<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T13:43:53.355924+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/43746a68-5939-45e0-bc09-49b79521e21f/export</id>
    <title>43746a68-5939-45e0-bc09-49b79521e21f</title>
    <updated>2026-05-04T13:43:53.579468+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "43746a68-5939-45e0-bc09-49b79521e21f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7625", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aAnother CVE-2024-24590 poc\nURL\uff1ahttps://github.com/pandahacker2763/CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-12T15:09:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/43746a68-5939-45e0-bc09-49b79521e21f/export"/>
    <published>2024-06-12T15:09:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dca3831f-2c1d-4aa7-8d8b-1ac27f6504df/export</id>
    <title>dca3831f-2c1d-4aa7-8d8b-1ac27f6504df</title>
    <updated>2026-05-04T13:43:53.579389+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dca3831f-2c1d-4aa7-8d8b-1ac27f6504df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7626", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aAnother CVE-2024-24590 poc\nURL\uff1ahttps://github.com/DemonPandaz2763/CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-12T15:21:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dca3831f-2c1d-4aa7-8d8b-1ac27f6504df/export"/>
    <published>2024-06-12T15:21:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/37db620e-0020-47f9-a4bc-c6e45dfe197a/export</id>
    <title>37db620e-0020-47f9-a4bc-c6e45dfe197a</title>
    <updated>2026-05-04T13:43:53.579302+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "37db620e-0020-47f9-a4bc-c6e45dfe197a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7642", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof of concept for CVE-2024-24590\nURL\uff1ahttps://github.com/OxyDeV2/ClearML-CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-13T11:42:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/37db620e-0020-47f9-a4bc-c6e45dfe197a/export"/>
    <published>2024-06-13T11:42:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fc3e3ab9-59cf-4d68-a151-d7ddcb7deb81/export</id>
    <title>fc3e3ab9-59cf-4d68-a151-d7ddcb7deb81</title>
    <updated>2026-05-04T13:43:53.579221+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fc3e3ab9-59cf-4d68-a151-d7ddcb7deb81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7661", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC (RCE &amp;amp; CMD) FOR CVE-2024-24590 CLEARML\nURL\uff1ahttps://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-15T10:04:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fc3e3ab9-59cf-4d68-a151-d7ddcb7deb81/export"/>
    <published>2024-06-15T10:04:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cac97a34-0637-4a13-99cb-50d8c08316b3/export</id>
    <title>cac97a34-0637-4a13-99cb-50d8c08316b3</title>
    <updated>2026-05-04T13:43:53.579139+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cac97a34-0637-4a13-99cb-50d8c08316b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7662", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aCVE-2024-24590 ClearML RCE&amp;amp;CMD POC\nURL\uff1ahttps://github.com/Hackhoven/Magento-RCE\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-06-15T13:04:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cac97a34-0637-4a13-99cb-50d8c08316b3/export"/>
    <published>2024-06-15T13:04:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7549c1ae-d43a-4004-9c6e-75b7c40e260a/export</id>
    <title>7549c1ae-d43a-4004-9c6e-75b7c40e260a</title>
    <updated>2026-05-04T13:43:53.579052+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7549c1ae-d43a-4004-9c6e-75b7c40e260a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2682", "content": "https://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC\n\nClearML Exploit Script\n#github #exploit", "creation_timestamp": "2024-06-17T17:57:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7549c1ae-d43a-4004-9c6e-75b7c40e260a/export"/>
    <published>2024-06-17T17:57:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/04446cfa-dd62-4b6c-9a56-6d022c23d9eb/export</id>
    <title>04446cfa-dd62-4b6c-9a56-6d022c23d9eb</title>
    <updated>2026-05-04T13:43:53.578957+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "04446cfa-dd62-4b6c-9a56-6d022c23d9eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7997", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aHere is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D\nURL\uff1ahttps://github.com/HexDoesRandomShit/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-07-16T15:26:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/04446cfa-dd62-4b6c-9a56-6d022c23d9eb/export"/>
    <published>2024-07-16T15:26:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/27de1b54-49ca-4b10-9994-fc0dc38f8644/export</id>
    <title>27de1b54-49ca-4b10-9994-fc0dc38f8644</title>
    <updated>2026-05-04T13:43:53.578862+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "27de1b54-49ca-4b10-9994-fc0dc38f8644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8038", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWith this script you can exploit the CVE-2024-24590\nURL\uff1ahttps://github.com/sviim/Clearml-CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-21T04:28:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/27de1b54-49ca-4b10-9994-fc0dc38f8644/export"/>
    <published>2024-07-21T04:28:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d8e87ed2-4ebe-4ea0-ba18-8775d78b1dde/export</id>
    <title>d8e87ed2-4ebe-4ea0-ba18-8775d78b1dde</title>
    <updated>2026-05-04T13:43:53.578730+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d8e87ed2-4ebe-4ea0-ba18-8775d78b1dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24590", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8040", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWith this script you can exploit the CVE-2024-24590\nURL\uff1ahttps://github.com/sviim/ClearML-CVE-2024-24590\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-21T04:57:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d8e87ed2-4ebe-4ea0-ba18-8775d78b1dde/export"/>
    <published>2024-07-21T04:57:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ef5d7f4-5f74-4ebe-b699-fd6b942ea685/export</id>
    <title>4ef5d7f4-5f74-4ebe-b699-fd6b942ea685</title>
    <updated>2026-05-04T13:43:53.576672+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ef5d7f4-5f74-4ebe-b699-fd6b942ea685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24593", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18601", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24593\n\ud83d\udd25 CVSS Score: 9.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A cross-site request forgery (CSRF) vulnerability in all versions up to 1.14.1 of the api server component of Allegro AI\u2019s ClearML platform allows a remote attacker to impersonate a user by sending API requests via maliciously crafted html. Exploitation of the vulnerability allows an attacker to compromise confidential workspaces and files, leak sensitive information, and target instances of the ClearML platform within closed off networks.\n\n\ud83d\udccf Published: 2024-02-06T14:41:44.470Z\n\ud83d\udccf Modified: 2025-06-17T14:25:25.374Z\n\ud83d\udd17 References:\n1. https://hiddenlayer.com/research/not-so-clear-how-mlops-solutions-can-muddy-the-waters-of-your-supply-chain/", "creation_timestamp": "2025-06-17T14:40:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ef5d7f4-5f74-4ebe-b699-fd6b942ea685/export"/>
    <published>2025-06-17T14:40:11+00:00</published>
  </entry>
</feed>
