<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T00:30:56.442123+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a59d2bbe-19f2-4152-9215-ccc0e56162e8/export</id>
    <title>a59d2bbe-19f2-4152-9215-ccc0e56162e8</title>
    <updated>2026-05-08T00:30:56.707369+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a59d2bbe-19f2-4152-9215-ccc0e56162e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8306", "content": "Tools - Hackers Factory \n\nSimple tool for searching and collect information written in Python 3\n\nhttps://github.com/YouVBeenHacked/gideon/tree/09c3e17864a5d6ceead8558f119560c4861d7a6f\n\nlawndoc/Respotter: Respotter is a Responder honeypot! Catch attackers and red teams as soon as they spin up Responder in your environment.\n\nhttps://github.com/lawndoc/Respotter\n\na13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nELMERIKH/TelecordC2: Advanced Telegram x Discord C2, great for data Exfitration and Network evasion\n\nhttps://github.com/ELMERIKH/TelecordC2\n\nA chrome/Firefox extension to retrieve and load react javascript chunks all at once for a wide range of javascript techs\n\nhttps://github.com/ElSicarius/chunkloader\n\nToutatis\n\nhttps://github.com/megadose/toutatis - a tool for collecting info about an Instagram user (that include part of phone number and email).\n\nCVE-2024-40725 and CVE-2024-40898\n\nhttps://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898\n\nMass Exploit - CVE-2024-29824 - Ivanti EPM - Remote Code Execution (RCE)\n\nhttps://github.com/codeb0ss/CVE-2024-29824-PoC\n\nFile-Tunnel : Tunnel TCP connections through a file.\n\nhttps://github.com/fiddyschmitt/File-Tunnel\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-07-23T06:18:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a59d2bbe-19f2-4152-9215-ccc0e56162e8/export"/>
    <published>2024-07-23T06:18:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0bb49b8d-5383-4225-810e-ae59c1e8b406/export</id>
    <title>0bb49b8d-5383-4225-810e-ae59c1e8b406</title>
    <updated>2026-05-08T00:30:56.707257+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0bb49b8d-5383-4225-810e-ae59c1e8b406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7003", "content": "Tools - Hackers Factory \n\nSimple tool for searching and collect information written in Python 3\n\nhttps://github.com/YouVBeenHacked/gideon/tree/09c3e17864a5d6ceead8558f119560c4861d7a6f\n\nlawndoc/Respotter: Respotter is a Responder honeypot! Catch attackers and red teams as soon as they spin up Responder in your environment.\n\nhttps://github.com/lawndoc/Respotter\n\na13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nELMERIKH/TelecordC2: Advanced Telegram x Discord C2, great for data Exfitration and Network evasion\n\nhttps://github.com/ELMERIKH/TelecordC2\n\nA chrome/Firefox extension to retrieve and load react javascript chunks all at once for a wide range of javascript techs\n\nhttps://github.com/ElSicarius/chunkloader\n\nToutatis\n\nhttps://github.com/megadose/toutatis - a tool for collecting info about an Instagram user (that include part of phone number and email).\n\nCVE-2024-40725 and CVE-2024-40898\n\nhttps://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898\n\nMass Exploit - CVE-2024-29824 - Ivanti EPM - Remote Code Execution (RCE)\n\nhttps://github.com/codeb0ss/CVE-2024-29824-PoC\n\nFile-Tunnel : Tunnel TCP connections through a file.\n\nhttps://github.com/fiddyschmitt/File-Tunnel\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-07-23T06:18:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0bb49b8d-5383-4225-810e-ae59c1e8b406/export"/>
    <published>2024-07-23T06:18:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de2d8633-ab8d-4480-92de-8cfef0707856/export</id>
    <title>de2d8633-ab8d-4480-92de-8cfef0707856</title>
    <updated>2026-05-08T00:30:56.707174+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "de2d8633-ab8d-4480-92de-8cfef0707856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "published-proof-of-concept", "source": "https://t.me/TheMalware_Team/3786", "content": "#exploit\n1. CVE-2024-34065:\nStrapi Open Redirect\nhttps://blog.quarkslab.com/looking-for-vulnerabilities-in-strapi-cve-2024-34065.html\n\n2. CVE-2024-40725,\nCVE-2024-40898:\nApache HTTP Server SSRF\nhttps://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898", "creation_timestamp": "2024-07-24T22:29:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de2d8633-ab8d-4480-92de-8cfef0707856/export"/>
    <published>2024-07-24T22:29:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0ad900fd-d539-40aa-8dc6-40a600d67913/export</id>
    <title>0ad900fd-d539-40aa-8dc6-40a600d67913</title>
