<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 07:00:08 +0000</lastBuildDate>
    <item>
      <title>45b3895e-542e-4162-9d0d-69565142da5b</title>
      <link>https://vulnerability.circl.lu/sighting/45b3895e-542e-4162-9d0d-69565142da5b/export</link>
      <description>{"uuid": "45b3895e-542e-4162-9d0d-69565142da5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25300", "type": "seen", "source": "https://t.me/ctinow/184978", "content": "https://ift.tt/o2AlxhD\nCVE-2024-25300", "creation_timestamp": "2024-02-14T20:26:26.000000Z"}</description>
      <content:encoded>{"uuid": "45b3895e-542e-4162-9d0d-69565142da5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25300", "type": "seen", "source": "https://t.me/ctinow/184978", "content": "https://ift.tt/o2AlxhD\nCVE-2024-25300", "creation_timestamp": "2024-02-14T20:26:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/45b3895e-542e-4162-9d0d-69565142da5b/export</guid>
      <pubDate>Wed, 14 Feb 2024 20:26:26 +0000</pubDate>
    </item>
    <item>
      <title>d9215596-b88d-4590-9517-eb13597ef5e9</title>
      <link>https://vulnerability.circl.lu/sighting/d9215596-b88d-4590-9517-eb13597ef5e9/export</link>
      <description>{"uuid": "d9215596-b88d-4590-9517-eb13597ef5e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25301", "type": "seen", "source": "https://t.me/ctinow/184979", "content": "https://ift.tt/q6zV1BH\nCVE-2024-25301", "creation_timestamp": "2024-02-14T20:26:27.000000Z"}</description>
      <content:encoded>{"uuid": "d9215596-b88d-4590-9517-eb13597ef5e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25301", "type": "seen", "source": "https://t.me/ctinow/184979", "content": "https://ift.tt/q6zV1BH\nCVE-2024-25301", "creation_timestamp": "2024-02-14T20:26:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d9215596-b88d-4590-9517-eb13597ef5e9/export</guid>
      <pubDate>Wed, 14 Feb 2024 20:26:27 +0000</pubDate>
    </item>
    <item>
      <title>d2d2a7dd-6b1d-4475-9fa0-1b48b1c7f2e2</title>
      <link>https://vulnerability.circl.lu/sighting/d2d2a7dd-6b1d-4475-9fa0-1b48b1c7f2e2/export</link>
      <description>{"uuid": "d2d2a7dd-6b1d-4475-9fa0-1b48b1c7f2e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25307", "type": "seen", "source": "https://t.me/ctinow/198485", "content": "https://ift.tt/MwRJplj\nCVE-2024-25307 | code-projects Cinema Seat Reservation System 1.0 booking.php id sql injection", "creation_timestamp": "2024-03-02T22:51:14.000000Z"}</description>
      <content:encoded>{"uuid": "d2d2a7dd-6b1d-4475-9fa0-1b48b1c7f2e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25307", "type": "seen", "source": "https://t.me/ctinow/198485", "content": "https://ift.tt/MwRJplj\nCVE-2024-25307 | code-projects Cinema Seat Reservation System 1.0 booking.php id sql injection", "creation_timestamp": "2024-03-02T22:51:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d2d2a7dd-6b1d-4475-9fa0-1b48b1c7f2e2/export</guid>
      <pubDate>Sat, 02 Mar 2024 22:51:14 +0000</pubDate>
    </item>
    <item>
      <title>3891796c-4fba-4aaa-a46d-c2e842c16a5d</title>
      <link>https://vulnerability.circl.lu/sighting/3891796c-4fba-4aaa-a46d-c2e842c16a5d/export</link>
      <description>{"uuid": "3891796c-4fba-4aaa-a46d-c2e842c16a5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25302", "type": "seen", "source": "https://t.me/ctinow/198583", "content": "https://ift.tt/sJX6lTZ\nCVE-2024-25302 | SourceCodester Event Student Attendance System 1.0 student sql injection", "creation_timestamp": "2024-03-03T07:06:58.000000Z"}</description>
      <content:encoded>{"uuid": "3891796c-4fba-4aaa-a46d-c2e842c16a5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25302", "type": "seen", "source": "https://t.me/ctinow/198583", "content": "https://ift.tt/sJX6lTZ\nCVE-2024-25302 | SourceCodester Event Student Attendance System 1.0 student sql injection", "creation_timestamp": "2024-03-03T07:06:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3891796c-4fba-4aaa-a46d-c2e842c16a5d/export</guid>
