<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 14:07:15 +0000</lastBuildDate>
    <item>
      <title>3438597d-3c9b-4ad2-963d-5840b9086009</title>
      <link>https://vulnerability.circl.lu/sighting/3438597d-3c9b-4ad2-963d-5840b9086009/export</link>
      <description>{"uuid": "3438597d-3c9b-4ad2-963d-5840b9086009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "Telegram/vOnFw-tbLHXYYB-E0PtL8udwSbsTwJfbnnja3d_osVpsMw", "content": "", "creation_timestamp": "2024-02-16T04:14:29.000000Z"}</description>
      <content:encoded>{"uuid": "3438597d-3c9b-4ad2-963d-5840b9086009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "Telegram/vOnFw-tbLHXYYB-E0PtL8udwSbsTwJfbnnja3d_osVpsMw", "content": "", "creation_timestamp": "2024-02-16T04:14:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3438597d-3c9b-4ad2-963d-5840b9086009/export</guid>
      <pubDate>Fri, 16 Feb 2024 04:14:29 +0000</pubDate>
    </item>
    <item>
      <title>6311ed52-9374-4f60-b945-d61c34835f43</title>
      <link>https://vulnerability.circl.lu/sighting/6311ed52-9374-4f60-b945-d61c34835f43/export</link>
      <description>{"uuid": "6311ed52-9374-4f60-b945-d61c34835f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1986", "content": "https://github.com/erick-duarte/CVE-2024-24386\n\nVitalPBX - CVE-2024-24386\n#github #exploit #poc", "creation_timestamp": "2024-02-16T04:19:21.000000Z"}</description>
      <content:encoded>{"uuid": "6311ed52-9374-4f60-b945-d61c34835f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1986", "content": "https://github.com/erick-duarte/CVE-2024-24386\n\nVitalPBX - CVE-2024-24386\n#github #exploit #poc", "creation_timestamp": "2024-02-16T04:19:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6311ed52-9374-4f60-b945-d61c34835f43/export</guid>
      <pubDate>Fri, 16 Feb 2024 04:19:21 +0000</pubDate>
    </item>
    <item>
      <title>0c7899b8-3e62-41d6-a448-2fd566c0fe6a</title>
      <link>https://vulnerability.circl.lu/sighting/0c7899b8-3e62-41d6-a448-2fd566c0fe6a/export</link>
      <description>{"uuid": "0c7899b8-3e62-41d6-a448-2fd566c0fe6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9977", "content": "#exploit\n1. CVE-2024-23749:\nCommand Injection in KiTTY Get Remote File Through SCP Input\nhttps://blog.defcesco.io/CVE-2024-23749\n\n2. CVE-2024-23724:\nGhost CMS Stored XSS Leading to Owner Takeover\nhttps://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss\n]-&amp;gt; https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724\n\n3. CVE-2024-24386:\nVitalPBX &amp;lt;3.2.5 - Command Injection\nhttps://github.com/erick-duarte/CVE-2024-24386", "creation_timestamp": "2024-02-23T06:29:10.000000Z"}</description>
      <content:encoded>{"uuid": "0c7899b8-3e62-41d6-a448-2fd566c0fe6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9977", "content": "#exploit\n1. CVE-2024-23749:\nCommand Injection in KiTTY Get Remote File Through SCP Input\nhttps://blog.defcesco.io/CVE-2024-23749\n\n2. CVE-2024-23724:\nGhost CMS Stored XSS Leading to Owner Takeover\nhttps://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss\n]-&amp;gt; https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724\n\n3. CVE-2024-24386:\nVitalPBX &amp;lt;3.2.5 - Command Injection\nhttps://github.com/erick-duarte/CVE-2024-24386", "creation_timestamp": "2024-02-23T06:29:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0c7899b8-3e62-41d6-a448-2fd566c0fe6a/export</guid>
      <pubDate>Fri, 23 Feb 2024 06:29:10 +0000</pubDate>
    </item>
    <item>
      <title>e56ab00d-f67a-4844-ba62-4c69007dd9d4</title>
      <link>https://vulnerability.circl.lu/sighting/e56ab00d-f67a-4844-ba62-4c69007dd9d4/export</link>
