<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:11:24.861285+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3438597d-3c9b-4ad2-963d-5840b9086009/export</id>
    <title>3438597d-3c9b-4ad2-963d-5840b9086009</title>
    <updated>2026-05-06T10:11:25.184048+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3438597d-3c9b-4ad2-963d-5840b9086009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "Telegram/vOnFw-tbLHXYYB-E0PtL8udwSbsTwJfbnnja3d_osVpsMw", "content": "", "creation_timestamp": "2024-02-16T04:14:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3438597d-3c9b-4ad2-963d-5840b9086009/export"/>
    <published>2024-02-16T04:14:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6311ed52-9374-4f60-b945-d61c34835f43/export</id>
    <title>6311ed52-9374-4f60-b945-d61c34835f43</title>
    <updated>2026-05-06T10:11:25.183981+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6311ed52-9374-4f60-b945-d61c34835f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1986", "content": "https://github.com/erick-duarte/CVE-2024-24386\n\nVitalPBX - CVE-2024-24386\n#github #exploit #poc", "creation_timestamp": "2024-02-16T04:19:21.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6311ed52-9374-4f60-b945-d61c34835f43/export"/>
    <published>2024-02-16T04:19:21+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0c7899b8-3e62-41d6-a448-2fd566c0fe6a/export</id>
    <title>0c7899b8-3e62-41d6-a448-2fd566c0fe6a</title>
    <updated>2026-05-06T10:11:25.183906+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0c7899b8-3e62-41d6-a448-2fd566c0fe6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9977", "content": "#exploit\n1. CVE-2024-23749:\nCommand Injection in KiTTY Get Remote File Through SCP Input\nhttps://blog.defcesco.io/CVE-2024-23749\n\n2. CVE-2024-23724:\nGhost CMS Stored XSS Leading to Owner Takeover\nhttps://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss\n]-&amp;gt; https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724\n\n3. CVE-2024-24386:\nVitalPBX &amp;lt;3.2.5 - Command Injection\nhttps://github.com/erick-duarte/CVE-2024-24386", "creation_timestamp": "2024-02-23T06:29:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0c7899b8-3e62-41d6-a448-2fd566c0fe6a/export"/>
    <published>2024-02-23T06:29:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e56ab00d-f67a-4844-ba62-4c69007dd9d4/export</id>
    <title>e56ab00d-f67a-4844-ba62-4c69007dd9d4</title>
    <updated>2026-05-06T10:11:25.183830+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e56ab00d-f67a-4844-ba62-4c69007dd9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24388", "type": "seen", "source": "https://t.me/ctinow/192787", "content": "https://ift.tt/zP5HiYd\nCVE-2024-24388 | XunRuiCMS up to 4.6.2 Background Login cross site scripting", "creation_timestamp": "2024-02-25T09:11:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e56ab00d-f67a-4844-ba62-4c69007dd9d4/export"/>
    <published>2024-02-25T09:11:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/253de69b-9262-4d02-9581-353f8912ba73/export</id>
    <title>253de69b-9262-4d02-9581-353f8912ba73</title>
    <updated>2026-05-06T10:11:25.183758+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "253de69b-9262-4d02-9581-353f8912ba73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24389", "type": "seen", "source": "https://t.me/ctinow/202024", "content": "https://ift.tt/3rqMd1v\nCVE-2024-24389", "creation_timestamp": "2024-03-07T03:26:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/253de69b-9262-4d02-9581-353f8912ba73/export"/>
    <published>2024-03-07T03:26:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/34e16ac5-ef2d-4e49-8177-ec6ab9a97d2d/export</id>
    <title>34e16ac5-ef2d-4e49-8177-ec6ab9a97d2d</title>
    <updated>2026-05-06T10:11:25.183687+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "34e16ac5-ef2d-4e49-8177-ec6ab9a97d2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24389", "type": "seen", "source": "https://t.me/ctinow/202028", "content": "https://ift.tt/3rqMd1v\nCVE-2024-24389", "creation_timestamp": "2024-03-07T03:32:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/34e16ac5-ef2d-4e49-8177-ec6ab9a97d2d/export"/>
    <published>2024-03-07T03:32:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f2b3e913-6d3c-435c-a6a7-8cb07ab46dd8/export</id>
    <title>f2b3e913-6d3c-435c-a6a7-8cb07ab46dd8</title>
    <updated>2026-05-06T10:11:25.183614+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f2b3e913-6d3c-435c-a6a7-8cb07ab46dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2438", "type": "seen", "source": "https://t.me/ctinow/207603", "content": "https://ift.tt/Ll6wrYd\nCVE-2024-2438", "creation_timestamp": "2024-03-14T10:27:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f2b3e913-6d3c-435c-a6a7-8cb07ab46dd8/export"/>
    <published>2024-03-14T10:27:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5ad44429-679e-4126-897c-09cb7afc8952/export</id>
    <title>5ad44429-679e-4126-897c-09cb7afc8952</title>
    <updated>2026-05-06T10:11:25.183520+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5ad44429-679e-4126-897c-09cb7afc8952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2438", "type": "seen", "source": "https://t.me/ctinow/207610", "content": "https://ift.tt/Ll6wrYd\nCVE-2024-2438", "creation_timestamp": "2024-03-14T10:27:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5ad44429-679e-4126-897c-09cb7afc8952/export"/>
    <published>2024-03-14T10:27:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c1d1b1ac-72e7-44e8-8d1f-8956ff32f565/export</id>
    <title>c1d1b1ac-72e7-44e8-8d1f-8956ff32f565</title>
    <updated>2026-05-06T10:11:25.183414+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c1d1b1ac-72e7-44e8-8d1f-8956ff32f565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6860", "content": "https://github.com/erick-duarte/CVE-2024-24386\n\nVitalPBX - CVE-2024-24386\n#github #exploit #poc", "creation_timestamp": "2024-06-08T00:13:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c1d1b1ac-72e7-44e8-8d1f-8956ff32f565/export"/>
    <published>2024-06-08T00:13:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb47e1fc-13c8-4440-b14a-13e99b6890c5/export</id>
    <title>eb47e1fc-13c8-4440-b14a-13e99b6890c5</title>
    <updated>2026-05-06T10:11:25.181883+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb47e1fc-13c8-4440-b14a-13e99b6890c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24389", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9228", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24389\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in XunRuiCMS up to v4.6.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Add Column Name parameter.\n\ud83d\udccf Published: 2024-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-27T21:02:47.978Z\n\ud83d\udd17 References:\n1. https://j11zuc9f0h2.feishu.cn/docx/TXRmdIcH3ocn1WxuEQBcNPpjnLe", "creation_timestamp": "2025-03-27T21:27:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb47e1fc-13c8-4440-b14a-13e99b6890c5/export"/>
    <published>2025-03-27T21:27:56+00:00</published>
  </entry>
</feed>