      <pubDate>Sun, 03 Mar 2024 07:06:58 +0000</pubDate>
    </item>
    <item>
      <title>18c9fcb6-3ee3-4a86-9860-472f452dfc1b</title>
      <link>https://vulnerability.circl.lu/sighting/18c9fcb6-3ee3-4a86-9860-472f452dfc1b/export</link>
      <description>{"uuid": "18c9fcb6-3ee3-4a86-9860-472f452dfc1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2530", "type": "seen", "source": "https://t.me/ctinow/209131", "content": "https://ift.tt/i9zobB3\nCVE-2024-2530 | MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0 /admin/update-rooms.php id cross site scripting", "creation_timestamp": "2024-03-15T21:01:30.000000Z"}</description>
      <content:encoded>{"uuid": "18c9fcb6-3ee3-4a86-9860-472f452dfc1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2530", "type": "seen", "source": "https://t.me/ctinow/209131", "content": "https://ift.tt/i9zobB3\nCVE-2024-2530 | MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0 /admin/update-rooms.php id cross site scripting", "creation_timestamp": "2024-03-15T21:01:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/18c9fcb6-3ee3-4a86-9860-472f452dfc1b/export</guid>
      <pubDate>Fri, 15 Mar 2024 21:01:30 +0000</pubDate>
    </item>
    <item>
      <title>474cc1cb-e59c-4289-b329-dffd6c641e54</title>
      <link>https://vulnerability.circl.lu/sighting/474cc1cb-e59c-4289-b329-dffd6c641e54/export</link>
      <description>{"uuid": "474cc1cb-e59c-4289-b329-dffd6c641e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2530", "type": "seen", "source": "https://t.me/ctinow/209721", "content": "https://ift.tt/2tJUONq\nCVE-2024-2530", "creation_timestamp": "2024-03-16T22:21:33.000000Z"}</description>
      <content:encoded>{"uuid": "474cc1cb-e59c-4289-b329-dffd6c641e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2530", "type": "seen", "source": "https://t.me/ctinow/209721", "content": "https://ift.tt/2tJUONq\nCVE-2024-2530", "creation_timestamp": "2024-03-16T22:21:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/474cc1cb-e59c-4289-b329-dffd6c641e54/export</guid>
      <pubDate>Sat, 16 Mar 2024 22:21:33 +0000</pubDate>
    </item>
    <item>
      <title>8830b839-53ad-4d18-a4bd-27b07ae15478</title>
      <link>https://vulnerability.circl.lu/sighting/8830b839-53ad-4d18-a4bd-27b07ae15478/export</link>
      <description>{"uuid": "8830b839-53ad-4d18-a4bd-27b07ae15478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2530", "type": "seen", "source": "https://t.me/ctinow/209723", "content": "https://ift.tt/2tJUONq\nCVE-2024-2530", "creation_timestamp": "2024-03-16T22:26:48.000000Z"}</description>
      <content:encoded>{"uuid": "8830b839-53ad-4d18-a4bd-27b07ae15478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2530", "type": "seen", "source": "https://t.me/ctinow/209723", "content": "https://ift.tt/2tJUONq\nCVE-2024-2530", "creation_timestamp": "2024-03-16T22:26:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8830b839-53ad-4d18-a4bd-27b07ae15478/export</guid>
      <pubDate>Sat, 16 Mar 2024 22:26:48 +0000</pubDate>
    </item>
    <item>
      <title>76e4ece4-d624-4892-bfc0-8e7abe942874</title>
      <link>https://vulnerability.circl.lu/sighting/76e4ece4-d624-4892-bfc0-8e7abe942874/export</link>
      <description>{"uuid": "76e4ece4-d624-4892-bfc0-8e7abe942874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25300", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7427", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25300\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in Redaxo v5.15.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter in the Template section.\n\ud83d\udccf Published: 2024-02-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-13T16:29:04.011Z\n\ud83d\udd17 References:\n1. https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/XSS.md", "creation_timestamp": "2025-03-13T16:45:23.000000Z"}</description>
