<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 21:36:44 +0000</lastBuildDate>
    <item>
      <title>1b35bac3-7685-4468-92f2-6c0b1c5284bf</title>
      <link>https://vulnerability.circl.lu/sighting/1b35bac3-7685-4468-92f2-6c0b1c5284bf/export</link>
      <description>{"uuid": "1b35bac3-7685-4468-92f2-6c0b1c5284bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "seen", "source": "https://t.me/ctinow/179644", "content": "https://ift.tt/HpyV8oR\nCVE-2024-0964", "creation_timestamp": "2024-02-06T00:31:51.000000Z"}</description>
      <content:encoded>{"uuid": "1b35bac3-7685-4468-92f2-6c0b1c5284bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "seen", "source": "https://t.me/ctinow/179644", "content": "https://ift.tt/HpyV8oR\nCVE-2024-0964", "creation_timestamp": "2024-02-06T00:31:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1b35bac3-7685-4468-92f2-6c0b1c5284bf/export</guid>
      <pubDate>Tue, 06 Feb 2024 00:31:51 +0000</pubDate>
    </item>
    <item>
      <title>b351174b-e985-4be7-8f65-8cbe48e993ea</title>
      <link>https://vulnerability.circl.lu/sighting/b351174b-e985-4be7-8f65-8cbe48e993ea/export</link>
      <description>{"uuid": "b351174b-e985-4be7-8f65-8cbe48e993ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "seen", "source": "https://t.me/ctinow/184208", "content": "https://ift.tt/ZwU6alD\nCVE-2024-0964 Exploit", "creation_timestamp": "2024-02-13T21:17:00.000000Z"}</description>
      <content:encoded>{"uuid": "b351174b-e985-4be7-8f65-8cbe48e993ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "seen", "source": "https://t.me/ctinow/184208", "content": "https://ift.tt/ZwU6alD\nCVE-2024-0964 Exploit", "creation_timestamp": "2024-02-13T21:17:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b351174b-e985-4be7-8f65-8cbe48e993ea/export</guid>
      <pubDate>Tue, 13 Feb 2024 21:17:00 +0000</pubDate>
    </item>
    <item>
      <title>a4535227-ee6c-479a-8a8c-500017d39343</title>
      <link>https://vulnerability.circl.lu/sighting/a4535227-ee6c-479a-8a8c-500017d39343/export</link>
      <description>{"uuid": "a4535227-ee6c-479a-8a8c-500017d39343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "published-proof-of-concept", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/3731", "content": "New bug bounty(vulnerabilities) collector  \nRequirements\n    Chrome with GUI (If you encounter trouble with script execution, check the status of VMs GPU features, if available.)  Chrome WebDriver  \nPreview\n  # python3 main.py\n\n*2024-02-20 16:14:47.836189*\n\n1. Arbitrary File Reading due to Lack of Input Filepath Validation\n- Feb 6th 2024 / High (CVE-2024-0964)\n- gradio-app/gradio\n- https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741/\n\n2. View Barcode Image leads to Remote (https://www.kitploit.com/search/label/Remote) Code Execution\n- Jan 31st 2024 / Critical (CVE: Not yet)\n- dolibarr/dolibarr\n- https://huntr.com/bounties/f0ffd01e-8054-4e43-96f7-a0d2e652ac7e/\n\n  (delimiter-based file database)  # vim (https://www.kitploit.com/search/label/Vim) feeds.db\n\n1|2024-02-20 16:17:40.393240|7fe14fd58ca2582d66539b2fe178eeaed3524342|CVE-2024-0964|https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741/\n2|2024-02-20 16:17:40.393987|c6b84ac808e7f229a4c8f9fbd073b4c0727e07e1|CVE: Not yet|https://huntr.com/bounties/f0ffd01e-8054-4e43-96f7-a0d2e652ac7e/\n3|2024-02-20 16:17:40.394582|7fead9658843919219a3b30b8249700d968d0cc9|CVE: Not yet|https://huntr.com/bounties/d6cb06dc-5d10-4197-8f89-847c3203d953/\n4|2024-02-20 16:17:40.395094|81fecdd74318ce7da9bc29e81198e62f3225bd44|CVE: Not yet|https://huntr.com/bounties/d875d1a2-7205-4b2b-93cf-439fa4c4f961/\n5|2024-02-20 16:17:40.395613|111045c8f1a7926174243db403614d4a58dc72ed|CVE: Not yet|https://huntr.com/bounties/10e423cd-7051-43fd-b736-4e18650d0172/\n  \nNotes\n    This code is designed to parse HTML elements from huntr.com, so it may not function correctly if the HTML page structure changes.   In case of errors during parsing, exception handling has been included, so if it doesn't work as expected, please inspect the HTML source for any changes.  If get in trouble In a typical cloud (https://www.kitploit.com/search/label/Cloud) environment, scripts (https://www.kitploit.com/search/label/Scripts) may not function properly within virtual machines (VMs).  \n\nDownload Huntr-Com-Bug-Bounties-Collector (https://github.com/password123456/huntr-com-bug-bounties-collector)", "creation_timestamp": "2024-02-27T12:27:53.000000Z"}</description>
