<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T07:00:10.600721+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9fcc7fc5-0b89-4aeb-a511-1fefb966c7b9/export</id>
    <title>9fcc7fc5-0b89-4aeb-a511-1fefb966c7b9</title>
    <updated>2026-05-10T07:00:10.965644+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9fcc7fc5-0b89-4aeb-a511-1fefb966c7b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25350", "type": "seen", "source": "https://t.me/ctinow/195970", "content": "https://ift.tt/snymZq9\nCVE-2024-25350", "creation_timestamp": "2024-02-28T23:27:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9fcc7fc5-0b89-4aeb-a511-1fefb966c7b9/export"/>
    <published>2024-02-28T23:27:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6d12cee7-831d-482d-ae96-78181e83c6ac/export</id>
    <title>6d12cee7-831d-482d-ae96-78181e83c6ac</title>
    <updated>2026-05-10T07:00:10.965550+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6d12cee7-831d-482d-ae96-78181e83c6ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25351", "type": "seen", "source": "https://t.me/ctinow/195971", "content": "https://ift.tt/QLEaOzG\nCVE-2024-25351", "creation_timestamp": "2024-02-28T23:27:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6d12cee7-831d-482d-ae96-78181e83c6ac/export"/>
    <published>2024-02-28T23:27:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/606d0d4b-dc0b-431d-813c-399a26bb7f93/export</id>
    <title>606d0d4b-dc0b-431d-813c-399a26bb7f93</title>
    <updated>2026-05-10T07:00:10.965457+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "606d0d4b-dc0b-431d-813c-399a26bb7f93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2535", "type": "seen", "source": "https://t.me/ctinow/208986", "content": "https://ift.tt/DVHjWQR\nCVE-2024-2535 | MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0 /admin/users.php id cross site scripting", "creation_timestamp": "2024-03-15T17:56:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/606d0d4b-dc0b-431d-813c-399a26bb7f93/export"/>
    <published>2024-03-15T17:56:54+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b2bd7643-876f-428e-ab82-e173db0409d5/export</id>
    <title>b2bd7643-876f-428e-ab82-e173db0409d5</title>
    <updated>2026-05-10T07:00:10.965358+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b2bd7643-876f-428e-ab82-e173db0409d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2535", "type": "seen", "source": "https://t.me/ctinow/209748", "content": "https://ift.tt/y7vFuHT\nCVE-2024-2535", "creation_timestamp": "2024-03-17T02:21:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b2bd7643-876f-428e-ab82-e173db0409d5/export"/>
    <published>2024-03-17T02:21:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/848883d5-5723-460e-ad7b-2801515e0780/export</id>
    <title>848883d5-5723-460e-ad7b-2801515e0780</title>
    <updated>2026-05-10T07:00:10.965235+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "848883d5-5723-460e-ad7b-2801515e0780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2535", "type": "seen", "source": "https://t.me/ctinow/209749", "content": "https://ift.tt/y7vFuHT\nCVE-2024-2535", "creation_timestamp": "2024-03-17T02:26:32.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/848883d5-5723-460e-ad7b-2801515e0780/export"/>
    <published>2024-03-17T02:26:32+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1f2696cf-c5f1-4ebc-aa3b-19e6759a2bfe/export</id>
    <title>1f2696cf-c5f1-4ebc-aa3b-19e6759a2bfe</title>
    <updated>2026-05-10T07:00:10.963324+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1f2696cf-c5f1-4ebc-aa3b-19e6759a2bfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25350", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12882", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25350\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SQL Injection vulnerability in /zms/admin/edit-ticket.php in PHPGurukul Zoo Management System 1.0 via tickettype and tprice parameters.\n\ud83d\udccf Published: 2024-02-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T15:59:21.882Z\n\ud83d\udd17 References:\n1. https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Edit_Ticket.md", "creation_timestamp": "2025-04-22T16:03:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1f2696cf-c5f1-4ebc-aa3b-19e6759a2bfe/export"/>
    <published>2025-04-22T16:03:23+00:00</published>
  </entry>
</feed>
