<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T15:46:47.672285+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/72a94504-fc89-47d8-bbab-64a191a6c5a4/export</id>
    <title>72a94504-fc89-47d8-bbab-64a191a6c5a4</title>
    <updated>2026-05-06T15:46:48.094376+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "72a94504-fc89-47d8-bbab-64a191a6c5a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1705", "type": "seen", "source": "https://t.me/ctinow/189965", "content": "https://ift.tt/ARcIZTa\nCVE-2024-1705", "creation_timestamp": "2024-02-21T19:21:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/72a94504-fc89-47d8-bbab-64a191a6c5a4/export"/>
    <published>2024-02-21T19:21:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9ce4ad60-d20b-4f50-aab4-003bc21f61c3/export</id>
    <title>9ce4ad60-d20b-4f50-aab4-003bc21f61c3</title>
    <updated>2026-05-06T15:46:48.094292+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9ce4ad60-d20b-4f50-aab4-003bc21f61c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1705", "type": "seen", "source": "https://t.me/arpsyndicate/4039", "content": "#ExploitObserverAlert\n\nCVE-2024-1705\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1705. A vulnerability was found in Shopwind up to 4.6. It has been rated as critical. This issue affects the function actionCreate of the file /public/install/controllers/DefaultController.php of the component Installation. The manipulation leads to code injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-254393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.", "creation_timestamp": "2024-02-22T20:40:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9ce4ad60-d20b-4f50-aab4-003bc21f61c3/export"/>
    <published>2024-02-22T20:40:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/23874c34-79b5-4b05-bb60-58f480019fe6/export</id>
    <title>23874c34-79b5-4b05-bb60-58f480019fe6</title>
    <updated>2026-05-06T15:46:48.094185+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "23874c34-79b5-4b05-bb60-58f480019fe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1705", "type": "seen", "source": "https://t.me/ctinow/206462", "content": "https://ift.tt/diI9Cfa\nCVE-2024-1705 | Shopwind up to 4.6 Installation DefaultController.php actionCreate code injection", "creation_timestamp": "2024-03-13T08:36:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/23874c34-79b5-4b05-bb60-58f480019fe6/export"/>
    <published>2024-03-13T08:36:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/354c684b-5433-4be2-ac3e-c7eef81f56b7/export</id>
    <title>354c684b-5433-4be2-ac3e-c7eef81f56b7</title>
    <updated>2026-05-06T15:46:48.092282+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "354c684b-5433-4be2-ac3e-c7eef81f56b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1705", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3952", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1705\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-02-21T18:15:50.823\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://note.zhaoj.in/share/QHdXavkw5eDm\n2. https://vuldb.com/?ctiid.254393\n3. https://vuldb.com/?id.254393\n4. https://note.zhaoj.in/share/QHdXavkw5eDm\n5. https://vuldb.com/?ctiid.254393\n6. https://vuldb.com/?id.254393", "creation_timestamp": "2025-02-12T01:08:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/354c684b-5433-4be2-ac3e-c7eef81f56b7/export"/>
    <published>2025-02-12T01:08:07+00:00</published>
  </entry>
</feed>