      <content:encoded>{"uuid": "a4535227-ee6c-479a-8a8c-500017d39343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "published-proof-of-concept", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/3731", "content": "New bug bounty(vulnerabilities) collector  \nRequirements\n    Chrome with GUI (If you encounter trouble with script execution, check the status of VMs GPU features, if available.)  Chrome WebDriver  \nPreview\n  # python3 main.py\n\n*2024-02-20 16:14:47.836189*\n\n1. Arbitrary File Reading due to Lack of Input Filepath Validation\n- Feb 6th 2024 / High (CVE-2024-0964)\n- gradio-app/gradio\n- https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741/\n\n2. View Barcode Image leads to Remote (https://www.kitploit.com/search/label/Remote) Code Execution\n- Jan 31st 2024 / Critical (CVE: Not yet)\n- dolibarr/dolibarr\n- https://huntr.com/bounties/f0ffd01e-8054-4e43-96f7-a0d2e652ac7e/\n\n  (delimiter-based file database)  # vim (https://www.kitploit.com/search/label/Vim) feeds.db\n\n1|2024-02-20 16:17:40.393240|7fe14fd58ca2582d66539b2fe178eeaed3524342|CVE-2024-0964|https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741/\n2|2024-02-20 16:17:40.393987|c6b84ac808e7f229a4c8f9fbd073b4c0727e07e1|CVE: Not yet|https://huntr.com/bounties/f0ffd01e-8054-4e43-96f7-a0d2e652ac7e/\n3|2024-02-20 16:17:40.394582|7fead9658843919219a3b30b8249700d968d0cc9|CVE: Not yet|https://huntr.com/bounties/d6cb06dc-5d10-4197-8f89-847c3203d953/\n4|2024-02-20 16:17:40.395094|81fecdd74318ce7da9bc29e81198e62f3225bd44|CVE: Not yet|https://huntr.com/bounties/d875d1a2-7205-4b2b-93cf-439fa4c4f961/\n5|2024-02-20 16:17:40.395613|111045c8f1a7926174243db403614d4a58dc72ed|CVE: Not yet|https://huntr.com/bounties/10e423cd-7051-43fd-b736-4e18650d0172/\n  \nNotes\n    This code is designed to parse HTML elements from huntr.com, so it may not function correctly if the HTML page structure changes.   In case of errors during parsing, exception handling has been included, so if it doesn't work as expected, please inspect the HTML source for any changes.  If get in trouble In a typical cloud (https://www.kitploit.com/search/label/Cloud) environment, scripts (https://www.kitploit.com/search/label/Scripts) may not function properly within virtual machines (VMs).  \n\nDownload Huntr-Com-Bug-Bounties-Collector (https://github.com/password123456/huntr-com-bug-bounties-collector)", "creation_timestamp": "2024-02-27T12:27:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a4535227-ee6c-479a-8a8c-500017d39343/export</guid>
      <pubDate>Tue, 27 Feb 2024 12:27:53 +0000</pubDate>
    </item>
    <item>
      <title>dd92e51f-c6b4-4736-ad23-ddcff1eee7b7</title>
      <link>https://vulnerability.circl.lu/sighting/dd92e51f-c6b4-4736-ad23-ddcff1eee7b7/export</link>
      <description>{"uuid": "dd92e51f-c6b4-4736-ad23-ddcff1eee7b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "published-proof-of-concept", "source": "Telegram/ATWlFfIu5qWEQDH47BmrNR9JfZ7EfYdxf77C7yA6RXUqUg", "content": "", "creation_timestamp": "2024-02-27T15:01:42.000000Z"}</description>
      <content:encoded>{"uuid": "dd92e51f-c6b4-4736-ad23-ddcff1eee7b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "published-proof-of-concept", "source": "Telegram/ATWlFfIu5qWEQDH47BmrNR9JfZ7EfYdxf77C7yA6RXUqUg", "content": "", "creation_timestamp": "2024-02-27T15:01:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dd92e51f-c6b4-4736-ad23-ddcff1eee7b7/export</guid>
      <pubDate>Tue, 27 Feb 2024 15:01:42 +0000</pubDate>
    </item>
    <item>
      <title>badae8b5-5465-4fec-97e1-1d4dad8fd994</title>
      <link>https://vulnerability.circl.lu/sighting/badae8b5-5465-4fec-97e1-1d4dad8fd994/export</link>
      <description>{"uuid": "badae8b5-5465-4fec-97e1-1d4dad8fd994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "seen", "source": "https://t.me/ctinow/196539", "content": "https://ift.tt/8JeA6xd\nCVE-2024-0964 | gradio API Request path traversal", "creation_timestamp": "2024-02-29T11:56:08.000000Z"}</description>
      <content:encoded>{"uuid": "badae8b5-5465-4fec-97e1-1d4dad8fd994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0964", "type": "seen", "source": "https://t.me/ctinow/196539", "content": "https://ift.tt/8JeA6xd\nCVE-2024-0964 | gradio API Request path traversal", "creation_timestamp": "2024-02-29T11:56:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/badae8b5-5465-4fec-97e1-1d4dad8fd994/export</guid>
      <pubDate>Thu, 29 Feb 2024 11:56:08 +0000</pubDate>
    </item>
  </channel>
</rss>
