2025 15:48:33 +0000</pubDate>
    </item>
    <item>
      <title>7044aa5d-80c7-4b26-bbfb-6684ebe45736</title>
      <link>https://vulnerability.circl.lu/sighting/7044aa5d-80c7-4b26-bbfb-6684ebe45736/export</link>
      <description>{"uuid": "7044aa5d-80c7-4b26-bbfb-6684ebe45736", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43949", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114388062099300044", "content": "", "creation_timestamp": "2025-04-23T15:48:35.776914Z"}</description>
      <content:encoded>{"uuid": "7044aa5d-80c7-4b26-bbfb-6684ebe45736", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43949", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114388062099300044", "content": "", "creation_timestamp": "2025-04-23T15:48:35.776914Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7044aa5d-80c7-4b26-bbfb-6684ebe45736/export</guid>
      <pubDate>Wed, 23 Apr 2025 15:48:35 +0000</pubDate>
    </item>
    <item>
      <title>198930e3-1d16-4580-a9f5-6c83682b81e3</title>
      <link>https://vulnerability.circl.lu/sighting/198930e3-1d16-4580-a9f5-6c83682b81e3/export</link>
      <description>{"uuid": "198930e3-1d16-4580-a9f5-6c83682b81e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43949", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnjaypinu72o", "content": "", "creation_timestamp": "2025-04-23T22:37:01.850445Z"}</description>
      <content:encoded>{"uuid": "198930e3-1d16-4580-a9f5-6c83682b81e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43949", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnjaypinu72o", "content": "", "creation_timestamp": "2025-04-23T22:37:01.850445Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/198930e3-1d16-4580-a9f5-6c83682b81e3/export</guid>
      <pubDate>Wed, 23 Apr 2025 22:37:01 +0000</pubDate>
    </item>
    <item>
      <title>e52907c4-71cc-401f-a5e8-2c19f5f180e8</title>
      <link>https://vulnerability.circl.lu/sighting/e52907c4-71cc-401f-a5e8-2c19f5f180e8/export</link>
      <description>{"uuid": "e52907c4-71cc-401f-a5e8-2c19f5f180e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43946", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13440", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43946\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TCPWave DDI 11.34P1C2 allows Remote Code Execution via Unrestricted File Upload (combined with Path Traversal).\n\ud83d\udccf Published: 2025-04-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T14:50:18.146Z\n\ud83d\udd17 References:\n1. https://tcpwave.com/ddi-dns-dhcp-ipam\n2. https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2025-43946", "creation_timestamp": "2025-04-25T15:07:40.000000Z"}</description>
      <content:encoded>{"uuid": "e52907c4-71cc-401f-a5e8-2c19f5f180e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43946", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13440", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43946\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TCPWave DDI 11.34P1C2 allows Remote Code Execution via Unrestricted File Upload (combined with Path Traversal).\n\ud83d\udccf Published: 2025-04-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T14:50:18.146Z\n\ud83d\udd17 References:\n1. https://tcpwave.com/ddi-dns-dhcp-ipam\n2. https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2025-43946", "creation_timestamp": "2025-04-25T15:07:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e52907c4-71cc-401f-a5e8-2c19f5f180e8/export</guid>
      <pubDate>Fri, 25 Apr 2025 15:07:40 +0000</pubDate>
    </item>
    <item>
      <title>5b73af81-d968-4177-867e-fd7ba6cfc59a</title>
      <link>https://vulnerability.circl.lu/sighting/5b73af81-d968-4177-867e-fd7ba6cfc59a/export</link>
      <description>{"uuid": "5b73af81-d968-4177-867e-fd7ba6cfc59a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43941", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4gc3cmbjv2a", "content": "", "creation_timestamp": "2025-10-30T15:36:17.881449Z"}</description>
      <content:encoded>{"uuid": "5b73af81-d968-4177-867e-fd7ba6cfc59a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43941", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4gc3cmbjv2a", "content": "", "creation_timestamp": "2025-10-30T15:36:17.881449Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5b73af81-d968-4177-867e-fd7ba6cfc59a/export</guid>
      <pubDate>Thu, 30 Oct 2025 15:36:17 +0000</pubDate>
    </item>
    <item>
      <title>6e873077-0303-4ba1-a623-4c2f03e2d04d</title>
      <link>https://vulnerability.circl.lu/sighting/6e873077-0303-4ba1-a623-4c2f03e2d04d/export</link>
      <description>{"uuid": "6e873077-0303-4ba1-a623-4c2f03e2d04d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43940", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4ge5fmeax2s", "content": "", "creation_timestamp": "2025-10-30T16:13:15.522077Z"}</description>
      <content:encoded>{"uuid": "6e873077-0303-4ba1-a623-4c2f03e2d04d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43940", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4ge5fmeax2s", "content": "", "creation_timestamp": "2025-10-30T16:13:15.522077Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6e873077-0303-4ba1-a623-4c2f03e2d04d/export</guid>
      <pubDate>Thu, 30 Oct 2025 16:13:15 +0000</pubDate>
    </item>
    <item>
      <title>2957cbb8-4faa-4793-9bab-3c187776da55</title>
      <link>https://vulnerability.circl.lu/sighting/2957cbb8-4faa-4793-9bab-3c187776da55/export</link>
      <description>{"uuid": "2957cbb8-4faa-4793-9bab-3c187776da55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43942", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4gepcgri52q", "content": "", "creation_timestamp": "2025-10-30T16:23:16.195233Z"}</description>
      <content:encoded>{"uuid": "2957cbb8-4faa-4793-9bab-3c187776da55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43942", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4gepcgri52q", "content": "", "creation_timestamp": "2025-10-30T16:23:16.195233Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2957cbb8-4faa-4793-9bab-3c187776da55/export</guid>
      <pubDate>Thu, 30 Oct 2025 16:23:16 +0000</pubDate>
    </item>
  </channel>
</rss>
