<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T08:26:53.940728+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3139a75a-bcbb-4bd9-ae50-d09e6d2be456/export</id>
    <title>3139a75a-bcbb-4bd9-ae50-d09e6d2be456</title>
    <updated>2026-05-08T08:26:54.305950+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3139a75a-bcbb-4bd9-ae50-d09e6d2be456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "seen", "source": "https://t.me/cvedetector/6101", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9043 - Cellopoint Secure Email Gateway Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9043 \nPublished : Sept. 20, 2024, 11:15 a.m. | 31\u00a0minutes ago \nDescription : Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing authentication and obtaining system administrator privileges. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T13:54:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3139a75a-bcbb-4bd9-ae50-d09e6d2be456/export"/>
    <published>2024-09-20T13:54:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/30d6ff3c-d201-4026-abba-1fd0848c5d10/export</id>
    <title>30d6ff3c-d201-4026-abba-1fd0848c5d10</title>
    <updated>2026-05-08T08:26:54.305804+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "30d6ff3c-d201-4026-abba-1fd0848c5d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "seen", "source": "https://t.me/HackingInsights/14183", "content": "\u200aCVE-2024-9043 (CVSS 9.8): Cellopoint Secure Email Gateway Flaw Puts Sensitive Data at Risk\n\nhttps://securityonline.info/cve-2024-9043-cvss-9-8-cellopoint-secure-email-gateway-flaw-puts-sensitive-data-at-risk/", "creation_timestamp": "2024-09-24T10:52:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/30d6ff3c-d201-4026-abba-1fd0848c5d10/export"/>
    <published>2024-09-24T10:52:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0f4199bc-2740-4d95-ac12-01c39476fbb4/export</id>
    <title>0f4199bc-2740-4d95-ac12-01c39476fbb4</title>
    <updated>2026-05-08T08:26:54.305640+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0f4199bc-2740-4d95-ac12-01c39476fbb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1340", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T13:30:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0f4199bc-2740-4d95-ac12-01c39476fbb4/export"/>
    <published>2024-09-25T13:30:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f63f7593-2419-49f2-93e0-4f7534a65b85/export</id>
    <title>f63f7593-2419-49f2-93e0-4f7534a65b85</title>
    <updated>2026-05-08T08:26:54.305504+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f63f7593-2419-49f2-93e0-4f7534a65b85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/4491", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T13:30:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f63f7593-2419-49f2-93e0-4f7534a65b85/export"/>
    <published>2024-09-25T13:30:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ecc12e55-cfe4-4085-9905-3ef134e7c6d8/export</id>
    <title>ecc12e55-cfe4-4085-9905-3ef134e7c6d8</title>
    <updated>2026-05-08T08:26:54.305369+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ecc12e55-cfe4-4085-9905-3ef134e7c6d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/447", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T14:59:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ecc12e55-cfe4-4085-9905-3ef134e7c6d8/export"/>
    <published>2024-09-25T14:59:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/13a8d65e-db72-4021-a50c-fa027aa85ac8/export</id>
    <title>13a8d65e-db72-4021-a50c-fa027aa85ac8</title>
    <updated>2026-05-08T08:26:54.303205+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "13a8d65e-db72-4021-a50c-fa027aa85ac8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11189", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T22:02:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/13a8d65e-db72-4021-a50c-fa027aa85ac8/export"/>
    <published>2024-09-25T22:02:36+00:00</published>
  </entry>
</feed>
