<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T02:38:46.924419+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/12e842b4-2e5b-49f2-9450-5cba82d1adfe/export</id>
    <title>12e842b4-2e5b-49f2-9450-5cba82d1adfe</title>
    <updated>2026-05-05T02:38:47.261728+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "12e842b4-2e5b-49f2-9450-5cba82d1adfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2566", "type": "seen", "source": "https://t.me/ctinow/209556", "content": "https://ift.tt/bASY15o\nCVE-2024-2566 | Fujian Kelixin Communication Command and Dispatch Platform up to 20240313 get_extension_yl.php imei sql injection", "creation_timestamp": "2024-03-16T14:21:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/12e842b4-2e5b-49f2-9450-5cba82d1adfe/export"/>
    <published>2024-03-16T14:21:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/54571c2e-b033-418d-b40d-819217f982ce/export</id>
    <title>54571c2e-b033-418d-b40d-819217f982ce</title>
    <updated>2026-05-05T02:38:47.261663+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "54571c2e-b033-418d-b40d-819217f982ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2566", "type": "seen", "source": "https://t.me/ctinow/209981", "content": "https://ift.tt/xCwFJTO\nCVE-2024-2566", "creation_timestamp": "2024-03-17T16:21:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/54571c2e-b033-418d-b40d-819217f982ce/export"/>
    <published>2024-03-17T16:21:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ac22f7ee-bb82-4d73-b030-2c6529fd42e8/export</id>
    <title>ac22f7ee-bb82-4d73-b030-2c6529fd42e8</title>
    <updated>2026-05-05T02:38:47.261595+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ac22f7ee-bb82-4d73-b030-2c6529fd42e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2566", "type": "seen", "source": "https://t.me/ctinow/209983", "content": "https://ift.tt/xCwFJTO\nCVE-2024-2566", "creation_timestamp": "2024-03-17T16:26:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ac22f7ee-bb82-4d73-b030-2c6529fd42e8/export"/>
    <published>2024-03-17T16:26:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/26b77e84-69f7-4914-85ce-01e68d0dac55/export</id>
    <title>26b77e84-69f7-4914-85ce-01e68d0dac55</title>
    <updated>2026-05-05T02:38:47.261513+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "26b77e84-69f7-4914-85ce-01e68d0dac55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25661", "type": "seen", "source": "https://t.me/cvedetector/6760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25661 - Infinera TNMS Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-25661 \nPublished : Oct. 1, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : In Infinera TNMS (Transcend Network Management System) 19.10.3, cleartext storage of sensitive information in memory of the desktop application TNMS Client allows guest OS administrators to obtain various users' passwords by reading memory dumps of the desktop application. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T17:45:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/26b77e84-69f7-4914-85ce-01e68d0dac55/export"/>
    <published>2024-10-01T17:45:52+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/111b613c-355c-47a8-9202-c9959abae5ab/export</id>
    <title>111b613c-355c-47a8-9202-c9959abae5ab</title>
    <updated>2026-05-05T02:38:47.261413+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "111b613c-355c-47a8-9202-c9959abae5ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25660", "type": "seen", "source": "https://t.me/cvedetector/6778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25660 - Infinera TNMS WebDAV Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-25660 \nPublished : Oct. 1, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : The WebDAV service in Infinera TNMS (Transcend Network Management System) 19.10.3 allows a low-privileged remote attacker to conduct unauthorized file operations, because of execution with unnecessary privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T18:36:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/111b613c-355c-47a8-9202-c9959abae5ab/export"/>
    <published>2024-10-01T18:36:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ba324997-89a7-472c-ba1b-f692d97b170d/export</id>
    <title>ba324997-89a7-472c-ba1b-f692d97b170d</title>
    <updated>2026-05-05T02:38:47.258608+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ba324997-89a7-472c-ba1b-f692d97b170d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25660", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8713", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25660\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WebDAV service in Infinera TNMS (Transcend Network Management System) 19.10.3 allows a low-privileged remote attacker to conduct unauthorized file operations, because of execution with unnecessary privileges.\n\ud83d\udccf Published: 2024-10-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T17:07:55.582Z\n\ud83d\udd17 References:\n1. https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25660", "creation_timestamp": "2025-03-25T17:25:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ba324997-89a7-472c-ba1b-f692d97b170d/export"/>
    <published>2025-03-25T17:25:03+00:00</published>
  </entry>
</feed>
