<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:01:12.919078+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c09569ad-8e71-4d81-9eab-c536e3aa974a/export</id>
    <title>c09569ad-8e71-4d81-9eab-c536e3aa974a</title>
    <updated>2026-05-04T13:01:13.265810+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c09569ad-8e71-4d81-9eab-c536e3aa974a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13103", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113758211078784435", "content": "", "creation_timestamp": "2025-01-02T10:09:07.555825Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c09569ad-8e71-4d81-9eab-c536e3aa974a/export"/>
    <published>2025-01-02T10:09:07.555825+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0582ffa3-2a6a-43cd-aa38-00fee2b1d4c1/export</id>
    <title>0582ffa3-2a6a-43cd-aa38-00fee2b1d4c1</title>
    <updated>2026-05-04T13:01:13.265585+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0582ffa3-2a6a-43cd-aa38-00fee2b1d4c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13103", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leqtstiqlb22", "content": "", "creation_timestamp": "2025-01-02T10:15:39.633373Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0582ffa3-2a6a-43cd-aa38-00fee2b1d4c1/export"/>
    <published>2025-01-02T10:15:39.633373+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b0c4b80c-597f-452d-91d1-edf9a881082e/export</id>
    <title>b0c4b80c-597f-452d-91d1-edf9a881082e</title>
    <updated>2026-05-04T13:01:13.262717+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b0c4b80c-597f-452d-91d1-edf9a881082e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13103", "type": "seen", "source": "https://t.me/cvedetector/14115", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13103 - D-Link DIR-816 Virtual Service Handler Improper Access Controls Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13103 \nPublished : Jan. 2, 2025, 10:15 a.m. | 26\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This issue affects some unknown processing of the file /goform/form2AddVrtsrv.cgi of the component Virtual Service Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T11:44:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b0c4b80c-597f-452d-91d1-edf9a881082e/export"/>
    <published>2025-01-02T11:44:32+00:00</published>
  </entry>
</feed>
