<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:29:24.258202+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/00ac0a55-1288-4859-9911-c1e9d3054d0a/export</id>
    <title>00ac0a55-1288-4859-9911-c1e9d3054d0a</title>
    <updated>2026-05-04T10:29:24.618205+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "00ac0a55-1288-4859-9911-c1e9d3054d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4097", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1amy python poc CVE-2023-24774 and CVE-2023-24775 this sqli cve funadmin\nURL\uff1ahttps://github.com/csffs/CVE-2023-24775-and-CVE-2023-24780\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-03T09:24:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/00ac0a55-1288-4859-9911-c1e9d3054d0a/export"/>
    <published>2023-04-03T09:24:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b22997cf-7ccc-429d-9054-366ddb1eb24b/export</id>
    <title>b22997cf-7ccc-429d-9054-366ddb1eb24b</title>
    <updated>2026-05-04T10:29:24.618040+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b22997cf-7ccc-429d-9054-366ddb1eb24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2477", "type": "seen", "source": "https://t.me/cibsecurity/63161", "content": "\u203c CVE-2023-2477 \u203c\n\nA vulnerability was found in Funadmin up to 3.2.3. It has been declared as problematic. Affected by this vulnerability is the function tagLoad of the file Cx.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227869 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-02T18:30:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b22997cf-7ccc-429d-9054-366ddb1eb24b/export"/>
    <published>2023-05-02T18:30:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c0828fe-8b80-46a2-9d8e-e3ac78ae61ea/export</id>
    <title>3c0828fe-8b80-46a2-9d8e-e3ac78ae61ea</title>
    <updated>2026-05-04T10:29:24.617889+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c0828fe-8b80-46a2-9d8e-e3ac78ae61ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24774", "type": "seen", "source": "Telegram/ox3Tp7VTIeU_n5J6i0QmGKWrTbFwd68GcC0r09zDDAf-0P9q", "content": "", "creation_timestamp": "2025-03-02T11:45:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c0828fe-8b80-46a2-9d8e-e3ac78ae61ea/export"/>
    <published>2025-03-02T11:45:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7de4aeed-65cf-41b1-91af-494cadee039b/export</id>
    <title>7de4aeed-65cf-41b1-91af-494cadee039b</title>
    <updated>2026-05-04T10:29:24.617722+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7de4aeed-65cf-41b1-91af-494cadee039b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6555", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24775\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \\member\\Member.php.\n\ud83d\udccf Published: 2023-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T14:54:48.704Z\n\ud83d\udd17 References:\n1. https://github.com/funadmin/funadmin/issues/9", "creation_timestamp": "2025-03-05T15:33:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7de4aeed-65cf-41b1-91af-494cadee039b/export"/>
    <published>2025-03-05T15:33:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/326127d1-2649-4f9c-8310-1265b7bc526c/export</id>
    <title>326127d1-2649-4f9c-8310-1265b7bc526c</title>
    <updated>2026-05-04T10:29:24.617566+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "326127d1-2649-4f9c-8310-1265b7bc526c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "seen", "source": "Telegram/_uGXxxbsE4vHiSoJ0RQ33a1cSEZDjfh4795MgshUqG-KudQx", "content": "", "creation_timestamp": "2025-03-06T02:16:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/326127d1-2649-4f9c-8310-1265b7bc526c/export"/>
    <published>2025-03-06T02:16:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e737bfb0-9d26-4f37-84f3-0df2b912a7e4/export</id>
    <title>e737bfb0-9d26-4f37-84f3-0df2b912a7e4</title>
    <updated>2026-05-04T10:29:24.617416+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e737bfb0-9d26-4f37-84f3-0df2b912a7e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24773", "type": "seen", "source": "Telegram/rEzlTJSI075wY2QIIhPOSK4QrJxLekL8EaUy4sopiQIcwDA0", "content": "", "creation_timestamp": "2025-03-06T02:16:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e737bfb0-9d26-4f37-84f3-0df2b912a7e4/export"/>
    <published>2025-03-06T02:16:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9c05b70d-fd5e-46ea-ab57-6aeb0a7f6753/export</id>
    <title>9c05b70d-fd5e-46ea-ab57-6aeb0a7f6753</title>
    <updated>2026-05-04T10:29:24.617240+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9c05b70d-fd5e-46ea-ab57-6aeb0a7f6753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24777", "type": "seen", "source": "Telegram/NoKTqEgq9HS1ex5O39w2K_AXExJFvyz9wUQsjAURzti86Vfj", "content": "", "creation_timestamp": "2025-03-06T02:17:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9c05b70d-fd5e-46ea-ab57-6aeb0a7f6753/export"/>
    <published>2025-03-06T02:17:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/844440f5-dc96-44be-965b-dde89e0757cc/export</id>
    <title>844440f5-dc96-44be-965b-dde89e0757cc</title>
    <updated>2026-05-04T10:29:24.617060+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "844440f5-dc96-44be-965b-dde89e0757cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24776", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6682", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24776\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Funadmin v3.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component \\controller\\Addon.php.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T15:25:32.188Z\n\ud83d\udd17 References:\n1. https://github.com/funadmin/funadmin/issues/7", "creation_timestamp": "2025-03-06T16:06:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/844440f5-dc96-44be-965b-dde89e0757cc/export"/>
    <published>2025-03-06T16:06:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0ddcebc7-f7e4-47fb-ab4d-fc5040e53bfc/export</id>
    <title>0ddcebc7-f7e4-47fb-ab4d-fc5040e53bfc</title>
    <updated>2026-05-04T10:29:24.616784+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0ddcebc7-f7e4-47fb-ab4d-fc5040e53bfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24774", "type": "seen", "source": "Telegram/jatIZkaUHUq5Y1tQNc6woeEuj37YV0jCdCojycZ93KkM4w", "content": "", "creation_timestamp": "2025-09-20T04:35:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0ddcebc7-f7e4-47fb-ab4d-fc5040e53bfc/export"/>
    <published>2025-09-20T04:35:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/587b109f-b1a0-48c0-bc79-13086fb37e29/export</id>
    <title>587b109f-b1a0-48c0-bc79-13086fb37e29</title>
    <updated>2026-05-04T10:29:24.613965+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "587b109f-b1a0-48c0-bc79-13086fb37e29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "seen", "source": "Telegram/jatIZkaUHUq5Y1tQNc6woeEuj37YV0jCdCojycZ93KkM4w", "content": "", "creation_timestamp": "2025-09-20T04:35:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/587b109f-b1a0-48c0-bc79-13086fb37e29/export"/>
    <published>2025-09-20T04:35:31+00:00</published>
  </entry>
</feed>
