<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 01:55:15 +0000</lastBuildDate>
    <item>
      <title>ad254f06-8043-4424-adc6-9e89a6aacc48</title>
      <link>https://vulnerability.circl.lu/sighting/ad254f06-8043-4424-adc6-9e89a6aacc48/export</link>
      <description>{"uuid": "ad254f06-8043-4424-adc6-9e89a6aacc48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56889", "type": "seen", "source": "https://t.me/cvedetector/17437", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56889 - CodeAstro Complaint Management System Unrestricted File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56889 \nPublished : Feb. 6, 2025, 10:15 p.m. | 29\u00a0minutes ago \nDescription : Incorrect access control in the endpoint /admin/m_delete.php of CodeAstro Complaint Management System v1.0 allows unauthorized attackers to arbitrarily delete complaints via modification of the id parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T00:26:02.000000Z"}</description>
      <content:encoded>{"uuid": "ad254f06-8043-4424-adc6-9e89a6aacc48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56889", "type": "seen", "source": "https://t.me/cvedetector/17437", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56889 - CodeAstro Complaint Management System Unrestricted File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56889 \nPublished : Feb. 6, 2025, 10:15 p.m. | 29\u00a0minutes ago \nDescription : Incorrect access control in the endpoint /admin/m_delete.php of CodeAstro Complaint Management System v1.0 allows unauthorized attackers to arbitrarily delete complaints via modification of the id parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T00:26:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ad254f06-8043-4424-adc6-9e89a6aacc48/export</guid>
      <pubDate>Fri, 07 Feb 2025 00:26:02 +0000</pubDate>
    </item>
    <item>
      <title>8cd62f61-ce2c-494e-a931-e23e8c50db05</title>
      <link>https://vulnerability.circl.lu/sighting/8cd62f61-ce2c-494e-a931-e23e8c50db05/export</link>
      <description>{"uuid": "8cd62f61-ce2c-494e-a931-e23e8c50db05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56889", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56889\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Incorrect access control in the endpoint /admin/m_delete.php of CodeAstro Complaint Management System v1.0 allows unauthorized attackers to arbitrarily delete complaints via modification of the id parameter.\n\ud83d\udccf Published: 2025-02-07T03:32:02Z\n\ud83d\udccf Modified: 2025-02-07T18:31:20Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-56889\n2. https://github.com/vigneshr232/CVE-2024-56889/blob/main/CVE-2024-56889.md", "creation_timestamp": "2025-02-07T19:04:23.000000Z"}</description>
      <content:encoded>{"uuid": "8cd62f61-ce2c-494e-a931-e23e8c50db05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56889", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56889\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Incorrect access control in the endpoint /admin/m_delete.php of CodeAstro Complaint Management System v1.0 allows unauthorized attackers to arbitrarily delete complaints via modification of the id parameter.\n\ud83d\udccf Published: 2025-02-07T03:32:02Z\n\ud83d\udccf Modified: 2025-02-07T18:31:20Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-56889\n2. https://github.com/vigneshr232/CVE-2024-56889/blob/main/CVE-2024-56889.md", "creation_timestamp": "2025-02-07T19:04:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8cd62f61-ce2c-494e-a931-e23e8c50db05/export</guid>
      <pubDate>Fri, 07 Feb 2025 19:04:23 +0000</pubDate>
    </item>
    <item>
      <title>ac130bf2-1092-4f3f-b7b5-5b8efae284cc</title>
      <link>https://vulnerability.circl.lu/sighting/ac130bf2-1092-4f3f-b7b5-5b8efae284cc/export</link>
      <description>{"uuid": "ac130bf2-1092-4f3f-b7b5-5b8efae284cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56882", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lihulgftef27", "content": "", "creation_timestamp": "2025-02-18T18:16:13.083267Z"}</description>
      <content:encoded>{"uuid": "ac130bf2-1092-4f3f-b7b5-5b8efae284cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56882", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lihulgftef27", "content": "", "creation_timestamp": "2025-02-18T18:16:13.083267Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ac130bf2-1092-4f3f-b7b5-5b8efae284cc/export</guid>
