<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:21:47 +0000</lastBuildDate>
    <item>
      <title>0c82ed98-ffc7-453c-8a73-406482769de4</title>
      <link>https://vulnerability.circl.lu/sighting/0c82ed98-ffc7-453c-8a73-406482769de4/export</link>
      <description>{"uuid": "0c82ed98-ffc7-453c-8a73-406482769de4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57031", "type": "seen", "source": "https://t.me/cvedetector/15735", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57031 - WeGIA SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57031 \nPublished : Jan. 17, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : WeGIA &amp;lt; 3.2.0 is vulnerable to SQL Injection in /funcionario/remuneracao.php via the id_funcionario parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T21:48:56.000000Z"}</description>
      <content:encoded>{"uuid": "0c82ed98-ffc7-453c-8a73-406482769de4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57031", "type": "seen", "source": "https://t.me/cvedetector/15735", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57031 - WeGIA SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57031 \nPublished : Jan. 17, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : WeGIA &amp;lt; 3.2.0 is vulnerable to SQL Injection in /funcionario/remuneracao.php via the id_funcionario parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T21:48:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0c82ed98-ffc7-453c-8a73-406482769de4/export</guid>
      <pubDate>Fri, 17 Jan 2025 21:48:56 +0000</pubDate>
    </item>
    <item>
      <title>aa07b444-0e19-4f1c-97ba-a8f384396316</title>
      <link>https://vulnerability.circl.lu/sighting/aa07b444-0e19-4f1c-97ba-a8f384396316/export</link>
      <description>{"uuid": "aa07b444-0e19-4f1c-97ba-a8f384396316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57032", "type": "seen", "source": "https://t.me/cvedetector/15736", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57032 - WeGIA Password Change Insecure Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57032 \nPublished : Jan. 17, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : WeGIA &amp;lt; 3.2.0 is vulnerable to Incorrect Access Control in controle/control.php. The application does not validate the value of the old password, so it is possible to change the password by placing any value in the senha_antiga field. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T21:48:57.000000Z"}</description>
      <content:encoded>{"uuid": "aa07b444-0e19-4f1c-97ba-a8f384396316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57032", "type": "seen", "source": "https://t.me/cvedetector/15736", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57032 - WeGIA Password Change Insecure Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57032 \nPublished : Jan. 17, 2025, 8:15 p.m. | 26\u00a0minutes ago \nDescription : WeGIA &amp;lt; 3.2.0 is vulnerable to Incorrect Access Control in controle/control.php. The application does not validate the value of the old password, so it is possible to change the password by placing any value in the senha_antiga field. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T21:48:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aa07b444-0e19-4f1c-97ba-a8f384396316/export</guid>
      <pubDate>Fri, 17 Jan 2025 21:48:57 +0000</pubDate>
    </item>
    <item>
      <title>af0dac04-1022-44cb-84b2-c6ba2972cae8</title>
      <link>https://vulnerability.circl.lu/sighting/af0dac04-1022-44cb-84b2-c6ba2972cae8/export</link>
      <description>{"uuid": "af0dac04-1022-44cb-84b2-c6ba2972cae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57033", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxudgvpa22u", "content": "", "creation_timestamp": "2025-01-17T22:38:46.639309Z"}</description>
      <content:encoded>{"uuid": "af0dac04-1022-44cb-84b2-c6ba2972cae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57033", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxudgvpa22u", "content": "", "creation_timestamp": "2025-01-17T22:38:46.639309Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/af0dac04-1022-44cb-84b2-c6ba2972cae8/export</guid>
      <pubDate>Fri, 17 Jan 2025 22:38:46 +0000</pubDate>
    </item>
    <item>
      <title>f2f6f1a5-e9ec-4f34-8da8-9a2bac40d94b</title>
      <link>https://vulnerability.circl.lu/sighting/f2f6f1a5-e9ec-4f34-8da8-9a2bac40d94b/export</link>
      <description>{"uuid": "f2f6f1a5-e9ec-4f34-8da8-9a2bac40d94b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "seen", "source": "https://t.me/cvedetector/15744", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57035 - WeGIA SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57035 \nPublished : Jan. 17, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : WeGIA v3.2.0 is vulnerable to SQL Injection viathe nextPage parameter in /controle/control.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T22:39:14.000000Z"}</description>
      <content:encoded>{"uuid": "f2f6f1a5-e9ec-4f34-8da8-9a2bac40d94b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "seen", "source": "https://t.me/cvedetector/15744", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57035 - WeGIA SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57035 \nPublished : Jan. 17, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : WeGIA v3.2.0 is vulnerable to SQL Injection viathe nextPage parameter in /controle/control.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T22:39:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2f6f1a5-e9ec-4f34-8da8-9a2bac40d94b/export</guid>
      <pubDate>Fri, 17 Jan 2025 22:39:14 +0000</pubDate>
    </item>
    <item>
      <title>8c556ff6-5565-468b-84df-c0627b4fe57a</title>
      <link>https://vulnerability.circl.lu/sighting/8c556ff6-5565-468b-84df-c0627b4fe57a/export</link>
