<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T18:29:24.975135+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8fb099b7-77bb-4960-998f-3bc1897f4b78/export</id>
    <title>8fb099b7-77bb-4960-998f-3bc1897f4b78</title>
    <updated>2026-05-04T18:29:25.188243+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8fb099b7-77bb-4960-998f-3bc1897f4b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57432", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113941447094987736", "content": "", "creation_timestamp": "2025-02-03T18:48:42.066867Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8fb099b7-77bb-4960-998f-3bc1897f4b78/export"/>
    <published>2025-02-03T18:48:42.066867+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b0f157dc-a947-45cc-ba30-37b82ed857e4/export</id>
    <title>b0f157dc-a947-45cc-ba30-37b82ed857e4</title>
    <updated>2026-05-04T18:29:25.188165+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b0f157dc-a947-45cc-ba30-37b82ed857e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57434", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113942391559330202", "content": "", "creation_timestamp": "2025-02-03T22:48:38.828325Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b0f157dc-a947-45cc-ba30-37b82ed857e4/export"/>
    <published>2025-02-03T22:48:38.828325+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4f5bb0aa-e099-49bd-bbda-364bd8e38f92/export</id>
    <title>4f5bb0aa-e099-49bd-bbda-364bd8e38f92</title>
    <updated>2026-05-04T18:29:25.188089+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4f5bb0aa-e099-49bd-bbda-364bd8e38f92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57430", "type": "published-proof-of-concept", "source": "Telegram/Zrldk8z1EwjpYU8Vg3CSH1QFx-z50lEQp2XdvPCkQk6RQ8I", "content": "", "creation_timestamp": "2025-02-04T16:00:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4f5bb0aa-e099-49bd-bbda-364bd8e38f92/export"/>
    <published>2025-02-04T16:00:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c5fdf497-aff8-4256-8479-37433b8cb428/export</id>
    <title>c5fdf497-aff8-4256-8479-37433b8cb428</title>
    <updated>2026-05-04T18:29:25.188015+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c5fdf497-aff8-4256-8479-37433b8cb428", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113957905371081090", "content": "", "creation_timestamp": "2025-02-06T16:34:00.631822Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c5fdf497-aff8-4256-8479-37433b8cb428/export"/>
    <published>2025-02-06T16:34:00.631822+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4e7c3482-a18f-499e-92e3-dab9301bdae3/export</id>
    <title>4e7c3482-a18f-499e-92e3-dab9301bdae3</title>
    <updated>2026-05-04T18:29:25.187940+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4e7c3482-a18f-499e-92e3-dab9301bdae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjlnfgmhc24", "content": "", "creation_timestamp": "2025-02-06T17:16:23.421329Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4e7c3482-a18f-499e-92e3-dab9301bdae3/export"/>
    <published>2025-02-06T17:16:23.421329+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/69a0cc13-f9f8-4528-82af-dbfe7cd47bed/export</id>
    <title>69a0cc13-f9f8-4528-82af-dbfe7cd47bed</title>
    <updated>2026-05-04T18:29:25.187861+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "69a0cc13-f9f8-4528-82af-dbfe7cd47bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsuy5572a", "content": "", "creation_timestamp": "2025-02-06T18:49:01.239012Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/69a0cc13-f9f8-4528-82af-dbfe7cd47bed/export"/>
    <published>2025-02-06T18:49:01.239012+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fb716f84-7ac5-4105-86e9-9bed1cf73ecb/export</id>
    <title>fb716f84-7ac5-4105-86e9-9bed1cf73ecb</title>
    <updated>2026-05-04T18:29:25.187762+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fb716f84-7ac5-4105-86e9-9bed1cf73ecb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://t.me/cvedetector/17411", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57430 - PHPJabbers Cinema Booking System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57430 \nPublished : Feb. 6, 2025, 5:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : An SQL injection vulnerability in the pjActionGetUser function of PHPJabbers Cinema Booking System v2.0 allows attackers to manipulate database queries via the column parameter. Exploiting this flaw can lead to unauthorized information disclosure, privilege escalation, or database manipulation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:15:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fb716f84-7ac5-4105-86e9-9bed1cf73ecb/export"/>
    <published>2025-02-06T20:15:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/59f811aa-9763-4f54-899d-02ec60636175/export</id>
    <title>59f811aa-9763-4f54-899d-02ec60636175</title>
    <updated>2026-05-04T18:29:25.187660+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "59f811aa-9763-4f54-899d-02ec60636175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113959377139558293", "content": "", "creation_timestamp": "2025-02-06T22:48:18.394320Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/59f811aa-9763-4f54-899d-02ec60636175/export"/>
    <published>2025-02-06T22:48:18.394320+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/351cdf81-f6e3-424f-adda-4bf537629d12/export</id>
    <title>351cdf81-f6e3-424f-adda-4bf537629d12</title>
    <updated>2026-05-04T18:29:25.187538+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "351cdf81-f6e3-424f-adda-4bf537629d12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57430", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhlsghkqdi2v", "content": "", "creation_timestamp": "2025-02-07T14:23:07.899469Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/351cdf81-f6e3-424f-adda-4bf537629d12/export"/>
    <published>2025-02-07T14:23:07.899469+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f3e5c041-8faa-465e-8ec4-a02487cbf4e4/export</id>
    <title>f3e5c041-8faa-465e-8ec4-a02487cbf4e4</title>
    <updated>2026-05-04T18:29:25.185880+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f3e5c041-8faa-465e-8ec4-a02487cbf4e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57433", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7966", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57433\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control via the logout function. After a user logs out, their token is still available and fetches information in the logged-in state.\n\ud83d\udccf Published: 2025-01-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T18:32:28.577Z\n\ud83d\udd17 References:\n1. https://github.com/peccc/restful_vul/blob/main/mall_tiny_logout_failed/mall_tiny_logout_failed.md", "creation_timestamp": "2025-03-18T19:03:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f3e5c041-8faa-465e-8ec4-a02487cbf4e4/export"/>
    <published>2025-03-18T19:03:03+00:00</published>
  </entry>
</feed>