      <pubDate>Tue, 18 Feb 2025 18:16:13 +0000</pubDate>
    </item>
    <item>
      <title>f812f4e4-8604-4efb-874a-89f25268a61f</title>
      <link>https://vulnerability.circl.lu/sighting/f812f4e4-8604-4efb-874a-89f25268a61f/export</link>
      <description>{"uuid": "f812f4e4-8604-4efb-874a-89f25268a61f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lihulijfvf2n", "content": "", "creation_timestamp": "2025-02-18T18:16:15.693825Z"}</description>
      <content:encoded>{"uuid": "f812f4e4-8604-4efb-874a-89f25268a61f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lihulijfvf2n", "content": "", "creation_timestamp": "2025-02-18T18:16:15.693825Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f812f4e4-8604-4efb-874a-89f25268a61f/export</guid>
      <pubDate>Tue, 18 Feb 2025 18:16:15 +0000</pubDate>
    </item>
    <item>
      <title>d49e6d89-81e3-41cc-af76-c930c86e431c</title>
      <link>https://vulnerability.circl.lu/sighting/d49e6d89-81e3-41cc-af76-c930c86e431c/export</link>
      <description>{"uuid": "d49e6d89-81e3-41cc-af76-c930c86e431c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://t.me/cvedetector/18350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56883 - Sage DPW Role-Based Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56883 \nPublished : Feb. 18, 2025, 6:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Sage DPW before 2024_12_001 is vulnerable to Incorrect Access Control. The implemented role-based access controls are not always enforced on the server side. Low-privileged Sage users with employee role privileges can create external courses for other employees, even though they do not have the option to do so in the user interface. To do this, a valid request to create a course simply needs to be modified, so that the current user ID in the \"id\" parameter is replaced with the ID of another user. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T20:59:49.000000Z"}</description>
      <content:encoded>{"uuid": "d49e6d89-81e3-41cc-af76-c930c86e431c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://t.me/cvedetector/18350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56883 - Sage DPW Role-Based Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56883 \nPublished : Feb. 18, 2025, 6:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Sage DPW before 2024_12_001 is vulnerable to Incorrect Access Control. The implemented role-based access controls are not always enforced on the server side. Low-privileged Sage users with employee role privileges can create external courses for other employees, even though they do not have the option to do so in the user interface. To do this, a valid request to create a course simply needs to be modified, so that the current user ID in the \"id\" parameter is replaced with the ID of another user. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T20:59:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d49e6d89-81e3-41cc-af76-c930c86e431c/export</guid>
      <pubDate>Tue, 18 Feb 2025 20:59:49 +0000</pubDate>
    </item>
    <item>
      <title>c2d52f5d-7152-47e3-9b7d-9661a94fd9e6</title>
      <link>https://vulnerability.circl.lu/sighting/c2d52f5d-7152-47e3-9b7d-9661a94fd9e6/export</link>
      <description>{"uuid": "c2d52f5d-7152-47e3-9b7d-9661a94fd9e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56882", "type": "seen", "source": "https://t.me/cvedetector/18352", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56882 - Sage DPW Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-56882 \nPublished : Feb. 18, 2025, 6:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T20:59:50.000000Z"}</description>
      <content:encoded>{"uuid": "c2d52f5d-7152-47e3-9b7d-9661a94fd9e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56882", "type": "seen", "source": "https://t.me/cvedetector/18352", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56882 - Sage DPW Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-56882 \nPublished : Feb. 18, 2025, 6:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-18T20:59:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c2d52f5d-7152-47e3-9b7d-9661a94fd9e6/export</guid>
      <pubDate>Tue, 18 Feb 2025 20:59:50 +0000</pubDate>
    </item>
