<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T06:00:00.950585+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4802b18c-f6cc-40fd-9333-24af715a7b46/export</id>
    <title>4802b18c-f6cc-40fd-9333-24af715a7b46</title>
    <updated>2026-05-10T06:00:01.242353+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4802b18c-f6cc-40fd-9333-24af715a7b46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25213", "type": "seen", "source": "https://t.me/ctinow/201421", "content": "https://ift.tt/DQ1cVEY\nCVE-2024-25213 | Employee Managment System 1.0 /edit.php id sql injection", "creation_timestamp": "2024-03-06T15:16:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4802b18c-f6cc-40fd-9333-24af715a7b46/export"/>
    <published>2024-03-06T15:16:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d308cf68-b7b0-4ad9-8cbb-a181f414d55f/export</id>
    <title>d308cf68-b7b0-4ad9-8cbb-a181f414d55f</title>
    <updated>2026-05-10T06:00:01.242268+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d308cf68-b7b0-4ad9-8cbb-a181f414d55f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25215", "type": "seen", "source": "https://t.me/ctinow/201422", "content": "https://ift.tt/Kn0pcb3\nCVE-2024-25215 | Employee Managment System 1.0 /aprocess.php pwd sql injection", "creation_timestamp": "2024-03-06T15:16:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d308cf68-b7b0-4ad9-8cbb-a181f414d55f/export"/>
    <published>2024-03-06T15:16:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3da4ae22-24d1-48fe-ab88-a9f174216456/export</id>
    <title>3da4ae22-24d1-48fe-ab88-a9f174216456</title>
    <updated>2026-05-10T06:00:01.242189+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3da4ae22-24d1-48fe-ab88-a9f174216456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25216", "type": "seen", "source": "https://t.me/ctinow/201423", "content": "https://ift.tt/42fpcx6\nCVE-2024-25216 | Employee Managment System 1.0 /aprocess.php mailud sql injection", "creation_timestamp": "2024-03-06T15:16:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3da4ae22-24d1-48fe-ab88-a9f174216456/export"/>
    <published>2024-03-06T15:16:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/822c9337-5319-4734-b09c-843fcf147ce1/export</id>
    <title>822c9337-5319-4734-b09c-843fcf147ce1</title>
    <updated>2026-05-10T06:00:01.242101+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "822c9337-5319-4734-b09c-843fcf147ce1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25219", "type": "seen", "source": "https://t.me/ctinow/201425", "content": "https://ift.tt/m5fTVFw\nCVE-2024-25219 | Task Manager App 1.0 /TaskManager/Task.php Task Name cross site scripting", "creation_timestamp": "2024-03-06T15:16:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/822c9337-5319-4734-b09c-843fcf147ce1/export"/>
    <published>2024-03-06T15:16:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9ac7c120-5658-45b5-b129-1db7809cfff4/export</id>
    <title>9ac7c120-5658-45b5-b129-1db7809cfff4</title>
    <updated>2026-05-10T06:00:01.242011+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9ac7c120-5658-45b5-b129-1db7809cfff4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25218", "type": "seen", "source": "https://t.me/ctinow/201453", "content": "https://ift.tt/GYFw3p2\nCVE-2024-25218 | Task Manager App 1.0 Projects.php Project Name cross site scripting", "creation_timestamp": "2024-03-06T15:46:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9ac7c120-5658-45b5-b129-1db7809cfff4/export"/>
    <published>2024-03-06T15:46:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a1115d51-98b9-4164-acc5-18155c1292c4/export</id>
    <title>a1115d51-98b9-4164-acc5-18155c1292c4</title>
    <updated>2026-05-10T06:00:01.241929+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a1115d51-98b9-4164-acc5-18155c1292c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2521", "type": "seen", "source": "https://t.me/ctinow/209122", "content": "https://ift.tt/9VnqjJF\nCVE-2024-2521 | MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0 /admin/bookdate.php id cross site scripting", "creation_timestamp": "2024-03-15T21:01:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a1115d51-98b9-4164-acc5-18155c1292c4/export"/>
    <published>2024-03-15T21:01:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/70a4cfaf-f3aa-466c-a80e-6c6ad7652ca5/export</id>
    <title>70a4cfaf-f3aa-466c-a80e-6c6ad7652ca5</title>
    <updated>2026-05-10T06:00:01.241847+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "70a4cfaf-f3aa-466c-a80e-6c6ad7652ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2521", "type": "seen", "source": "https://t.me/ctinow/209621", "content": "https://ift.tt/cD2nPaC\nCVE-2024-2521", "creation_timestamp": "2024-03-16T17:21:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/70a4cfaf-f3aa-466c-a80e-6c6ad7652ca5/export"/>
    <published>2024-03-16T17:21:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3adcf2d7-c673-41cb-9f63-06ef8ee834ae/export</id>
    <title>3adcf2d7-c673-41cb-9f63-06ef8ee834ae</title>
    <updated>2026-05-10T06:00:01.241759+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3adcf2d7-c673-41cb-9f63-06ef8ee834ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2521", "type": "seen", "source": "https://t.me/ctinow/209626", "content": "https://ift.tt/cD2nPaC\nCVE-2024-2521", "creation_timestamp": "2024-03-16T17:26:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3adcf2d7-c673-41cb-9f63-06ef8ee834ae/export"/>
    <published>2024-03-16T17:26:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7a4cbea4-4960-4ada-8fe9-314c64ca53d6/export</id>
    <title>7a4cbea4-4960-4ada-8fe9-314c64ca53d6</title>
    <updated>2026-05-10T06:00:01.241628+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7a4cbea4-4960-4ada-8fe9-314c64ca53d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2521", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4459", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-2521\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-03-16T16:15:07.497\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20bookdate.php.md\n2. https://vuldb.com/?ctiid.256958\n3. https://vuldb.com/?id.256958\n4. https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20bookdate.php.md\n5. https://vuldb.com/?ctiid.256958\n6. https://vuldb.com/?id.256958", "creation_timestamp": "2025-02-14T17:11:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7a4cbea4-4960-4ada-8fe9-314c64ca53d6/export"/>
    <published>2025-02-14T17:11:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5b67ff94-6867-4514-bfb6-421dd24700bb/export</id>
    <title>5b67ff94-6867-4514-bfb6-421dd24700bb</title>
    <updated>2026-05-10T06:00:01.239302+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5b67ff94-6867-4514-bfb6-421dd24700bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25217", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9182", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25217\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Online Medicine Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /omos/?p=products/view_product.\n\ud83d\udccf Published: 2024-02-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-27T19:08:48.062Z\n\ud83d\udd17 References:\n1. https://github.com/BurakSevben/CVEs/blob/main/Online%20Medicine%20Ordering%20System/OMOS%20-%20SQL%20Injection%28Unauthenticated%29.md", "creation_timestamp": "2025-03-27T19:26:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5b67ff94-6867-4514-bfb6-421dd24700bb/export"/>
    <published>2025-03-27T19:26:55+00:00</published>
  </entry>
</feed>