      <description>{"uuid": "8c556ff6-5565-468b-84df-c0627b4fe57a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57033", "type": "seen", "source": "https://t.me/cvedetector/15748", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57033 - WeGIA Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-57033 \nPublished : Jan. 17, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : WeGIA &amp;lt; 3.2.0 is vulnerable to Cross Site Scripting (XSS) via the dados_addInfo parameter of documentos_funcionario.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T22:39:20.000000Z"}</description>
      <content:encoded>{"uuid": "8c556ff6-5565-468b-84df-c0627b4fe57a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57033", "type": "seen", "source": "https://t.me/cvedetector/15748", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57033 - WeGIA Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-57033 \nPublished : Jan. 17, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : WeGIA &amp;lt; 3.2.0 is vulnerable to Cross Site Scripting (XSS) via the dados_addInfo parameter of documentos_funcionario.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T22:39:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8c556ff6-5565-468b-84df-c0627b4fe57a/export</guid>
      <pubDate>Fri, 17 Jan 2025 22:39:20 +0000</pubDate>
    </item>
    <item>
      <title>5c394331-4996-4d5f-9e0c-1b3e17e4613e</title>
      <link>https://vulnerability.circl.lu/sighting/5c394331-4996-4d5f-9e0c-1b3e17e4613e/export</link>
      <description>{"uuid": "5c394331-4996-4d5f-9e0c-1b3e17e4613e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxuf7s6t42g", "content": "", "creation_timestamp": "2025-01-17T22:39:46.433280Z"}</description>
      <content:encoded>{"uuid": "5c394331-4996-4d5f-9e0c-1b3e17e4613e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57035", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxuf7s6t42g", "content": "", "creation_timestamp": "2025-01-17T22:39:46.433280Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5c394331-4996-4d5f-9e0c-1b3e17e4613e/export</guid>
      <pubDate>Fri, 17 Jan 2025 22:39:46 +0000</pubDate>
    </item>
    <item>
      <title>6c132baa-27f9-42b3-ab6f-f16bd6fe6bd7</title>
      <link>https://vulnerability.circl.lu/sighting/6c132baa-27f9-42b3-ab6f-f16bd6fe6bd7/export</link>
      <description>{"uuid": "6c132baa-27f9-42b3-ab6f-f16bd6fe6bd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113867210977785280", "content": "", "creation_timestamp": "2025-01-21T16:09:14.122539Z"}</description>
      <content:encoded>{"uuid": "6c132baa-27f9-42b3-ab6f-f16bd6fe6bd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113867210977785280", "content": "", "creation_timestamp": "2025-01-21T16:09:14.122539Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6c132baa-27f9-42b3-ab6f-f16bd6fe6bd7/export</guid>
      <pubDate>Tue, 21 Jan 2025 16:09:14 +0000</pubDate>
    </item>
    <item>
      <title>6ca7d738-b18c-4662-9c7b-cac73d9ffcf4</title>
      <link>https://vulnerability.circl.lu/sighting/6ca7d738-b18c-4662-9c7b-cac73d9ffcf4/export</link>
      <description>{"uuid": "6ca7d738-b18c-4662-9c7b-cac73d9ffcf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbasokhwy2b", "content": "", "creation_timestamp": "2025-01-21T16:15:59.963739Z"}</description>
      <content:encoded>{"uuid": "6ca7d738-b18c-4662-9c7b-cac73d9ffcf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbasokhwy2b", "content": "", "creation_timestamp": "2025-01-21T16:15:59.963739Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6ca7d738-b18c-4662-9c7b-cac73d9ffcf4/export</guid>
      <pubDate>Tue, 21 Jan 2025 16:15:59 +0000</pubDate>
    </item>
    <item>
      <title>13d2a510-d882-4c45-92a6-de610fc1244f</title>
      <link>https://vulnerability.circl.lu/sighting/13d2a510-d882-4c45-92a6-de610fc1244f/export</link>
      <description>{"uuid": "13d2a510-d882-4c45-92a6-de610fc1244f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbcotdfpr2q", "content": "", "creation_timestamp": "2025-01-21T16:49:38.777527Z"}</description>
      <content:encoded>{"uuid": "13d2a510-d882-4c45-92a6-de610fc1244f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbcotdfpr2q", "content": "", "creation_timestamp": "2025-01-21T16:49:38.777527Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/13d2a510-d882-4c45-92a6-de610fc1244f/export</guid>
      <pubDate>Tue, 21 Jan 2025 16:49:38 +0000</pubDate>
    </item>
    <item>
      <title>3c6495be-228e-483f-afc3-42cddd20873e</title>
      <link>https://vulnerability.circl.lu/sighting/3c6495be-228e-483f-afc3-42cddd20873e/export</link>
      <description>{"uuid": "3c6495be-228e-483f-afc3-42cddd20873e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://t.me/cvedetector/15976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57036 - TOTOLINK A810R Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57036 \nPublished : Jan. 21, 2025, 4:15 p.m. | 25\u00a0minutes ago \nDescription : TOTOLINK A810R V4.1.2cu.5032_B20200407 was found to contain a command insertion vulnerability in downloadFile.cgi main function. This vulnerability allows an attacker to execute arbitrary commands by sending HTTP request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T17:48:28.000000Z"}</description>
      <content:encoded>{"uuid": "3c6495be-228e-483f-afc3-42cddd20873e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://t.me/cvedetector/15976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57036 - TOTOLINK A810R Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57036 \nPublished : Jan. 21, 2025, 4:15 p.m. | 25\u00a0minutes ago \nDescription : TOTOLINK A810R V4.1.2cu.5032_B20200407 was found to contain a command insertion vulnerability in downloadFile.cgi main function. This vulnerability allows an attacker to execute arbitrary commands by sending HTTP request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T17:48:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3c6495be-228e-483f-afc3-42cddd20873e/export</guid>
      <pubDate>Tue, 21 Jan 2025 17:48:28 +0000</pubDate>
    </item>
  </channel>
</rss>
