<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 06:10:16 +0000</lastBuildDate>
    <item>
      <title>a5ba64d3-b9d7-41ac-964f-6d599bbff71f</title>
      <link>https://vulnerability.circl.lu/sighting/a5ba64d3-b9d7-41ac-964f-6d599bbff71f/export</link>
      <description>{"uuid": "a5ba64d3-b9d7-41ac-964f-6d599bbff71f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4552", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lowqemhdsb2h", "content": "", "creation_timestamp": "2025-05-12T00:41:57.472953Z"}</description>
      <content:encoded>{"uuid": "a5ba64d3-b9d7-41ac-964f-6d599bbff71f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4552", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lowqemhdsb2h", "content": "", "creation_timestamp": "2025-05-12T00:41:57.472953Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a5ba64d3-b9d7-41ac-964f-6d599bbff71f/export</guid>
      <pubDate>Mon, 12 May 2025 00:41:57 +0000</pubDate>
    </item>
    <item>
      <title>2a2a106e-4979-42c1-9ea5-521d062116b5</title>
      <link>https://vulnerability.circl.lu/sighting/2a2a106e-4979-42c1-9ea5-521d062116b5/export</link>
      <description>{"uuid": "2a2a106e-4979-42c1-9ea5-521d062116b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4552", "type": "seen", "source": "https://t.me/cvedetector/25061", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4552 - ContiNew Admin Remote Unverified Password Change Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4552 \nPublished : May 12, 2025, 12:15 a.m. | 1\u00a0hour, 37\u00a0minutes ago \nDescription : A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T04:24:24.000000Z"}</description>
      <content:encoded>{"uuid": "2a2a106e-4979-42c1-9ea5-521d062116b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4552", "type": "seen", "source": "https://t.me/cvedetector/25061", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4552 - ContiNew Admin Remote Unverified Password Change Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4552 \nPublished : May 12, 2025, 12:15 a.m. | 1\u00a0hour, 37\u00a0minutes ago \nDescription : A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T04:24:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2a2a106e-4979-42c1-9ea5-521d062116b5/export</guid>
      <pubDate>Mon, 12 May 2025 04:24:24 +0000</pubDate>
    </item>
    <item>
      <title>e2e632c9-4d8c-43f9-b826-a5c8343c4c4a</title>
      <link>https://vulnerability.circl.lu/sighting/e2e632c9-4d8c-43f9-b826-a5c8343c4c4a/export</link>
      <description>{"uuid": "e2e632c9-4d8c-43f9-b826-a5c8343c4c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45529", "type": "seen", "source": "https://bsky.app/profile/FunctionalProgramming.activitypub.awakari.com.ap.brid.gy/post/3lq6gbhbie242", "content": "", "creation_timestamp": "2025-05-27T19:27:46.455070Z"}</description>
      <content:encoded>{"uuid": "e2e632c9-4d8c-43f9-b826-a5c8343c4c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45529", "type": "seen", "source": "https://bsky.app/profile/FunctionalProgramming.activitypub.awakari.com.ap.brid.gy/post/3lq6gbhbie242", "content": "", "creation_timestamp": "2025-05-27T19:27:46.455070Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e2e632c9-4d8c-43f9-b826-a5c8343c4c4a/export</guid>
      <pubDate>Tue, 27 May 2025 19:27:46 +0000</pubDate>
    </item>
    <item>
      <title>70f4b770-6d6f-477e-aa32-58f69c383047</title>
      <link>https://vulnerability.circl.lu/sighting/70f4b770-6d6f-477e-aa32-58f69c383047/export</link>
      <description>{"uuid": "70f4b770-6d6f-477e-aa32-58f69c383047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45529", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq6nvrinzh2o", "content": "", "creation_timestamp": "2025-05-27T21:44:19.424431Z"}</description>
      <content:encoded>{"uuid": "70f4b770-6d6f-477e-aa32-58f69c383047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45529", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lq6nvrinzh2o", "content": "", "creation_timestamp": "2025-05-27T21:44:19.424431Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/70f4b770-6d6f-477e-aa32-58f69c383047/export</guid>
      <pubDate>Tue, 27 May 2025 21:44:19 +0000</pubDate>
    </item>
    <item>
      <title>452471ac-9da3-4e7a-a780-2ee3d169bad8</title>
      <link>https://vulnerability.circl.lu/sighting/452471ac-9da3-4e7a-a780-2ee3d169bad8/export</link>