      <description>{"uuid": "e56ab00d-f67a-4844-ba62-4c69007dd9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24388", "type": "seen", "source": "https://t.me/ctinow/192787", "content": "https://ift.tt/zP5HiYd\nCVE-2024-24388 | XunRuiCMS up to 4.6.2 Background Login cross site scripting", "creation_timestamp": "2024-02-25T09:11:31.000000Z"}</description>
      <content:encoded>{"uuid": "e56ab00d-f67a-4844-ba62-4c69007dd9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24388", "type": "seen", "source": "https://t.me/ctinow/192787", "content": "https://ift.tt/zP5HiYd\nCVE-2024-24388 | XunRuiCMS up to 4.6.2 Background Login cross site scripting", "creation_timestamp": "2024-02-25T09:11:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e56ab00d-f67a-4844-ba62-4c69007dd9d4/export</guid>
      <pubDate>Sun, 25 Feb 2024 09:11:31 +0000</pubDate>
    </item>
    <item>
      <title>253de69b-9262-4d02-9581-353f8912ba73</title>
      <link>https://vulnerability.circl.lu/sighting/253de69b-9262-4d02-9581-353f8912ba73/export</link>
      <description>{"uuid": "253de69b-9262-4d02-9581-353f8912ba73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24389", "type": "seen", "source": "https://t.me/ctinow/202024", "content": "https://ift.tt/3rqMd1v\nCVE-2024-24389", "creation_timestamp": "2024-03-07T03:26:40.000000Z"}</description>
      <content:encoded>{"uuid": "253de69b-9262-4d02-9581-353f8912ba73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24389", "type": "seen", "source": "https://t.me/ctinow/202024", "content": "https://ift.tt/3rqMd1v\nCVE-2024-24389", "creation_timestamp": "2024-03-07T03:26:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/253de69b-9262-4d02-9581-353f8912ba73/export</guid>
      <pubDate>Thu, 07 Mar 2024 03:26:40 +0000</pubDate>
    </item>
    <item>
      <title>34e16ac5-ef2d-4e49-8177-ec6ab9a97d2d</title>
      <link>https://vulnerability.circl.lu/sighting/34e16ac5-ef2d-4e49-8177-ec6ab9a97d2d/export</link>
      <description>{"uuid": "34e16ac5-ef2d-4e49-8177-ec6ab9a97d2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24389", "type": "seen", "source": "https://t.me/ctinow/202028", "content": "https://ift.tt/3rqMd1v\nCVE-2024-24389", "creation_timestamp": "2024-03-07T03:32:11.000000Z"}</description>
      <content:encoded>{"uuid": "34e16ac5-ef2d-4e49-8177-ec6ab9a97d2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24389", "type": "seen", "source": "https://t.me/ctinow/202028", "content": "https://ift.tt/3rqMd1v\nCVE-2024-24389", "creation_timestamp": "2024-03-07T03:32:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/34e16ac5-ef2d-4e49-8177-ec6ab9a97d2d/export</guid>
      <pubDate>Thu, 07 Mar 2024 03:32:11 +0000</pubDate>
    </item>
    <item>
      <title>f2b3e913-6d3c-435c-a6a7-8cb07ab46dd8</title>
      <link>https://vulnerability.circl.lu/sighting/f2b3e913-6d3c-435c-a6a7-8cb07ab46dd8/export</link>
      <description>{"uuid": "f2b3e913-6d3c-435c-a6a7-8cb07ab46dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2438", "type": "seen", "source": "https://t.me/ctinow/207603", "content": "https://ift.tt/Ll6wrYd\nCVE-2024-2438", "creation_timestamp": "2024-03-14T10:27:00.000000Z"}</description>
      <content:encoded>{"uuid": "f2b3e913-6d3c-435c-a6a7-8cb07ab46dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2438", "type": "seen", "source": "https://t.me/ctinow/207603", "content": "https://ift.tt/Ll6wrYd\nCVE-2024-2438", "creation_timestamp": "2024-03-14T10:27:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2b3e913-6d3c-435c-a6a7-8cb07ab46dd8/export</guid>
