<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 10:11:57 +0000</lastBuildDate>
    <item>
      <title>f410e4ee-de2e-4731-b32a-7a3a58027d08</title>
      <link>https://vulnerability.circl.lu/sighting/f410e4ee-de2e-4731-b32a-7a3a58027d08/export</link>
      <description>{"uuid": "f410e4ee-de2e-4731-b32a-7a3a58027d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "seen", "source": "https://t.me/ctinow/179910", "content": "https://ift.tt/NLyEdRg\nCVE-2024-23673", "creation_timestamp": "2024-02-06T11:26:50.000000Z"}</description>
      <content:encoded>{"uuid": "f410e4ee-de2e-4731-b32a-7a3a58027d08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "seen", "source": "https://t.me/ctinow/179910", "content": "https://ift.tt/NLyEdRg\nCVE-2024-23673", "creation_timestamp": "2024-02-06T11:26:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f410e4ee-de2e-4731-b32a-7a3a58027d08/export</guid>
      <pubDate>Tue, 06 Feb 2024 11:26:50 +0000</pubDate>
    </item>
    <item>
      <title>0f38d587-5bf0-46cd-b9f2-cadc11961d5a</title>
      <link>https://vulnerability.circl.lu/sighting/0f38d587-5bf0-46cd-b9f2-cadc11961d5a/export</link>
      <description>{"uuid": "0f38d587-5bf0-46cd-b9f2-cadc11961d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "seen", "source": "https://t.me/ctinow/197459", "content": "https://ift.tt/EYJPGVT\nCVE-2024-23673 | Apache Sling Servlets Resolver up to 2.10.x Script path traversal (SLING-12233)", "creation_timestamp": "2024-03-01T10:17:02.000000Z"}</description>
      <content:encoded>{"uuid": "0f38d587-5bf0-46cd-b9f2-cadc11961d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "seen", "source": "https://t.me/ctinow/197459", "content": "https://ift.tt/EYJPGVT\nCVE-2024-23673 | Apache Sling Servlets Resolver up to 2.10.x Script path traversal (SLING-12233)", "creation_timestamp": "2024-03-01T10:17:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0f38d587-5bf0-46cd-b9f2-cadc11961d5a/export</guid>
      <pubDate>Fri, 01 Mar 2024 10:17:02 +0000</pubDate>
    </item>
    <item>
      <title>cfac3158-355d-456e-85fc-cc3ae3b87826</title>
      <link>https://vulnerability.circl.lu/sighting/cfac3158-355d-456e-85fc-cc3ae3b87826/export</link>
      <description>{"uuid": "cfac3158-355d-456e-85fc-cc3ae3b87826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4343", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23673\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.\nIf the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script.\u00a0\n\nUsers are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.\n\ud83d\udccf Published: 2024-02-06T12:30:30Z\n\ud83d\udccf Modified: 2025-02-13T19:31:02Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-23673\n2. https://github.com/apache/sling-org-apache-sling-servlets-resolver/commit/b54d4e6693e0bcd63a97a0328f4f065b8a81b75e\n3. https://github.com/apache/sling-org-apache-sling-servlets-resolver\n4. https://lists.apache.org/thread/5zzx8ztwc6tmbwlw80m2pbrp3913l2kl\n5. http://www.openwall.com/lists/oss-security/2024/02/06/1", "creation_timestamp": "2025-02-13T20:15:41.000000Z"}</description>
      <content:encoded>{"uuid": "cfac3158-355d-456e-85fc-cc3ae3b87826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4343", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23673\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.\nIf the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script.\u00a0\n\nUsers are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.\n\ud83d\udccf Published: 2024-02-06T12:30:30Z\n\ud83d\udccf Modified: 2025-02-13T19:31:02Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-23673\n2. https://github.com/apache/sling-org-apache-sling-servlets-resolver/commit/b54d4e6693e0bcd63a97a0328f4f065b8a81b75e\n3. https://github.com/apache/sling-org-apache-sling-servlets-resolver\n4. https://lists.apache.org/thread/5zzx8ztwc6tmbwlw80m2pbrp3913l2kl\n5. http://www.openwall.com/lists/oss-security/2024/02/06/1", "creation_timestamp": "2025-02-13T20:15:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cfac3158-355d-456e-85fc-cc3ae3b87826/export</guid>
      <pubDate>Thu, 13 Feb 2025 20:15:41 +0000</pubDate>
    </item>
    <item>
      <title>749902de-2b1c-4548-86e2-2bfa55d421dc</title>
      <link>https://vulnerability.circl.lu/sighting/749902de-2b1c-4548-86e2-2bfa55d421dc/export</link>
      <description>{"uuid": "749902de-2b1c-4548-86e2-2bfa55d421dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15789", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23673\n\ud83d\udd25 CVSS Score: 8.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.\nIf the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script.\u00a0\n\nUsers are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.\n\ud83d\udccf Published: 2024-02-06T10:04:21.294Z\n\ud83d\udccf Modified: 2025-05-09T16:27:44.139Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/5zzx8ztwc6tmbwlw80m2pbrp3913l2kl\n2. http://www.openwall.com/lists/oss-security/2024/02/06/1", "creation_timestamp": "2025-05-09T17:25:55.000000Z"}</description>
      <content:encoded>{"uuid": "749902de-2b1c-4548-86e2-2bfa55d421dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15789", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-23673\n\ud83d\udd25 CVSS Score: 8.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Malicious code execution via path traversal in Apache Software Foundation Apache Sling Servlets Resolver.This issue affects all version of Apache Sling Servlets Resolver before 2.11.0. However, whether a system is vulnerable to this attack depends on the exact configuration of the system.\nIf the system is vulnerable, a user with write access to the repository might be able to trick the Sling Servlet Resolver to load a previously uploaded script.\u00a0\n\nUsers are recommended to upgrade to version 2.11.0, which fixes this issue. It is recommended to upgrade, regardless of whether your system configuration currently allows this attack or not.\n\ud83d\udccf Published: 2024-02-06T10:04:21.294Z\n\ud83d\udccf Modified: 2025-05-09T16:27:44.139Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/5zzx8ztwc6tmbwlw80m2pbrp3913l2kl\n2. http://www.openwall.com/lists/oss-security/2024/02/06/1", "creation_timestamp": "2025-05-09T17:25:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/749902de-2b1c-4548-86e2-2bfa55d421dc/export</guid>
      <pubDate>Fri, 09 May 2025 17:25:55 +0000</pubDate>
    </item>
    <item>
      <title>2e041b2c-63b0-4c1b-a71e-6054475f0d0c</title>
      <link>https://vulnerability.circl.lu/sighting/2e041b2c-63b0-4c1b-a71e-6054475f0d0c/export</link>
      <description>{"uuid": "2e041b2c-63b0-4c1b-a71e-6054475f0d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwrsq2uy6a2v", "content": "", "creation_timestamp": "2025-08-19T21:02:34.165973Z"}</description>
      <content:encoded>{"uuid": "2e041b2c-63b0-4c1b-a71e-6054475f0d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23673", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwrsq2uy6a2v", "content": "", "creation_timestamp": "2025-08-19T21:02:34.165973Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2e041b2c-63b0-4c1b-a71e-6054475f0d0c/export</guid>
      <pubDate>Tue, 19 Aug 2025 21:02:34 +0000</pubDate>
    </item>
  </channel>
</rss>