      <description>{"uuid": "452471ac-9da3-4e7a-a780-2ee3d169bad8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45525", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18739", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45525\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A null pointer dereference vulnerability was discovered in microlight.js (version 0.0.7), a lightweight syntax highlighting library. When processing elements with non-standard CSS color values, the library fails to validate the result of a regular expression match before accessing its properties, leading to an uncaught TypeError and potential application crash.\n\ud83d\udccf Published: 2025-06-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T13:25:20.926Z\n\ud83d\udd17 References:\n1. https://gist.github.com/Rootingg/843368931f70886bed3cf982f10a4424", "creation_timestamp": "2025-06-18T13:40:30.000000Z"}</description>
      <content:encoded>{"uuid": "452471ac-9da3-4e7a-a780-2ee3d169bad8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45525", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18739", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45525\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A null pointer dereference vulnerability was discovered in microlight.js (version 0.0.7), a lightweight syntax highlighting library. When processing elements with non-standard CSS color values, the library fails to validate the result of a regular expression match before accessing its properties, leading to an uncaught TypeError and potential application crash.\n\ud83d\udccf Published: 2025-06-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T13:25:20.926Z\n\ud83d\udd17 References:\n1. https://gist.github.com/Rootingg/843368931f70886bed3cf982f10a4424", "creation_timestamp": "2025-06-18T13:40:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/452471ac-9da3-4e7a-a780-2ee3d169bad8/export</guid>
      <pubDate>Wed, 18 Jun 2025 13:40:30 +0000</pubDate>
    </item>
    <item>
      <title>4bb5e798-85df-4136-aceb-db7f287fb031</title>
      <link>https://vulnerability.circl.lu/sighting/4bb5e798-85df-4136-aceb-db7f287fb031/export</link>
      <description>{"uuid": "4bb5e798-85df-4136-aceb-db7f287fb031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45526", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19624", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45526\n\ud83d\udd25 CVSS Score: 2.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A denial of service (DoS) vulnerability has been identified in the JavaScript library microlight version 0.0.7. This library, used for syntax highlighting, does not limit the size of textual content it processes in HTML elements with the microlight class. When excessively large content (e.g., 100 million characters) is processed, the reset function in microlight.js consumes excessive memory and CPU resources, causing browser crashes or unresponsiveness. An attacker can exploit this vulnerability by tricking a user into visiting a malicious web page containing a microlight element with large content, resulting in a denial of service. NOTE: this is disputed by multiple parties because a large amount of memory and CPU resources is expected to be needed for content of that size.\n\ud83d\udccf Published: 2025-06-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-26T16:10:51.373Z\n\ud83d\udd17 References:\n1. https://gist.github.com/Rootingg/483b09b760d031b62b172f2153f3ed2a\n2. https://github.com/github/advisory-database/pull/5730", "creation_timestamp": "2025-06-26T16:51:42.000000Z"}</description>
      <content:encoded>{"uuid": "4bb5e798-85df-4136-aceb-db7f287fb031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45526", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19624", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45526\n\ud83d\udd25 CVSS Score: 2.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A denial of service (DoS) vulnerability has been identified in the JavaScript library microlight version 0.0.7. This library, used for syntax highlighting, does not limit the size of textual content it processes in HTML elements with the microlight class. When excessively large content (e.g., 100 million characters) is processed, the reset function in microlight.js consumes excessive memory and CPU resources, causing browser crashes or unresponsiveness. An attacker can exploit this vulnerability by tricking a user into visiting a malicious web page containing a microlight element with large content, resulting in a denial of service. NOTE: this is disputed by multiple parties because a large amount of memory and CPU resources is expected to be needed for content of that size.\n\ud83d\udccf Published: 2025-06-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-26T16:10:51.373Z\n\ud83d\udd17 References:\n1. https://gist.github.com/Rootingg/483b09b760d031b62b172f2153f3ed2a\n2. https://github.com/github/advisory-database/pull/5730", "creation_timestamp": "2025-06-26T16:51:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4bb5e798-85df-4136-aceb-db7f287fb031/export</guid>
      <pubDate>Thu, 26 Jun 2025 16:51:42 +0000</pubDate>
    </item>
  </channel>
</rss>
