<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:48:22 +0000</lastBuildDate>
    <item>
      <title>12e842b4-2e5b-49f2-9450-5cba82d1adfe</title>
      <link>https://vulnerability.circl.lu/sighting/12e842b4-2e5b-49f2-9450-5cba82d1adfe/export</link>
      <description>{"uuid": "12e842b4-2e5b-49f2-9450-5cba82d1adfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2566", "type": "seen", "source": "https://t.me/ctinow/209556", "content": "https://ift.tt/bASY15o\nCVE-2024-2566 | Fujian Kelixin Communication Command and Dispatch Platform up to 20240313 get_extension_yl.php imei sql injection", "creation_timestamp": "2024-03-16T14:21:42.000000Z"}</description>
      <content:encoded>{"uuid": "12e842b4-2e5b-49f2-9450-5cba82d1adfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2566", "type": "seen", "source": "https://t.me/ctinow/209556", "content": "https://ift.tt/bASY15o\nCVE-2024-2566 | Fujian Kelixin Communication Command and Dispatch Platform up to 20240313 get_extension_yl.php imei sql injection", "creation_timestamp": "2024-03-16T14:21:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/12e842b4-2e5b-49f2-9450-5cba82d1adfe/export</guid>
      <pubDate>Sat, 16 Mar 2024 14:21:42 +0000</pubDate>
    </item>
    <item>
      <title>54571c2e-b033-418d-b40d-819217f982ce</title>
      <link>https://vulnerability.circl.lu/sighting/54571c2e-b033-418d-b40d-819217f982ce/export</link>
      <description>{"uuid": "54571c2e-b033-418d-b40d-819217f982ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2566", "type": "seen", "source": "https://t.me/ctinow/209981", "content": "https://ift.tt/xCwFJTO\nCVE-2024-2566", "creation_timestamp": "2024-03-17T16:21:26.000000Z"}</description>
      <content:encoded>{"uuid": "54571c2e-b033-418d-b40d-819217f982ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2566", "type": "seen", "source": "https://t.me/ctinow/209981", "content": "https://ift.tt/xCwFJTO\nCVE-2024-2566", "creation_timestamp": "2024-03-17T16:21:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/54571c2e-b033-418d-b40d-819217f982ce/export</guid>
      <pubDate>Sun, 17 Mar 2024 16:21:26 +0000</pubDate>
    </item>
    <item>
      <title>ac22f7ee-bb82-4d73-b030-2c6529fd42e8</title>
      <link>https://vulnerability.circl.lu/sighting/ac22f7ee-bb82-4d73-b030-2c6529fd42e8/export</link>
      <description>{"uuid": "ac22f7ee-bb82-4d73-b030-2c6529fd42e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2566", "type": "seen", "source": "https://t.me/ctinow/209983", "content": "https://ift.tt/xCwFJTO\nCVE-2024-2566", "creation_timestamp": "2024-03-17T16:26:48.000000Z"}</description>
      <content:encoded>{"uuid": "ac22f7ee-bb82-4d73-b030-2c6529fd42e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2566", "type": "seen", "source": "https://t.me/ctinow/209983", "content": "https://ift.tt/xCwFJTO\nCVE-2024-2566", "creation_timestamp": "2024-03-17T16:26:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ac22f7ee-bb82-4d73-b030-2c6529fd42e8/export</guid>
      <pubDate>Sun, 17 Mar 2024 16:26:48 +0000</pubDate>
    </item>
    <item>
      <title>26b77e84-69f7-4914-85ce-01e68d0dac55</title>
      <link>https://vulnerability.circl.lu/sighting/26b77e84-69f7-4914-85ce-01e68d0dac55/export</link>
      <description>{"uuid": "26b77e84-69f7-4914-85ce-01e68d0dac55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25661", "type": "seen", "source": "https://t.me/cvedetector/6760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25661 - Infinera TNMS Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-25661 \nPublished : Oct. 1, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : In Infinera TNMS (Transcend Network Management System) 19.10.3, cleartext storage of sensitive information in memory of the desktop application TNMS Client allows guest OS administrators to obtain various users' passwords by reading memory dumps of the desktop application. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T17:45:52.000000Z"}</description>
      <content:encoded>{"uuid": "26b77e84-69f7-4914-85ce-01e68d0dac55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25661", "type": "seen", "source": "https://t.me/cvedetector/6760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25661 - Infinera TNMS Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-25661 \nPublished : Oct. 1, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : In Infinera TNMS (Transcend Network Management System) 19.10.3, cleartext storage of sensitive information in memory of the desktop application TNMS Client allows guest OS administrators to obtain various users' passwords by reading memory dumps of the desktop application. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T17:45:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/26b77e84-69f7-4914-85ce-01e68d0dac55/export</guid>
      <pubDate>Tue, 01 Oct 2024 17:45:52 +0000</pubDate>
    </item>
    <item>
      <title>111b613c-355c-47a8-9202-c9959abae5ab</title>
      <link>https://vulnerability.circl.lu/sighting/111b613c-355c-47a8-9202-c9959abae5ab/export</link>
      <description>{"uuid": "111b613c-355c-47a8-9202-c9959abae5ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25660", "type": "seen", "source": "https://t.me/cvedetector/6778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25660 - Infinera TNMS WebDAV Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-25660 \nPublished : Oct. 1, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : The WebDAV service in Infinera TNMS (Transcend Network Management System) 19.10.3 allows a low-privileged remote attacker to conduct unauthorized file operations, because of execution with unnecessary privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T18:36:24.000000Z"}</description>
      <content:encoded>{"uuid": "111b613c-355c-47a8-9202-c9959abae5ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25660", "type": "seen", "source": "https://t.me/cvedetector/6778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25660 - Infinera TNMS WebDAV Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-25660 \nPublished : Oct. 1, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : The WebDAV service in Infinera TNMS (Transcend Network Management System) 19.10.3 allows a low-privileged remote attacker to conduct unauthorized file operations, because of execution with unnecessary privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T18:36:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/111b613c-355c-47a8-9202-c9959abae5ab/export</guid>
      <pubDate>Tue, 01 Oct 2024 18:36:24 +0000</pubDate>
    </item>
    <item>
      <title>ba324997-89a7-472c-ba1b-f692d97b170d</title>
      <link>https://vulnerability.circl.lu/sighting/ba324997-89a7-472c-ba1b-f692d97b170d/export</link>
      <description>{"uuid": "ba324997-89a7-472c-ba1b-f692d97b170d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25660", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8713", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25660\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WebDAV service in Infinera TNMS (Transcend Network Management System) 19.10.3 allows a low-privileged remote attacker to conduct unauthorized file operations, because of execution with unnecessary privileges.\n\ud83d\udccf Published: 2024-10-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T17:07:55.582Z\n\ud83d\udd17 References:\n1. https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25660", "creation_timestamp": "2025-03-25T17:25:03.000000Z"}</description>
      <content:encoded>{"uuid": "ba324997-89a7-472c-ba1b-f692d97b170d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25660", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8713", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25660\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WebDAV service in Infinera TNMS (Transcend Network Management System) 19.10.3 allows a low-privileged remote attacker to conduct unauthorized file operations, because of execution with unnecessary privileges.\n\ud83d\udccf Published: 2024-10-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T17:07:55.582Z\n\ud83d\udd17 References:\n1. https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25660", "creation_timestamp": "2025-03-25T17:25:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ba324997-89a7-472c-ba1b-f692d97b170d/export</guid>
      <pubDate>Tue, 25 Mar 2025 17:25:03 +0000</pubDate>
    </item>
  </channel>
</rss>
