<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T04:52:17.074981+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cdf2b6a6-c003-4be9-841f-b791d4905a56/export</id>
    <title>cdf2b6a6-c003-4be9-841f-b791d4905a56</title>
    <updated>2026-05-07T04:52:17.353540+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cdf2b6a6-c003-4be9-841f-b791d4905a56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21655", "type": "seen", "source": "https://t.me/ctinow/178335", "content": "https://ift.tt/FrWSLA7\nCVE-2024-21655 | Discourse up to 3.1.3/3.2.0.beta3 resource consumption (GHSA-m5fc-94mm-38fx)", "creation_timestamp": "2024-02-03T00:21:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cdf2b6a6-c003-4be9-841f-b791d4905a56/export"/>
    <published>2024-02-03T00:21:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/27e022a4-f483-45e8-80dd-d4e49ecd4f66/export</id>
    <title>27e022a4-f483-45e8-80dd-d4e49ecd4f66</title>
    <updated>2026-05-07T04:52:17.353441+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "27e022a4-f483-45e8-80dd-d4e49ecd4f66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21654", "type": "seen", "source": "https://t.me/ctinow/178358", "content": "https://ift.tt/A3ZY1iH\nCVE-2024-21654 | RubyGems.org 2FA improper authentication (GHSA-4v23-vj8h-7jp2)", "creation_timestamp": "2024-02-03T02:26:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/27e022a4-f483-45e8-80dd-d4e49ecd4f66/export"/>
    <published>2024-02-03T02:26:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/92d64289-2888-4481-a2a7-7bcd04a45c08/export</id>
    <title>92d64289-2888-4481-a2a7-7bcd04a45c08</title>
    <updated>2026-05-07T04:52:17.353334+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "92d64289-2888-4481-a2a7-7bcd04a45c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21653", "type": "seen", "source": "https://t.me/ctinow/190528", "content": "https://ift.tt/NPJga7i\nCVE-2024-21653 | vantage6 up to 4.1.x SSH Service access control (GHSA-2wgc-48g2-cj5w)", "creation_timestamp": "2024-02-22T08:37:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/92d64289-2888-4481-a2a7-7bcd04a45c08/export"/>
    <published>2024-02-22T08:37:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c0b3370-c2ce-4a73-9f30-e22b1efc267e/export</id>
    <title>8c0b3370-c2ce-4a73-9f30-e22b1efc267e</title>
    <updated>2026-05-07T04:52:17.353246+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c0b3370-c2ce-4a73-9f30-e22b1efc267e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21652", "type": "seen", "source": "https://t.me/ctinow/210869", "content": "https://ift.tt/5iYKrbl\nCVE-2024-21652", "creation_timestamp": "2024-03-18T19:27:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c0b3370-c2ce-4a73-9f30-e22b1efc267e/export"/>
    <published>2024-03-18T19:27:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/97ab9ceb-75c5-43bd-b90e-8c5042f9efea/export</id>
    <title>97ab9ceb-75c5-43bd-b90e-8c5042f9efea</title>
    <updated>2026-05-07T04:52:17.353124+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "97ab9ceb-75c5-43bd-b90e-8c5042f9efea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21652", "type": "seen", "source": "https://t.me/ctinow/210925", "content": "https://ift.tt/zsY5gMX\nCVE-2024-21652", "creation_timestamp": "2024-03-18T20:36:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/97ab9ceb-75c5-43bd-b90e-8c5042f9efea/export"/>
    <published>2024-03-18T20:36:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f2f73a4a-f034-4c7a-acd2-bb9de020d305/export</id>
    <title>f2f73a4a-f034-4c7a-acd2-bb9de020d305</title>
    <updated>2026-05-07T04:52:17.353036+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f2f73a4a-f034-4c7a-acd2-bb9de020d305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2165", "type": "seen", "source": "https://t.me/arpsyndicate/4481", "content": "#ExploitObserverAlert\n\nCVE-2024-2165\n\nDESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-2165. The SEOPress \u2013 On-site SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image alt parameter in all versions up to, and including, 7.5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-04-11T08:34:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f2f73a4a-f034-4c7a-acd2-bb9de020d305/export"/>
    <published>2024-04-11T08:34:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a1c0274d-3816-4d65-9548-5e13893e2b13/export</id>
    <title>a1c0274d-3816-4d65-9548-5e13893e2b13</title>
    <updated>2026-05-07T04:52:17.352930+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a1c0274d-3816-4d65-9548-5e13893e2b13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21650", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7784", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aMass Exploit - CVE-2024-21650 - XWiki &amp;lt; Remote code execution (RCE)\nURL\uff1ahttps://github.com/codeb0ss/CVE-2024-21650-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-28T16:03:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a1c0274d-3816-4d65-9548-5e13893e2b13/export"/>
    <published>2024-06-28T16:03:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/58df76d7-eb36-4700-a854-cf3df0594cb4/export</id>
    <title>58df76d7-eb36-4700-a854-cf3df0594cb4</title>
    <updated>2026-05-07T04:52:17.352820+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "58df76d7-eb36-4700-a854-cf3df0594cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21658", "type": "seen", "source": "https://t.me/cvedetector/4539", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21658 - Discourse Calendar Insufficient Input Validation Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-21658 \nPublished : Aug. 30, 2024, 6:15 p.m. | 15\u00a0minutes ago \nDescription : discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-30T20:39:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/58df76d7-eb36-4700-a854-cf3df0594cb4/export"/>
    <published>2024-08-30T20:39:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1b81df89-76db-4ef8-89ac-28b375a5a3bb/export</id>
    <title>1b81df89-76db-4ef8-89ac-28b375a5a3bb</title>
    <updated>2026-05-07T04:52:17.352679+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1b81df89-76db-4ef8-89ac-28b375a5a3bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21650", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1472", "content": "", "creation_timestamp": "2024-09-17T21:29:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1b81df89-76db-4ef8-89ac-28b375a5a3bb/export"/>
    <published>2024-09-17T21:29:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b59b5ded-b041-4dd6-a0d5-e122f65ab1c1/export</id>
    <title>b59b5ded-b041-4dd6-a0d5-e122f65ab1c1</title>
    <updated>2026-05-07T04:52:17.350150+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b59b5ded-b041-4dd6-a0d5-e122f65ab1c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21650", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lztuw3a3io2e", "content": "", "creation_timestamp": "2025-09-27T21:02:28.200237Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b59b5ded-b041-4dd6-a0d5-e122f65ab1c1/export"/>
    <published>2025-09-27T21:02:28.200237+00:00</published>
  </entry>
</feed>
