<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 07:43:24 +0000</lastBuildDate>
    <item>
      <title>0a7aa174-06be-4f51-bf31-e843e6313bd8</title>
      <link>https://vulnerability.circl.lu/sighting/0a7aa174-06be-4f51-bf31-e843e6313bd8/export</link>
      <description>{"uuid": "0a7aa174-06be-4f51-bf31-e843e6313bd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "Telegram/G-sgDlrvwnM7fA9vwo9eo805AkbFx9rSqZF3EIxn4TnSp90", "content": "", "creation_timestamp": "2023-03-09T07:09:49.000000Z"}</description>
      <content:encoded>{"uuid": "0a7aa174-06be-4f51-bf31-e843e6313bd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "Telegram/G-sgDlrvwnM7fA9vwo9eo805AkbFx9rSqZF3EIxn4TnSp90", "content": "", "creation_timestamp": "2023-03-09T07:09:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0a7aa174-06be-4f51-bf31-e843e6313bd8/export</guid>
      <pubDate>Thu, 09 Mar 2023 07:09:49 +0000</pubDate>
    </item>
    <item>
      <title>4c6d8677-2491-4218-b0e5-fcd84614eed5</title>
      <link>https://vulnerability.circl.lu/sighting/4c6d8677-2491-4218-b0e5-fcd84614eed5/export</link>
      <description>{"uuid": "4c6d8677-2491-4218-b0e5-fcd84614eed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7903", "content": "#Red_Team_Tactics\n1. OAuth: Account Takeover on Booking*com\nhttps://salt.security/blog/traveling-with-oauth-account-takeover-on-booking-com\n2. Unauthorized access to Codespace secrets in GitHub\nhttps://ophionsecurity.com/blog/access-organization-secrets-in-github\n3. WAN-side RCE in Netgear RAX Routers (CVE-2023-24749)\nhttps://mahaloz.re/2023/02/25/pwnagent-netgear.html", "creation_timestamp": "2023-03-10T23:42:52.000000Z"}</description>
      <content:encoded>{"uuid": "4c6d8677-2491-4218-b0e5-fcd84614eed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7903", "content": "#Red_Team_Tactics\n1. OAuth: Account Takeover on Booking*com\nhttps://salt.security/blog/traveling-with-oauth-account-takeover-on-booking-com\n2. Unauthorized access to Codespace secrets in GitHub\nhttps://ophionsecurity.com/blog/access-organization-secrets-in-github\n3. WAN-side RCE in Netgear RAX Routers (CVE-2023-24749)\nhttps://mahaloz.re/2023/02/25/pwnagent-netgear.html", "creation_timestamp": "2023-03-10T23:42:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4c6d8677-2491-4218-b0e5-fcd84614eed5/export</guid>
      <pubDate>Fri, 10 Mar 2023 23:42:52 +0000</pubDate>
    </item>
    <item>
      <title>f1650bfa-ac64-43ba-82ee-fd5fac32f67e</title>
      <link>https://vulnerability.circl.lu/sighting/f1650bfa-ac64-43ba-82ee-fd5fac32f67e/export</link>
      <description>{"uuid": "f1650bfa-ac64-43ba-82ee-fd5fac32f67e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3918", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aAn exploit PoC for CVE-2023-24749, aka PwnAgent\nURL\uff1ahttps://github.com/mahaloz/netgear-pwnagent\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-11T01:04:37.000000Z"}</description>
      <content:encoded>{"uuid": "f1650bfa-ac64-43ba-82ee-fd5fac32f67e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3918", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aAn exploit PoC for CVE-2023-24749, aka PwnAgent\nURL\uff1ahttps://github.com/mahaloz/netgear-pwnagent\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-03-11T01:04:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f1650bfa-ac64-43ba-82ee-fd5fac32f67e/export</guid>
      <pubDate>Sat, 11 Mar 2023 01:04:37 +0000</pubDate>
    </item>
    <item>
      <title>37e5c4e9-3fa4-41b2-b4dd-2d8d535b3006</title>
      <link>https://vulnerability.circl.lu/sighting/37e5c4e9-3fa4-41b2-b4dd-2d8d535b3006/export</link>
      <description>{"uuid": "37e5c4e9-3fa4-41b2-b4dd-2d8d535b3006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "Telegram/_XNHMvdG50cv82kL9cs0-JclxVRohsOoow3JM5plYK1X21M", "content": "", "creation_timestamp": "2023-03-12T10:21:32.000000Z"}</description>
      <content:encoded>{"uuid": "37e5c4e9-3fa4-41b2-b4dd-2d8d535b3006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24749", "type": "published-proof-of-concept", "source": "Telegram/_XNHMvdG50cv82kL9cs0-JclxVRohsOoow3JM5plYK1X21M", "content": "", "creation_timestamp": "2023-03-12T10:21:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/37e5c4e9-3fa4-41b2-b4dd-2d8d535b3006/export</guid>
      <pubDate>Sun, 12 Mar 2023 10:21:32 +0000</pubDate>
    </item>
    <item>
      <title>82d67d1d-772a-441f-af80-ddfee46bf2a6</title>
      <link>https://vulnerability.circl.lu/sighting/82d67d1d-772a-441f-af80-ddfee46bf2a6/export</link>
      <description>{"uuid": "82d67d1d-772a-441f-af80-ddfee46bf2a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24747", "type": "seen", "source": "https://t.me/cibsecurity/61506", "content": "\u203c CVE-2023-24747 \u203c\n\nJfinal CMS v5.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /system/dict/list.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-06T00:26:30.000000Z"}</description>