    <updated>2026-05-08T00:30:56.707094+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0ad900fd-d539-40aa-8dc6-40a600d67913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "published-proof-of-concept", "source": "https://t.me/TheMalware_Team/159058", "content": "#exploit\n1. CVE-2024-34065:\nStrapi Open Redirect\nhttps://blog.quarkslab.com/looking-for-vulnerabilities-in-strapi-cve-2024-34065.html\n\n2. CVE-2024-40725,\nCVE-2024-40898:\nApache HTTP Server SSRF\nhttps://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898", "creation_timestamp": "2024-07-24T22:29:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0ad900fd-d539-40aa-8dc6-40a600d67913/export"/>
    <published>2024-07-24T22:29:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0fe7ee46-54b7-43ab-a38a-2add0b24d623/export</id>
    <title>0fe7ee46-54b7-43ab-a38a-2add0b24d623</title>
    <updated>2026-05-08T00:30:56.707009+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0fe7ee46-54b7-43ab-a38a-2add0b24d623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/556", "content": "#exploit\n1. CVE-2024-34065:\nStrapi Open Redirect\nhttps://blog.quarkslab.com/looking-for-vulnerabilities-in-strapi-cve-2024-34065.html\n\n2. CVE-2024-40725,\nCVE-2024-40898:\nApache HTTP Server SSRF\nhttps://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898", "creation_timestamp": "2024-07-30T01:02:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0fe7ee46-54b7-43ab-a38a-2add0b24d623/export"/>
    <published>2024-07-30T01:02:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fe8c5304-6d5a-4b84-9c19-2340c227fb7d/export</id>
    <title>fe8c5304-6d5a-4b84-9c19-2340c227fb7d</title>
    <updated>2026-05-08T00:30:56.706943+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fe8c5304-6d5a-4b84-9c19-2340c227fb7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "seen", "source": "Telegram/Hf_SunJuoYNf_bsQCJ20cuXyI7bzH8EMEXzusn30k3vpXeQ", "content": "", "creation_timestamp": "2024-10-15T10:14:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fe8c5304-6d5a-4b84-9c19-2340c227fb7d/export"/>
    <published>2024-10-15T10:14:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/71afe0ea-1851-410a-bc64-6f9b7e9bc611/export</id>
    <title>71afe0ea-1851-410a-bc64-6f9b7e9bc611</title>
    <updated>2026-05-08T00:30:56.706867+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "71afe0ea-1851-410a-bc64-6f9b7e9bc611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "published-proof-of-concept", "source": "Telegram/fmnrItX9ni0-os4NhDhn5S2FWV4dH62W8_H3cZbb_PP8-WM", "content": "", "creation_timestamp": "2024-11-11T16:17:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/71afe0ea-1851-410a-bc64-6f9b7e9bc611/export"/>
    <published>2024-11-11T16:17:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/016b99ac-c5e7-4d91-a195-0ccde8280d65/export</id>
    <title>016b99ac-c5e7-4d91-a195-0ccde8280d65</title>
    <updated>2026-05-08T00:30:56.706788+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "016b99ac-c5e7-4d91-a195-0ccde8280d65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "seen", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/5115", "content": "tatacommunications-ts.com\n\nhttps://115.110.196.19\n\nCVE-2022-23943\nCVE-2023-25690\nCVE-2024-40898", "creation_timestamp": "2024-12-15T07:36:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/016b99ac-c5e7-4d91-a195-0ccde8280d65/export"/>
    <published>2024-12-15T07:36:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/be24b028-36d0-467a-8bdf-36b54e69261e/export</id>
    <title>be24b028-36d0-467a-8bdf-36b54e69261e</title>
    <updated>2026-05-08T00:30:56.706675+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "be24b028-36d0-467a-8bdf-36b54e69261e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "published-proof-of-concept", "source": "Telegram/G1YIpqTouZZ7RGRq-g0EK5R-A4RVmquYDNGd4eb7udpn90Y", "content": "", "creation_timestamp": "2025-06-14T15:00:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/be24b028-36d0-467a-8bdf-36b54e69261e/export"/>
    <published>2025-06-14T15:00:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f3230fdc-b108-43d9-99b7-332c1ce410bd/export</id>
    <title>f3230fdc-b108-43d9-99b7-332c1ce410bd</title>
    <updated>2026-05-08T00:30:56.703272+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f3230fdc-b108-43d9-99b7-332c1ce410bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40898", "type": "published-proof-of-concept", "source": "Telegram/YEiFamPdgcqsNBKcTHrz6s6bZPTIwshB08cHvtzul5ZyUxA", "content": "", "creation_timestamp": "2025-06-30T21:00:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f3230fdc-b108-43d9-99b7-332c1ce410bd/export"/>
    <published>2025-06-30T21:00:03+00:00</published>
  </entry>
</feed>
