<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T07:00:08.536646+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/45b3895e-542e-4162-9d0d-69565142da5b/export</id>
    <title>45b3895e-542e-4162-9d0d-69565142da5b</title>
    <updated>2026-05-10T07:00:08.834511+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "45b3895e-542e-4162-9d0d-69565142da5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25300", "type": "seen", "source": "https://t.me/ctinow/184978", "content": "https://ift.tt/o2AlxhD\nCVE-2024-25300", "creation_timestamp": "2024-02-14T20:26:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/45b3895e-542e-4162-9d0d-69565142da5b/export"/>
    <published>2024-02-14T20:26:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9215596-b88d-4590-9517-eb13597ef5e9/export</id>
    <title>d9215596-b88d-4590-9517-eb13597ef5e9</title>
    <updated>2026-05-10T07:00:08.834433+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9215596-b88d-4590-9517-eb13597ef5e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25301", "type": "seen", "source": "https://t.me/ctinow/184979", "content": "https://ift.tt/q6zV1BH\nCVE-2024-25301", "creation_timestamp": "2024-02-14T20:26:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9215596-b88d-4590-9517-eb13597ef5e9/export"/>
    <published>2024-02-14T20:26:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d2d2a7dd-6b1d-4475-9fa0-1b48b1c7f2e2/export</id>
    <title>d2d2a7dd-6b1d-4475-9fa0-1b48b1c7f2e2</title>
    <updated>2026-05-10T07:00:08.834349+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d2d2a7dd-6b1d-4475-9fa0-1b48b1c7f2e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25307", "type": "seen", "source": "https://t.me/ctinow/198485", "content": "https://ift.tt/MwRJplj\nCVE-2024-25307 | code-projects Cinema Seat Reservation System 1.0 booking.php id sql injection", "creation_timestamp": "2024-03-02T22:51:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d2d2a7dd-6b1d-4475-9fa0-1b48b1c7f2e2/export"/>
    <published>2024-03-02T22:51:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3891796c-4fba-4aaa-a46d-c2e842c16a5d/export</id>
    <title>3891796c-4fba-4aaa-a46d-c2e842c16a5d</title>
    <updated>2026-05-10T07:00:08.834266+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3891796c-4fba-4aaa-a46d-c2e842c16a5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25302", "type": "seen", "source": "https://t.me/ctinow/198583", "content": "https://ift.tt/sJX6lTZ\nCVE-2024-25302 | SourceCodester Event Student Attendance System 1.0 student sql injection", "creation_timestamp": "2024-03-03T07:06:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3891796c-4fba-4aaa-a46d-c2e842c16a5d/export"/>
    <published>2024-03-03T07:06:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/18c9fcb6-3ee3-4a86-9860-472f452dfc1b/export</id>
    <title>18c9fcb6-3ee3-4a86-9860-472f452dfc1b</title>
    <updated>2026-05-10T07:00:08.834176+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "18c9fcb6-3ee3-4a86-9860-472f452dfc1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2530", "type": "seen", "source": "https://t.me/ctinow/209131", "content": "https://ift.tt/i9zobB3\nCVE-2024-2530 | MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0 /admin/update-rooms.php id cross site scripting", "creation_timestamp": "2024-03-15T21:01:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/18c9fcb6-3ee3-4a86-9860-472f452dfc1b/export"/>
    <published>2024-03-15T21:01:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/474cc1cb-e59c-4289-b329-dffd6c641e54/export</id>
    <title>474cc1cb-e59c-4289-b329-dffd6c641e54</title>
    <updated>2026-05-10T07:00:08.834086+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "474cc1cb-e59c-4289-b329-dffd6c641e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2530", "type": "seen", "source": "https://t.me/ctinow/209721", "content": "https://ift.tt/2tJUONq\nCVE-2024-2530", "creation_timestamp": "2024-03-16T22:21:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/474cc1cb-e59c-4289-b329-dffd6c641e54/export"/>
    <published>2024-03-16T22:21:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8830b839-53ad-4d18-a4bd-27b07ae15478/export</id>
    <title>8830b839-53ad-4d18-a4bd-27b07ae15478</title>
    <updated>2026-05-10T07:00:08.833992+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8830b839-53ad-4d18-a4bd-27b07ae15478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2530", "type": "seen", "source": "https://t.me/ctinow/209723", "content": "https://ift.tt/2tJUONq\nCVE-2024-2530", "creation_timestamp": "2024-03-16T22:26:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8830b839-53ad-4d18-a4bd-27b07ae15478/export"/>
    <published>2024-03-16T22:26:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/76e4ece4-d624-4892-bfc0-8e7abe942874/export</id>
    <title>76e4ece4-d624-4892-bfc0-8e7abe942874</title>
    <updated>2026-05-10T07:00:08.833884+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "76e4ece4-d624-4892-bfc0-8e7abe942874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25300", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7427", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25300\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in Redaxo v5.15.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter in the Template section.\n\ud83d\udccf Published: 2024-02-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-13T16:29:04.011Z\n\ud83d\udd17 References:\n1. https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/XSS.md", "creation_timestamp": "2025-03-13T16:45:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/76e4ece4-d624-4892-bfc0-8e7abe942874/export"/>
    <published>2025-03-13T16:45:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a503e8d3-2da5-4c60-ba24-4d85f7195370/export</id>
    <title>a503e8d3-2da5-4c60-ba24-4d85f7195370</title>
    <updated>2026-05-10T07:00:08.833737+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a503e8d3-2da5-4c60-ba24-4d85f7195370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25308", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25308\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'name' parameter at School/teacher_login.php.\n\ud83d\udccf Published: 2024-02-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-12T15:04:59.567Z\n\ud83d\udd17 References:\n1. https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-6.md", "creation_timestamp": "2025-06-12T15:34:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a503e8d3-2da5-4c60-ba24-4d85f7195370/export"/>
    <published>2025-06-12T15:34:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a03b4359-59bf-4bc8-ae71-59b7dc07ccda/export</id>
    <title>a03b4359-59bf-4bc8-ae71-59b7dc07ccda</title>
    <updated>2026-05-10T07:00:08.831416+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a03b4359-59bf-4bc8-ae71-59b7dc07ccda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25307", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19069", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25307\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Code-projects Cinema Seat Reservation System 1.0 allows SQL Injection via the 'id' parameter at \"/Cinema-Reservation/booking.php?id=1.\"\n\ud83d\udccf Published: 2024-02-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T20:19:30.574Z\n\ud83d\udd17 References:\n1. https://github.com/tubakvgc/CVEs/blob/main/Cinema%20Seat%20Reservation%20System/Cinema%20Seat%20Reservation%20System%20-%20SQL%20Injection.md", "creation_timestamp": "2025-06-20T20:44:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a03b4359-59bf-4bc8-ae71-59b7dc07ccda/export"/>
    <published>2025-06-20T20:44:12+00:00</published>
  </entry>
</feed>
