<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:43:12.321807+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/29d13395-30da-4aee-98f1-1841d87448e0/export</id>
    <title>29d13395-30da-4aee-98f1-1841d87448e0</title>
    <updated>2026-05-06T10:43:12.775117+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "29d13395-30da-4aee-98f1-1841d87448e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22504", "type": "seen", "source": "https://t.me/arpsyndicate/3360", "content": "#ExploitObserverAlert\n\nZDI-24-107\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-107. Allegra extarctZippedFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-22504.", "creation_timestamp": "2024-02-11T12:20:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/29d13395-30da-4aee-98f1-1841d87448e0/export"/>
    <published>2024-02-11T12:20:51+00:00</published>
  </entry>
</feed>
