<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T07:43:24.476779+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0a7aa174-06be-4f51-bf31-e843e6313bd8/export</id>
    <title>0a7aa174-06be-4f51-bf31-e843e6313bd8</title>
    <updated>2026-05-06T07:43:24.823222+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0a7aa174-06be-4f51-bf31-e843e6313bd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "Telegram/G-sgDlrvwnM7fA9vwo9eo805AkbFx9rSqZF3EIxn4TnSp90", "content": "", "creation_timestamp": "2023-03-09T07:09:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0a7aa174-06be-4f51-bf31-e843e6313bd8/export"/>
    <published>2023-03-09T07:09:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4c6d8677-2491-4218-b0e5-fcd84614eed5/export</id>
    <title>4c6d8677-2491-4218-b0e5-fcd84614eed5</title>
    <updated>2026-05-06T07:43:24.823152+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4c6d8677-2491-4218-b0e5-fcd84614eed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7903", "content": "#Red_Team_Tactics\n1. OAuth: Account Takeover on Booking*com\nhttps://salt.security/blog/traveling-with-oauth-account-takeover-on-booking-com\n2. Unauthorized access to Codespace secrets in GitHub\nhttps://ophionsecurity.com/blog/access-organization-secrets-in-github\n3. WAN-side RCE in Netgear RAX Routers (CVE-2023-24749)\nhttps://mahaloz.re/2023/02/25/pwnagent-netgear.html", "creation_timestamp": "2023-03-10T23:42:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4c6d8677-2491-4218-b0e5-fcd84614eed5/export"/>
    <published>2023-03-10T23:42:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f1650bfa-ac64-43ba-82ee-fd5fac32f67e/export</id>
    <title>f1650bfa-ac64-43ba-82ee-fd5fac32f67e</title>
    <updated>2026-05-06T07:43:24.823078+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f1650bfa-ac64-43ba-82ee-fd5fac32f67e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3918", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aAn exploit PoC for CVE-2023-24749, aka PwnAgent\nURL\uff1ahttps://github.com/mahaloz/netgear-pwnagent\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-11T01:04:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f1650bfa-ac64-43ba-82ee-fd5fac32f67e/export"/>
    <published>2023-03-11T01:04:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/37e5c4e9-3fa4-41b2-b4dd-2d8d535b3006/export</id>
    <title>37e5c4e9-3fa4-41b2-b4dd-2d8d535b3006</title>
    <updated>2026-05-06T07:43:24.823005+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "37e5c4e9-3fa4-41b2-b4dd-2d8d535b3006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "Telegram/_XNHMvdG50cv82kL9cs0-JclxVRohsOoow3JM5plYK1X21M", "content": "", "creation_timestamp": "2023-03-12T10:21:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/37e5c4e9-3fa4-41b2-b4dd-2d8d535b3006/export"/>
    <published>2023-03-12T10:21:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/82d67d1d-772a-441f-af80-ddfee46bf2a6/export</id>
    <title>82d67d1d-772a-441f-af80-ddfee46bf2a6</title>
    <updated>2026-05-06T07:43:24.822931+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "82d67d1d-772a-441f-af80-ddfee46bf2a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24747", "type": "seen", "source": "https://t.me/cibsecurity/61506", "content": "\u203c CVE-2023-24747 \u203c\n\nJfinal CMS v5.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /system/dict/list.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-06T00:26:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/82d67d1d-772a-441f-af80-ddfee46bf2a6/export"/>
    <published>2023-04-06T00:26:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/155eb911-27ae-4cb6-8ccf-bef2452360c4/export</id>
    <title>155eb911-27ae-4cb6-8ccf-bef2452360c4</title>
    <updated>2026-05-06T07:43:24.822856+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "155eb911-27ae-4cb6-8ccf-bef2452360c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2474", "type": "seen", "source": "https://t.me/cibsecurity/63152", "content": "\u203c CVE-2023-2474 \u203c\n\nA vulnerability has been found in Rebuild 3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-227866 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-02T16:30:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/155eb911-27ae-4cb6-8ccf-bef2452360c4/export"/>
    <published>2023-05-02T16:30:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/12cc8ff2-70f2-437b-bfa0-fc70a95902b7/export</id>
    <title>12cc8ff2-70f2-437b-bfa0-fc70a95902b7</title>
    <updated>2026-05-06T07:43:24.822775+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "12cc8ff2-70f2-437b-bfa0-fc70a95902b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24744", "type": "seen", "source": "https://t.me/cibsecurity/63253", "content": "\u203c CVE-2023-24744 \u203c\n\nCross Site Scripting (XSS) vulnerability in Rediker Software AdminPlus 6.1.91.00 allows remote attackers to run arbitrary code via the onload function within the application DOM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-04T00:32:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/12cc8ff2-70f2-437b-bfa0-fc70a95902b7/export"/>
    <published>2023-05-04T00:32:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/681f1f3f-4525-45d6-8d84-d15309d2db85/export</id>
    <title>681f1f3f-4525-45d6-8d84-d15309d2db85</title>
    <updated>2026-05-06T07:43:24.822674+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "681f1f3f-4525-45d6-8d84-d15309d2db85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24744", "type": "seen", "source": "Telegram/m-t18k-rVm_ULDNmyZT_uZUMJ_dbegyokqFZG2c0AY4VKVvT", "content": "", "creation_timestamp": "2025-01-30T02:17:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/681f1f3f-4525-45d6-8d84-d15309d2db85/export"/>
    <published>2025-01-30T02:17:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/841015cf-3fca-4128-b3b4-03ca905aff25/export</id>
    <title>841015cf-3fca-4128-b3b4-03ca905aff25</title>
    <updated>2026-05-06T07:43:24.819634+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "841015cf-3fca-4128-b3b4-03ca905aff25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24747", "type": "seen", "source": "Telegram/rlp4oH2dAmK1Ctszi73ILHLOTKyDAKQYWcMFVMUEHRyjpIZ-", "content": "", "creation_timestamp": "2025-02-14T10:09:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/841015cf-3fca-4128-b3b4-03ca905aff25/export"/>
    <published>2025-02-14T10:09:23+00:00</published>
  </entry>
</feed>