      <content:encoded>{"uuid": "82d67d1d-772a-441f-af80-ddfee46bf2a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24747", "type": "seen", "source": "https://t.me/cibsecurity/61506", "content": "\u203c CVE-2023-24747 \u203c\n\nJfinal CMS v5.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /system/dict/list.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-06T00:26:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/82d67d1d-772a-441f-af80-ddfee46bf2a6/export</guid>
      <pubDate>Thu, 06 Apr 2023 00:26:30 +0000</pubDate>
    </item>
    <item>
      <title>155eb911-27ae-4cb6-8ccf-bef2452360c4</title>
      <link>https://vulnerability.circl.lu/sighting/155eb911-27ae-4cb6-8ccf-bef2452360c4/export</link>
      <description>{"uuid": "155eb911-27ae-4cb6-8ccf-bef2452360c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2474", "type": "seen", "source": "https://t.me/cibsecurity/63152", "content": "\u203c CVE-2023-2474 \u203c\n\nA vulnerability has been found in Rebuild 3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-227866 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-02T16:30:07.000000Z"}</description>
      <content:encoded>{"uuid": "155eb911-27ae-4cb6-8ccf-bef2452360c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2474", "type": "seen", "source": "https://t.me/cibsecurity/63152", "content": "\u203c CVE-2023-2474 \u203c\n\nA vulnerability has been found in Rebuild 3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-227866 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-02T16:30:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/155eb911-27ae-4cb6-8ccf-bef2452360c4/export</guid>
      <pubDate>Tue, 02 May 2023 16:30:07 +0000</pubDate>
    </item>
    <item>
      <title>12cc8ff2-70f2-437b-bfa0-fc70a95902b7</title>
      <link>https://vulnerability.circl.lu/sighting/12cc8ff2-70f2-437b-bfa0-fc70a95902b7/export</link>
      <description>{"uuid": "12cc8ff2-70f2-437b-bfa0-fc70a95902b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24744", "type": "seen", "source": "https://t.me/cibsecurity/63253", "content": "\u203c CVE-2023-24744 \u203c\n\nCross Site Scripting (XSS) vulnerability in Rediker Software AdminPlus 6.1.91.00 allows remote attackers to run arbitrary code via the onload function within the application DOM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-04T00:32:15.000000Z"}</description>
      <content:encoded>{"uuid": "12cc8ff2-70f2-437b-bfa0-fc70a95902b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24744", "type": "seen", "source": "https://t.me/cibsecurity/63253", "content": "\u203c CVE-2023-24744 \u203c\n\nCross Site Scripting (XSS) vulnerability in Rediker Software AdminPlus 6.1.91.00 allows remote attackers to run arbitrary code via the onload function within the application DOM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-04T00:32:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/12cc8ff2-70f2-437b-bfa0-fc70a95902b7/export</guid>
      <pubDate>Thu, 04 May 2023 00:32:15 +0000</pubDate>
    </item>
    <item>
      <title>681f1f3f-4525-45d6-8d84-d15309d2db85</title>
      <link>https://vulnerability.circl.lu/sighting/681f1f3f-4525-45d6-8d84-d15309d2db85/export</link>
      <description>{"uuid": "681f1f3f-4525-45d6-8d84-d15309d2db85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24744", "type": "seen", "source": "Telegram/m-t18k-rVm_ULDNmyZT_uZUMJ_dbegyokqFZG2c0AY4VKVvT", "content": "", "creation_timestamp": "2025-01-30T02:17:49.000000Z"}</description>
      <content:encoded>{"uuid": "681f1f3f-4525-45d6-8d84-d15309d2db85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24744", "type": "seen", "source": "Telegram/m-t18k-rVm_ULDNmyZT_uZUMJ_dbegyokqFZG2c0AY4VKVvT", "content": "", "creation_timestamp": "2025-01-30T02:17:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/681f1f3f-4525-45d6-8d84-d15309d2db85/export</guid>
      <pubDate>Thu, 30 Jan 2025 02:17:49 +0000</pubDate>
    </item>
    <item>
      <title>841015cf-3fca-4128-b3b4-03ca905aff25</title>
      <link>https://vulnerability.circl.lu/sighting/841015cf-3fca-4128-b3b4-03ca905aff25/export</link>
      <description>{"uuid": "841015cf-3fca-4128-b3b4-03ca905aff25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24747", "type": "seen", "source": "Telegram/rlp4oH2dAmK1Ctszi73ILHLOTKyDAKQYWcMFVMUEHRyjpIZ-", "content": "", "creation_timestamp": "2025-02-14T10:09:23.000000Z"}</description>
      <content:encoded>{"uuid": "841015cf-3fca-4128-b3b4-03ca905aff25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24747", "type": "seen", "source": "Telegram/rlp4oH2dAmK1Ctszi73ILHLOTKyDAKQYWcMFVMUEHRyjpIZ-", "content": "", "creation_timestamp": "2025-02-14T10:09:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/841015cf-3fca-4128-b3b4-03ca905aff25/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:09:23 +0000</pubDate>
    </item>
  </channel>
</rss>
