<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 09:55:09 +0000</lastBuildDate>
    <item>
      <title>00ac0a55-1288-4859-9911-c1e9d3054d0a</title>
      <link>https://vulnerability.circl.lu/sighting/00ac0a55-1288-4859-9911-c1e9d3054d0a/export</link>
      <description>{"uuid": "00ac0a55-1288-4859-9911-c1e9d3054d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4097", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1amy python poc CVE-2023-24774 and CVE-2023-24775 this sqli cve funadmin\nURL\uff1ahttps://github.com/csffs/CVE-2023-24775-and-CVE-2023-24780\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-03T09:24:42.000000Z"}</description>
      <content:encoded>{"uuid": "00ac0a55-1288-4859-9911-c1e9d3054d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4097", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1amy python poc CVE-2023-24774 and CVE-2023-24775 this sqli cve funadmin\nURL\uff1ahttps://github.com/csffs/CVE-2023-24775-and-CVE-2023-24780\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-04-03T09:24:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/00ac0a55-1288-4859-9911-c1e9d3054d0a/export</guid>
      <pubDate>Mon, 03 Apr 2023 09:24:42 +0000</pubDate>
    </item>
    <item>
      <title>b22997cf-7ccc-429d-9054-366ddb1eb24b</title>
      <link>https://vulnerability.circl.lu/sighting/b22997cf-7ccc-429d-9054-366ddb1eb24b/export</link>
      <description>{"uuid": "b22997cf-7ccc-429d-9054-366ddb1eb24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2477", "type": "seen", "source": "https://t.me/cibsecurity/63161", "content": "\u203c CVE-2023-2477 \u203c\n\nA vulnerability was found in Funadmin up to 3.2.3. It has been declared as problematic. Affected by this vulnerability is the function tagLoad of the file Cx.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227869 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-02T18:30:10.000000Z"}</description>
      <content:encoded>{"uuid": "b22997cf-7ccc-429d-9054-366ddb1eb24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2477", "type": "seen", "source": "https://t.me/cibsecurity/63161", "content": "\u203c CVE-2023-2477 \u203c\n\nA vulnerability was found in Funadmin up to 3.2.3. It has been declared as problematic. Affected by this vulnerability is the function tagLoad of the file Cx.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227869 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-02T18:30:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b22997cf-7ccc-429d-9054-366ddb1eb24b/export</guid>
      <pubDate>Tue, 02 May 2023 18:30:10 +0000</pubDate>
    </item>
    <item>
      <title>3c0828fe-8b80-46a2-9d8e-e3ac78ae61ea</title>
      <link>https://vulnerability.circl.lu/sighting/3c0828fe-8b80-46a2-9d8e-e3ac78ae61ea/export</link>
      <description>{"uuid": "3c0828fe-8b80-46a2-9d8e-e3ac78ae61ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24774", "type": "seen", "source": "Telegram/ox3Tp7VTIeU_n5J6i0QmGKWrTbFwd68GcC0r09zDDAf-0P9q", "content": "", "creation_timestamp": "2025-03-02T11:45:37.000000Z"}</description>
      <content:encoded>{"uuid": "3c0828fe-8b80-46a2-9d8e-e3ac78ae61ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24774", "type": "seen", "source": "Telegram/ox3Tp7VTIeU_n5J6i0QmGKWrTbFwd68GcC0r09zDDAf-0P9q", "content": "", "creation_timestamp": "2025-03-02T11:45:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3c0828fe-8b80-46a2-9d8e-e3ac78ae61ea/export</guid>
      <pubDate>Sun, 02 Mar 2025 11:45:37 +0000</pubDate>
    </item>
    <item>
      <title>7de4aeed-65cf-41b1-91af-494cadee039b</title>
      <link>https://vulnerability.circl.lu/sighting/7de4aeed-65cf-41b1-91af-494cadee039b/export</link>
      <description>{"uuid": "7de4aeed-65cf-41b1-91af-494cadee039b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6555", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24775\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \\member\\Member.php.\n\ud83d\udccf Published: 2023-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T14:54:48.704Z\n\ud83d\udd17 References:\n1. https://github.com/funadmin/funadmin/issues/9", "creation_timestamp": "2025-03-05T15:33:03.000000Z"}</description>
      <content:encoded>{"uuid": "7de4aeed-65cf-41b1-91af-494cadee039b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6555", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24775\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \\member\\Member.php.\n\ud83d\udccf Published: 2023-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T14:54:48.704Z\n\ud83d\udd17 References:\n1. https://github.com/funadmin/funadmin/issues/9", "creation_timestamp": "2025-03-05T15:33:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7de4aeed-65cf-41b1-91af-494cadee039b/export</guid>
      <pubDate>Wed, 05 Mar 2025 15:33:03 +0000</pubDate>
    </item>
    <item>
      <title>326127d1-2649-4f9c-8310-1265b7bc526c</title>
      <link>https://vulnerability.circl.lu/sighting/326127d1-2649-4f9c-8310-1265b7bc526c/export</link>
      <description>{"uuid": "326127d1-2649-4f9c-8310-1265b7bc526c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "seen", "source": "Telegram/_uGXxxbsE4vHiSoJ0RQ33a1cSEZDjfh4795MgshUqG-KudQx", "content": "", "creation_timestamp": "2025-03-06T02:16:32.000000Z"}</description>