      <pubDate>Thu, 14 Mar 2024 10:27:00 +0000</pubDate>
    </item>
    <item>
      <title>5ad44429-679e-4126-897c-09cb7afc8952</title>
      <link>https://vulnerability.circl.lu/sighting/5ad44429-679e-4126-897c-09cb7afc8952/export</link>
      <description>{"uuid": "5ad44429-679e-4126-897c-09cb7afc8952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2438", "type": "seen", "source": "https://t.me/ctinow/207610", "content": "https://ift.tt/Ll6wrYd\nCVE-2024-2438", "creation_timestamp": "2024-03-14T10:27:12.000000Z"}</description>
      <content:encoded>{"uuid": "5ad44429-679e-4126-897c-09cb7afc8952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2438", "type": "seen", "source": "https://t.me/ctinow/207610", "content": "https://ift.tt/Ll6wrYd\nCVE-2024-2438", "creation_timestamp": "2024-03-14T10:27:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5ad44429-679e-4126-897c-09cb7afc8952/export</guid>
      <pubDate>Thu, 14 Mar 2024 10:27:12 +0000</pubDate>
    </item>
    <item>
      <title>c1d1b1ac-72e7-44e8-8d1f-8956ff32f565</title>
      <link>https://vulnerability.circl.lu/sighting/c1d1b1ac-72e7-44e8-8d1f-8956ff32f565/export</link>
      <description>{"uuid": "c1d1b1ac-72e7-44e8-8d1f-8956ff32f565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6860", "content": "https://github.com/erick-duarte/CVE-2024-24386\n\nVitalPBX - CVE-2024-24386\n#github #exploit #poc", "creation_timestamp": "2024-06-08T00:13:08.000000Z"}</description>
      <content:encoded>{"uuid": "c1d1b1ac-72e7-44e8-8d1f-8956ff32f565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24386", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6860", "content": "https://github.com/erick-duarte/CVE-2024-24386\n\nVitalPBX - CVE-2024-24386\n#github #exploit #poc", "creation_timestamp": "2024-06-08T00:13:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c1d1b1ac-72e7-44e8-8d1f-8956ff32f565/export</guid>
      <pubDate>Sat, 08 Jun 2024 00:13:08 +0000</pubDate>
    </item>
    <item>
      <title>eb47e1fc-13c8-4440-b14a-13e99b6890c5</title>
      <link>https://vulnerability.circl.lu/sighting/eb47e1fc-13c8-4440-b14a-13e99b6890c5/export</link>
      <description>{"uuid": "eb47e1fc-13c8-4440-b14a-13e99b6890c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24389", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9228", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24389\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in XunRuiCMS up to v4.6.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Add Column Name parameter.\n\ud83d\udccf Published: 2024-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-27T21:02:47.978Z\n\ud83d\udd17 References:\n1. https://j11zuc9f0h2.feishu.cn/docx/TXRmdIcH3ocn1WxuEQBcNPpjnLe", "creation_timestamp": "2025-03-27T21:27:56.000000Z"}</description>
      <content:encoded>{"uuid": "eb47e1fc-13c8-4440-b14a-13e99b6890c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24389", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9228", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-24389\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in XunRuiCMS up to v4.6.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Add Column Name parameter.\n\ud83d\udccf Published: 2024-03-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-27T21:02:47.978Z\n\ud83d\udd17 References:\n1. https://j11zuc9f0h2.feishu.cn/docx/TXRmdIcH3ocn1WxuEQBcNPpjnLe", "creation_timestamp": "2025-03-27T21:27:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eb47e1fc-13c8-4440-b14a-13e99b6890c5/export</guid>
      <pubDate>Thu, 27 Mar 2025 21:27:56 +0000</pubDate>
    </item>
  </channel>
</rss>