      <content:encoded>{"uuid": "76e4ece4-d624-4892-bfc0-8e7abe942874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25300", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7427", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25300\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in Redaxo v5.15.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter in the Template section.\n\ud83d\udccf Published: 2024-02-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-13T16:29:04.011Z\n\ud83d\udd17 References:\n1. https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/XSS.md", "creation_timestamp": "2025-03-13T16:45:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/76e4ece4-d624-4892-bfc0-8e7abe942874/export</guid>
      <pubDate>Thu, 13 Mar 2025 16:45:23 +0000</pubDate>
    </item>
    <item>
      <title>a503e8d3-2da5-4c60-ba24-4d85f7195370</title>
      <link>https://vulnerability.circl.lu/sighting/a503e8d3-2da5-4c60-ba24-4d85f7195370/export</link>
      <description>{"uuid": "a503e8d3-2da5-4c60-ba24-4d85f7195370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25308", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25308\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'name' parameter at School/teacher_login.php.\n\ud83d\udccf Published: 2024-02-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-12T15:04:59.567Z\n\ud83d\udd17 References:\n1. https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-6.md", "creation_timestamp": "2025-06-12T15:34:12.000000Z"}</description>
      <content:encoded>{"uuid": "a503e8d3-2da5-4c60-ba24-4d85f7195370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25308", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25308\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'name' parameter at School/teacher_login.php.\n\ud83d\udccf Published: 2024-02-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-12T15:04:59.567Z\n\ud83d\udd17 References:\n1. https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-6.md", "creation_timestamp": "2025-06-12T15:34:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a503e8d3-2da5-4c60-ba24-4d85f7195370/export</guid>
      <pubDate>Thu, 12 Jun 2025 15:34:12 +0000</pubDate>
    </item>
    <item>
      <title>a03b4359-59bf-4bc8-ae71-59b7dc07ccda</title>
      <link>https://vulnerability.circl.lu/sighting/a03b4359-59bf-4bc8-ae71-59b7dc07ccda/export</link>
      <description>{"uuid": "a03b4359-59bf-4bc8-ae71-59b7dc07ccda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25307", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19069", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25307\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Code-projects Cinema Seat Reservation System 1.0 allows SQL Injection via the 'id' parameter at \"/Cinema-Reservation/booking.php?id=1.\"\n\ud83d\udccf Published: 2024-02-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T20:19:30.574Z\n\ud83d\udd17 References:\n1. https://github.com/tubakvgc/CVEs/blob/main/Cinema%20Seat%20Reservation%20System/Cinema%20Seat%20Reservation%20System%20-%20SQL%20Injection.md", "creation_timestamp": "2025-06-20T20:44:12.000000Z"}</description>
      <content:encoded>{"uuid": "a03b4359-59bf-4bc8-ae71-59b7dc07ccda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25307", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19069", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25307\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Code-projects Cinema Seat Reservation System 1.0 allows SQL Injection via the 'id' parameter at \"/Cinema-Reservation/booking.php?id=1.\"\n\ud83d\udccf Published: 2024-02-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-20T20:19:30.574Z\n\ud83d\udd17 References:\n1. https://github.com/tubakvgc/CVEs/blob/main/Cinema%20Seat%20Reservation%20System/Cinema%20Seat%20Reservation%20System%20-%20SQL%20Injection.md", "creation_timestamp": "2025-06-20T20:44:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a03b4359-59bf-4bc8-ae71-59b7dc07ccda/export</guid>
      <pubDate>Fri, 20 Jun 2025 20:44:12 +0000</pubDate>
    </item>
  </channel>
</rss>