      <content:encoded>{"uuid": "326127d1-2649-4f9c-8310-1265b7bc526c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "seen", "source": "Telegram/_uGXxxbsE4vHiSoJ0RQ33a1cSEZDjfh4795MgshUqG-KudQx", "content": "", "creation_timestamp": "2025-03-06T02:16:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/326127d1-2649-4f9c-8310-1265b7bc526c/export</guid>
      <pubDate>Thu, 06 Mar 2025 02:16:32 +0000</pubDate>
    </item>
    <item>
      <title>e737bfb0-9d26-4f37-84f3-0df2b912a7e4</title>
      <link>https://vulnerability.circl.lu/sighting/e737bfb0-9d26-4f37-84f3-0df2b912a7e4/export</link>
      <description>{"uuid": "e737bfb0-9d26-4f37-84f3-0df2b912a7e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24773", "type": "seen", "source": "Telegram/rEzlTJSI075wY2QIIhPOSK4QrJxLekL8EaUy4sopiQIcwDA0", "content": "", "creation_timestamp": "2025-03-06T02:16:33.000000Z"}</description>
      <content:encoded>{"uuid": "e737bfb0-9d26-4f37-84f3-0df2b912a7e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24773", "type": "seen", "source": "Telegram/rEzlTJSI075wY2QIIhPOSK4QrJxLekL8EaUy4sopiQIcwDA0", "content": "", "creation_timestamp": "2025-03-06T02:16:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e737bfb0-9d26-4f37-84f3-0df2b912a7e4/export</guid>
      <pubDate>Thu, 06 Mar 2025 02:16:33 +0000</pubDate>
    </item>
    <item>
      <title>9c05b70d-fd5e-46ea-ab57-6aeb0a7f6753</title>
      <link>https://vulnerability.circl.lu/sighting/9c05b70d-fd5e-46ea-ab57-6aeb0a7f6753/export</link>
      <description>{"uuid": "9c05b70d-fd5e-46ea-ab57-6aeb0a7f6753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24777", "type": "seen", "source": "Telegram/NoKTqEgq9HS1ex5O39w2K_AXExJFvyz9wUQsjAURzti86Vfj", "content": "", "creation_timestamp": "2025-03-06T02:17:22.000000Z"}</description>
      <content:encoded>{"uuid": "9c05b70d-fd5e-46ea-ab57-6aeb0a7f6753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24777", "type": "seen", "source": "Telegram/NoKTqEgq9HS1ex5O39w2K_AXExJFvyz9wUQsjAURzti86Vfj", "content": "", "creation_timestamp": "2025-03-06T02:17:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9c05b70d-fd5e-46ea-ab57-6aeb0a7f6753/export</guid>
      <pubDate>Thu, 06 Mar 2025 02:17:22 +0000</pubDate>
    </item>
    <item>
      <title>844440f5-dc96-44be-965b-dde89e0757cc</title>
      <link>https://vulnerability.circl.lu/sighting/844440f5-dc96-44be-965b-dde89e0757cc/export</link>
      <description>{"uuid": "844440f5-dc96-44be-965b-dde89e0757cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24776", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6682", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24776\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Funadmin v3.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component \\controller\\Addon.php.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T15:25:32.188Z\n\ud83d\udd17 References:\n1. https://github.com/funadmin/funadmin/issues/7", "creation_timestamp": "2025-03-06T16:06:58.000000Z"}</description>
      <content:encoded>{"uuid": "844440f5-dc96-44be-965b-dde89e0757cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24776", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6682", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24776\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Funadmin v3.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component \\controller\\Addon.php.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T15:25:32.188Z\n\ud83d\udd17 References:\n1. https://github.com/funadmin/funadmin/issues/7", "creation_timestamp": "2025-03-06T16:06:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/844440f5-dc96-44be-965b-dde89e0757cc/export</guid>
      <pubDate>Thu, 06 Mar 2025 16:06:58 +0000</pubDate>
    </item>
    <item>
      <title>0ddcebc7-f7e4-47fb-ab4d-fc5040e53bfc</title>
      <link>https://vulnerability.circl.lu/sighting/0ddcebc7-f7e4-47fb-ab4d-fc5040e53bfc/export</link>
      <description>{"uuid": "0ddcebc7-f7e4-47fb-ab4d-fc5040e53bfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24774", "type": "seen", "source": "Telegram/jatIZkaUHUq5Y1tQNc6woeEuj37YV0jCdCojycZ93KkM4w", "content": "", "creation_timestamp": "2025-09-20T04:35:31.000000Z"}</description>
      <content:encoded>{"uuid": "0ddcebc7-f7e4-47fb-ab4d-fc5040e53bfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24774", "type": "seen", "source": "Telegram/jatIZkaUHUq5Y1tQNc6woeEuj37YV0jCdCojycZ93KkM4w", "content": "", "creation_timestamp": "2025-09-20T04:35:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0ddcebc7-f7e4-47fb-ab4d-fc5040e53bfc/export</guid>
      <pubDate>Sat, 20 Sep 2025 04:35:31 +0000</pubDate>
    </item>
    <item>
      <title>587b109f-b1a0-48c0-bc79-13086fb37e29</title>
      <link>https://vulnerability.circl.lu/sighting/587b109f-b1a0-48c0-bc79-13086fb37e29/export</link>
      <description>{"uuid": "587b109f-b1a0-48c0-bc79-13086fb37e29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "seen", "source": "Telegram/jatIZkaUHUq5Y1tQNc6woeEuj37YV0jCdCojycZ93KkM4w", "content": "", "creation_timestamp": "2025-09-20T04:35:31.000000Z"}</description>
      <content:encoded>{"uuid": "587b109f-b1a0-48c0-bc79-13086fb37e29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24775", "type": "seen", "source": "Telegram/jatIZkaUHUq5Y1tQNc6woeEuj37YV0jCdCojycZ93KkM4w", "content": "", "creation_timestamp": "2025-09-20T04:35:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/587b109f-b1a0-48c0-bc79-13086fb37e29/export</guid>
      <pubDate>Sat, 20 Sep 2025 04:35:31 +0000</pubDate>
    </item>
  </channel>
</rss>
