<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 18:44:52 +0000</lastBuildDate>
    <item>
      <title>cdf2b6a6-c003-4be9-841f-b791d4905a56</title>
      <link>https://vulnerability.circl.lu/sighting/cdf2b6a6-c003-4be9-841f-b791d4905a56/export</link>
      <description>{"uuid": "cdf2b6a6-c003-4be9-841f-b791d4905a56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21655", "type": "seen", "source": "https://t.me/ctinow/178335", "content": "https://ift.tt/FrWSLA7\nCVE-2024-21655 | Discourse up to 3.1.3/3.2.0.beta3 resource consumption (GHSA-m5fc-94mm-38fx)", "creation_timestamp": "2024-02-03T00:21:21.000000Z"}</description>
      <content:encoded>{"uuid": "cdf2b6a6-c003-4be9-841f-b791d4905a56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21655", "type": "seen", "source": "https://t.me/ctinow/178335", "content": "https://ift.tt/FrWSLA7\nCVE-2024-21655 | Discourse up to 3.1.3/3.2.0.beta3 resource consumption (GHSA-m5fc-94mm-38fx)", "creation_timestamp": "2024-02-03T00:21:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cdf2b6a6-c003-4be9-841f-b791d4905a56/export</guid>
      <pubDate>Sat, 03 Feb 2024 00:21:21 +0000</pubDate>
    </item>
    <item>
      <title>27e022a4-f483-45e8-80dd-d4e49ecd4f66</title>
      <link>https://vulnerability.circl.lu/sighting/27e022a4-f483-45e8-80dd-d4e49ecd4f66/export</link>
      <description>{"uuid": "27e022a4-f483-45e8-80dd-d4e49ecd4f66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21654", "type": "seen", "source": "https://t.me/ctinow/178358", "content": "https://ift.tt/A3ZY1iH\nCVE-2024-21654 | RubyGems.org 2FA improper authentication (GHSA-4v23-vj8h-7jp2)", "creation_timestamp": "2024-02-03T02:26:53.000000Z"}</description>
      <content:encoded>{"uuid": "27e022a4-f483-45e8-80dd-d4e49ecd4f66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21654", "type": "seen", "source": "https://t.me/ctinow/178358", "content": "https://ift.tt/A3ZY1iH\nCVE-2024-21654 | RubyGems.org 2FA improper authentication (GHSA-4v23-vj8h-7jp2)", "creation_timestamp": "2024-02-03T02:26:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/27e022a4-f483-45e8-80dd-d4e49ecd4f66/export</guid>
      <pubDate>Sat, 03 Feb 2024 02:26:53 +0000</pubDate>
    </item>
    <item>
      <title>92d64289-2888-4481-a2a7-7bcd04a45c08</title>
      <link>https://vulnerability.circl.lu/sighting/92d64289-2888-4481-a2a7-7bcd04a45c08/export</link>
      <description>{"uuid": "92d64289-2888-4481-a2a7-7bcd04a45c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21653", "type": "seen", "source": "https://t.me/ctinow/190528", "content": "https://ift.tt/NPJga7i\nCVE-2024-21653 | vantage6 up to 4.1.x SSH Service access control (GHSA-2wgc-48g2-cj5w)", "creation_timestamp": "2024-02-22T08:37:17.000000Z"}</description>
      <content:encoded>{"uuid": "92d64289-2888-4481-a2a7-7bcd04a45c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21653", "type": "seen", "source": "https://t.me/ctinow/190528", "content": "https://ift.tt/NPJga7i\nCVE-2024-21653 | vantage6 up to 4.1.x SSH Service access control (GHSA-2wgc-48g2-cj5w)", "creation_timestamp": "2024-02-22T08:37:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/92d64289-2888-4481-a2a7-7bcd04a45c08/export</guid>
      <pubDate>Thu, 22 Feb 2024 08:37:17 +0000</pubDate>
    </item>
    <item>
      <title>8c0b3370-c2ce-4a73-9f30-e22b1efc267e</title>
      <link>https://vulnerability.circl.lu/sighting/8c0b3370-c2ce-4a73-9f30-e22b1efc267e/export</link>
      <description>{"uuid": "8c0b3370-c2ce-4a73-9f30-e22b1efc267e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21652", "type": "seen", "source": "https://t.me/ctinow/210869", "content": "https://ift.tt/5iYKrbl\nCVE-2024-21652", "creation_timestamp": "2024-03-18T19:27:09.000000Z"}</description>
      <content:encoded>{"uuid": "8c0b3370-c2ce-4a73-9f30-e22b1efc267e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21652", "type": "seen", "source": "https://t.me/ctinow/210869", "content": "https://ift.tt/5iYKrbl\nCVE-2024-21652", "creation_timestamp": "2024-03-18T19:27:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8c0b3370-c2ce-4a73-9f30-e22b1efc267e/export</guid>
      <pubDate>Mon, 18 Mar 2024 19:27:09 +0000</pubDate>
    </item>
    <item>
      <title>97ab9ceb-75c5-43bd-b90e-8c5042f9efea</title>
      <link>https://vulnerability.circl.lu/sighting/97ab9ceb-75c5-43bd-b90e-8c5042f9efea/export</link>
      <description>{"uuid": "97ab9ceb-75c5-43bd-b90e-8c5042f9efea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21652", "type": "seen", "source": "https://t.me/ctinow/210925", "content": "https://ift.tt/zsY5gMX\nCVE-2024-21652", "creation_timestamp": "2024-03-18T20:36:48.000000Z"}</description>
      <content:encoded>{"uuid": "97ab9ceb-75c5-43bd-b90e-8c5042f9efea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21652", "type": "seen", "source": "https://t.me/ctinow/210925", "content": "https://ift.tt/zsY5gMX\nCVE-2024-21652", "creation_timestamp": "2024-03-18T20:36:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/97ab9ceb-75c5-43bd-b90e-8c5042f9efea/export</guid>
      <pubDate>Mon, 18 Mar 2024 20:36:48 +0000</pubDate>
    </item>
    <item>
      <title>f2f73a4a-f034-4c7a-acd2-bb9de020d305</title>
      <link>https://vulnerability.circl.lu/sighting/f2f73a4a-f034-4c7a-acd2-bb9de020d305/export</link>