    <item>
      <title>3848351c-f91d-41cd-8ddf-eb2ac7be5bd9</title>
      <link>https://vulnerability.circl.lu/sighting/3848351c-f91d-41cd-8ddf-eb2ac7be5bd9/export</link>
      <description>{"uuid": "3848351c-f91d-41cd-8ddf-eb2ac7be5bd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liiauw4ind22", "content": "", "creation_timestamp": "2025-02-18T21:56:16.660064Z"}</description>
      <content:encoded>{"uuid": "3848351c-f91d-41cd-8ddf-eb2ac7be5bd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liiauw4ind22", "content": "", "creation_timestamp": "2025-02-18T21:56:16.660064Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3848351c-f91d-41cd-8ddf-eb2ac7be5bd9/export</guid>
      <pubDate>Tue, 18 Feb 2025 21:56:16 +0000</pubDate>
    </item>
    <item>
      <title>5b12b5d9-c666-4752-92cf-ecf9ff32028c</title>
      <link>https://vulnerability.circl.lu/sighting/5b12b5d9-c666-4752-92cf-ecf9ff32028c/export</link>
      <description>{"uuid": "5b12b5d9-c666-4752-92cf-ecf9ff32028c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56882", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liiaux2qjt2y", "content": "", "creation_timestamp": "2025-02-18T21:56:21.207206Z"}</description>
      <content:encoded>{"uuid": "5b12b5d9-c666-4752-92cf-ecf9ff32028c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56882", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3liiaux2qjt2y", "content": "", "creation_timestamp": "2025-02-18T21:56:21.207206Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5b12b5d9-c666-4752-92cf-ecf9ff32028c/export</guid>
      <pubDate>Tue, 18 Feb 2025 21:56:21 +0000</pubDate>
    </item>
    <item>
      <title>a651b8a6-5ddb-405a-80a6-06512a12ad16</title>
      <link>https://vulnerability.circl.lu/sighting/a651b8a6-5ddb-405a-80a6-06512a12ad16/export</link>
      <description>{"uuid": "a651b8a6-5ddb-405a-80a6-06512a12ad16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114031809855887969", "content": "", "creation_timestamp": "2025-02-19T17:49:02.042908Z"}</description>
      <content:encoded>{"uuid": "a651b8a6-5ddb-405a-80a6-06512a12ad16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56883", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114031809855887969", "content": "", "creation_timestamp": "2025-02-19T17:49:02.042908Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a651b8a6-5ddb-405a-80a6-06512a12ad16/export</guid>
      <pubDate>Wed, 19 Feb 2025 17:49:02 +0000</pubDate>
    </item>
    <item>
      <title>57a944f0-b1e5-49a9-ab98-591a1da6aeb1</title>
      <link>https://vulnerability.circl.lu/sighting/57a944f0-b1e5-49a9-ab98-591a1da6aeb1/export</link>
      <description>{"uuid": "57a944f0-b1e5-49a9-ab98-591a1da6aeb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56889", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7906", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56889\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Incorrect access control in the endpoint /admin/m_delete.php of CodeAstro Complaint Management System v1.0 allows unauthorized attackers to arbitrarily delete complaints via modification of the id parameter.\n\ud83d\udccf Published: 2025-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T14:44:40.063Z\n\ud83d\udd17 References:\n1. https://github.com/vigneshr232/CVE-2024-56889/blob/main/CVE-2024-56889.md", "creation_timestamp": "2025-03-18T14:49:55.000000Z"}</description>
      <content:encoded>{"uuid": "57a944f0-b1e5-49a9-ab98-591a1da6aeb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56889", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7906", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56889\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Incorrect access control in the endpoint /admin/m_delete.php of CodeAstro Complaint Management System v1.0 allows unauthorized attackers to arbitrarily delete complaints via modification of the id parameter.\n\ud83d\udccf Published: 2025-02-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T14:44:40.063Z\n\ud83d\udd17 References:\n1. https://github.com/vigneshr232/CVE-2024-56889/blob/main/CVE-2024-56889.md", "creation_timestamp": "2025-03-18T14:49:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/57a944f0-b1e5-49a9-ab98-591a1da6aeb1/export</guid>
      <pubDate>Tue, 18 Mar 2025 14:49:55 +0000</pubDate>
    </item>
  </channel>
</rss>
