<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T13:41:31.261501+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/872f0bd8-f15c-498e-94c7-dbefb77ec27d/export</id>
    <title>872f0bd8-f15c-498e-94c7-dbefb77ec27d</title>
    <updated>2026-05-08T13:41:31.635577+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "872f0bd8-f15c-498e-94c7-dbefb77ec27d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/18914", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T16:03:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/872f0bd8-f15c-498e-94c7-dbefb77ec27d/export"/>
    <published>2020-12-10T16:03:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fb706b59-19b2-4fa3-ae78-2b7fc17b7f6c/export</id>
    <title>fb706b59-19b2-4fa3-ae78-2b7fc17b7f6c</title>
    <updated>2026-05-08T13:41:31.635484+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fb706b59-19b2-4fa3-ae78-2b7fc17b7f6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/18933", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T16:06:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fb706b59-19b2-4fa3-ae78-2b7fc17b7f6c/export"/>
    <published>2020-12-10T16:06:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/90dea2ca-ddd3-46a8-87ca-e84c64c03de7/export</id>
    <title>90dea2ca-ddd3-46a8-87ca-e84c64c03de7</title>
    <updated>2026-05-08T13:41:31.635384+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "90dea2ca-ddd3-46a8-87ca-e84c64c03de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/18952", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T16:23:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/90dea2ca-ddd3-46a8-87ca-e84c64c03de7/export"/>
    <published>2020-12-10T16:23:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1cba3ec1-f8d8-49a5-afa9-f61451cf5e6b/export</id>
    <title>1cba3ec1-f8d8-49a5-afa9-f61451cf5e6b</title>
    <updated>2026-05-08T13:41:31.635298+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1cba3ec1-f8d8-49a5-afa9-f61451cf5e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/18972", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T16:25:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1cba3ec1-f8d8-49a5-afa9-f61451cf5e6b/export"/>
    <published>2020-12-10T16:25:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6b9e685a-b591-4bdd-aca0-01103f68f263/export</id>
    <title>6b9e685a-b591-4bdd-aca0-01103f68f263</title>
    <updated>2026-05-08T13:41:31.635210+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6b9e685a-b591-4bdd-aca0-01103f68f263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/18991", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T17:20:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6b9e685a-b591-4bdd-aca0-01103f68f263/export"/>
    <published>2020-12-10T17:20:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2f92dcdd-17ac-40dc-9a9d-2588cd39f1fb/export</id>
    <title>2f92dcdd-17ac-40dc-9a9d-2588cd39f1fb</title>
    <updated>2026-05-08T13:41:31.635122+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2f92dcdd-17ac-40dc-9a9d-2588cd39f1fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/19010", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T17:23:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2f92dcdd-17ac-40dc-9a9d-2588cd39f1fb/export"/>
    <published>2020-12-10T17:23:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5ca38644-8c5c-4561-8ca0-711d8851211b/export</id>
    <title>5ca38644-8c5c-4561-8ca0-711d8851211b</title>
    <updated>2026-05-08T13:41:31.635027+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5ca38644-8c5c-4561-8ca0-711d8851211b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/19030", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T17:25:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5ca38644-8c5c-4561-8ca0-711d8851211b/export"/>
    <published>2020-12-10T17:25:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1b0fdaa8-1279-4aaf-b707-77236861dac5/export</id>
    <title>1b0fdaa8-1279-4aaf-b707-77236861dac5</title>
    <updated>2026-05-08T13:41:31.634931+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1b0fdaa8-1279-4aaf-b707-77236861dac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/19048", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T17:33:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1b0fdaa8-1279-4aaf-b707-77236861dac5/export"/>
    <published>2020-12-10T17:33:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b334dcdd-7f31-4e1c-9362-f09320499c2a/export</id>
    <title>b334dcdd-7f31-4e1c-9362-f09320499c2a</title>
    <updated>2026-05-08T13:41:31.634790+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b334dcdd-7f31-4e1c-9362-f09320499c2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/19068", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T17:40:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b334dcdd-7f31-4e1c-9362-f09320499c2a/export"/>
    <published>2020-12-10T17:40:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ad58f2cf-4628-41bd-904f-49d978234675/export</id>
    <title>ad58f2cf-4628-41bd-904f-49d978234675</title>
    <updated>2026-05-08T13:41:31.631682+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ad58f2cf-4628-41bd-904f-49d978234675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-24444", "type": "seen", "source": "https://t.me/cibsecurity/19087", "content": "\u203c CVE-2020-24444 \u203c\n\nAEM Forms SP6 add-on for AEM 6.5.6.0 and Forms add-on package for AEM 6.4 Service Pack 8 Cumulative Fix Pack 2 (6.4.8.2) have a blind Server-Side Request Forgery (SSRF) vulnerability. This vulnerability could be exploited by an unauthenticated attacker to gather information about internal systems that reside on the same network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T17:53:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ad58f2cf-4628-41bd-904f-49d978234675/export"/>
    <published>2020-12-10T17:53:20+00:00</published>
  </entry>
</feed>