      <description>{"uuid": "f2f73a4a-f034-4c7a-acd2-bb9de020d305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2165", "type": "seen", "source": "https://t.me/arpsyndicate/4481", "content": "#ExploitObserverAlert\n\nCVE-2024-2165\n\nDESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-2165. The SEOPress \u2013 On-site SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image alt parameter in all versions up to, and including, 7.5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-04-11T08:34:00.000000Z"}</description>
      <content:encoded>{"uuid": "f2f73a4a-f034-4c7a-acd2-bb9de020d305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2165", "type": "seen", "source": "https://t.me/arpsyndicate/4481", "content": "#ExploitObserverAlert\n\nCVE-2024-2165\n\nDESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-2165. The SEOPress \u2013 On-site SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image alt parameter in all versions up to, and including, 7.5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-04-11T08:34:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2f73a4a-f034-4c7a-acd2-bb9de020d305/export</guid>
      <pubDate>Thu, 11 Apr 2024 08:34:00 +0000</pubDate>
    </item>
    <item>
      <title>a1c0274d-3816-4d65-9548-5e13893e2b13</title>
      <link>https://vulnerability.circl.lu/sighting/a1c0274d-3816-4d65-9548-5e13893e2b13/export</link>
      <description>{"uuid": "a1c0274d-3816-4d65-9548-5e13893e2b13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21650", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7784", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aMass Exploit - CVE-2024-21650 - XWiki &amp;lt; Remote code execution (RCE)\nURL\uff1ahttps://github.com/codeb0ss/CVE-2024-21650-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-28T16:03:01.000000Z"}</description>
      <content:encoded>{"uuid": "a1c0274d-3816-4d65-9548-5e13893e2b13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21650", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7784", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aMass Exploit - CVE-2024-21650 - XWiki &amp;lt; Remote code execution (RCE)\nURL\uff1ahttps://github.com/codeb0ss/CVE-2024-21650-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-28T16:03:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a1c0274d-3816-4d65-9548-5e13893e2b13/export</guid>
      <pubDate>Fri, 28 Jun 2024 16:03:01 +0000</pubDate>
    </item>
    <item>
      <title>58df76d7-eb36-4700-a854-cf3df0594cb4</title>
      <link>https://vulnerability.circl.lu/sighting/58df76d7-eb36-4700-a854-cf3df0594cb4/export</link>
      <description>{"uuid": "58df76d7-eb36-4700-a854-cf3df0594cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21658", "type": "seen", "source": "https://t.me/cvedetector/4539", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21658 - Discourse Calendar Insufficient Input Validation Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-21658 \nPublished : Aug. 30, 2024, 6:15 p.m. | 15\u00a0minutes ago \nDescription : discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-30T20:39:59.000000Z"}</description>
      <content:encoded>{"uuid": "58df76d7-eb36-4700-a854-cf3df0594cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21658", "type": "seen", "source": "https://t.me/cvedetector/4539", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21658 - Discourse Calendar Insufficient Input Validation Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-21658 \nPublished : Aug. 30, 2024, 6:15 p.m. | 15\u00a0minutes ago \nDescription : discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-30T20:39:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/58df76d7-eb36-4700-a854-cf3df0594cb4/export</guid>
      <pubDate>Fri, 30 Aug 2024 20:39:59 +0000</pubDate>
    </item>
    <item>
      <title>1b81df89-76db-4ef8-89ac-28b375a5a3bb</title>
      <link>https://vulnerability.circl.lu/sighting/1b81df89-76db-4ef8-89ac-28b375a5a3bb/export</link>
      <description>{"uuid": "1b81df89-76db-4ef8-89ac-28b375a5a3bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21650", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1472", "content": "", "creation_timestamp": "2024-09-17T21:29:40.000000Z"}</description>
      <content:encoded>{"uuid": "1b81df89-76db-4ef8-89ac-28b375a5a3bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21650", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1472", "content": "", "creation_timestamp": "2024-09-17T21:29:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1b81df89-76db-4ef8-89ac-28b375a5a3bb/export</guid>
      <pubDate>Tue, 17 Sep 2024 21:29:40 +0000</pubDate>
    </item>
    <item>
      <title>b59b5ded-b041-4dd6-a0d5-e122f65ab1c1</title>
      <link>https://vulnerability.circl.lu/sighting/b59b5ded-b041-4dd6-a0d5-e122f65ab1c1/export</link>
      <description>{"uuid": "b59b5ded-b041-4dd6-a0d5-e122f65ab1c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21650", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lztuw3a3io2e", "content": "", "creation_timestamp": "2025-09-27T21:02:28.200237Z"}</description>
      <content:encoded>{"uuid": "b59b5ded-b041-4dd6-a0d5-e122f65ab1c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21650", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lztuw3a3io2e", "content": "", "creation_timestamp": "2025-09-27T21:02:28.200237Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b59b5ded-b041-4dd6-a0d5-e122f65ab1c1/export</guid>
      <pubDate>Sat, 27 Sep 2025 21:02:28 +0000</pubDate>
    </item>
  </channel>
</rss>
