<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 11:38:20 +0000</lastBuildDate>
    <item>
      <title>7c467e37-a726-4882-8ba5-474723f901f3</title>
      <link>https://vulnerability.circl.lu/sighting/7c467e37-a726-4882-8ba5-474723f901f3/export</link>
      <description>{"uuid": "7c467e37-a726-4882-8ba5-474723f901f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57490", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8344", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57490\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Guangzhou Hongfan Technology Co., LTD. iOffice20 has any user login vulnerability. An attacker can log in to any system account including the system administrator through a logical flaw.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T13:34:14.952Z\n\ud83d\udd17 References:\n1. https://www.ioffice.cn\n2. https://gist.github.com/NaliangzzZ/44bfcc1d9c2cf275d2b6683ca9e20980", "creation_timestamp": "2025-03-21T14:19:20.000000Z"}</description>
      <content:encoded>{"uuid": "7c467e37-a726-4882-8ba5-474723f901f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57490", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8344", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57490\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Guangzhou Hongfan Technology Co., LTD. iOffice20 has any user login vulnerability. An attacker can log in to any system account including the system administrator through a logical flaw.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T13:34:14.952Z\n\ud83d\udd17 References:\n1. https://www.ioffice.cn\n2. https://gist.github.com/NaliangzzZ/44bfcc1d9c2cf275d2b6683ca9e20980", "creation_timestamp": "2025-03-21T14:19:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c467e37-a726-4882-8ba5-474723f901f3/export</guid>
      <pubDate>Fri, 21 Mar 2025 14:19:20 +0000</pubDate>
    </item>
    <item>
      <title>8e596b1e-310b-44fe-aed3-685121c0da2c</title>
      <link>https://vulnerability.circl.lu/sighting/8e596b1e-310b-44fe-aed3-685121c0da2c/export</link>
      <description>{"uuid": "8e596b1e-310b-44fe-aed3-685121c0da2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57490", "type": "seen", "source": "https://t.me/cvedetector/20811", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57490 - Guangzhou Hongfan Technology Co., LTD. iOffice20 Login Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57490 \nPublished : March 21, 2025, 2:15 p.m. | 27\u00a0minutes ago \nDescription : Guangzhou Hongfan Technology Co., LTD. iOffice20 has any user login vulnerability. An attacker can log in to any system account including the system administrator through a logical flaw. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T15:58:41.000000Z"}</description>
      <content:encoded>{"uuid": "8e596b1e-310b-44fe-aed3-685121c0da2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57490", "type": "seen", "source": "https://t.me/cvedetector/20811", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57490 - Guangzhou Hongfan Technology Co., LTD. iOffice20 Login Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57490 \nPublished : March 21, 2025, 2:15 p.m. | 27\u00a0minutes ago \nDescription : Guangzhou Hongfan Technology Co., LTD. iOffice20 has any user login vulnerability. An attacker can log in to any system account including the system administrator through a logical flaw. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T15:58:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8e596b1e-310b-44fe-aed3-685121c0da2c/export</guid>
      <pubDate>Fri, 21 Mar 2025 15:58:41 +0000</pubDate>
    </item>
    <item>
      <title>c3a09dfb-1399-40c1-868e-12a05152a0bd</title>
      <link>https://vulnerability.circl.lu/sighting/c3a09dfb-1399-40c1-868e-12a05152a0bd/export</link>
      <description>{"uuid": "c3a09dfb-1399-40c1-868e-12a05152a0bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57493", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12536", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57493\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in redoxOS relibc before commit 98aa4ea5 allows a local attacker to cause a denial of service via the setsockopt function.\n\ud83d\udccf Published: 2025-04-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T19:21:13.002Z\n\ud83d\udd17 References:\n1. https://gitlab.redox-os.org/redox-os/relibc/-/issues/201\n2. https://gitlab.redox-os.org/redox-os/relibc/-/merge_requests/566\n3. https://github.com/Marsman1996/pocs/tree/master/redox/CVE-2024-57493", "creation_timestamp": "2025-04-18T19:59:09.000000Z"}</description>
      <content:encoded>{"uuid": "c3a09dfb-1399-40c1-868e-12a05152a0bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57493", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12536", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57493\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in redoxOS relibc before commit 98aa4ea5 allows a local attacker to cause a denial of service via the setsockopt function.\n\ud83d\udccf Published: 2025-04-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T19:21:13.002Z\n\ud83d\udd17 References:\n1. https://gitlab.redox-os.org/redox-os/relibc/-/issues/201\n2. https://gitlab.redox-os.org/redox-os/relibc/-/merge_requests/566\n3. https://github.com/Marsman1996/pocs/tree/master/redox/CVE-2024-57493", "creation_timestamp": "2025-04-18T19:59:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c3a09dfb-1399-40c1-868e-12a05152a0bd/export</guid>
      <pubDate>Fri, 18 Apr 2025 19:59:09 +0000</pubDate>
    </item>
    <item>
      <title>57732170-2f41-4ddd-80f0-0efa04f34440</title>
      <link>https://vulnerability.circl.lu/sighting/57732170-2f41-4ddd-80f0-0efa04f34440/export</link>
      <description>{"uuid": "57732170-2f41-4ddd-80f0-0efa04f34440", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57493", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln4hrghkyl2h", "content": "", "creation_timestamp": "2025-04-18T20:33:42.859892Z"}</description>
      <content:encoded>{"uuid": "57732170-2f41-4ddd-80f0-0efa04f34440", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57493", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln4hrghkyl2h", "content": "", "creation_timestamp": "2025-04-18T20:33:42.859892Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/57732170-2f41-4ddd-80f0-0efa04f34440/export</guid>
      <pubDate>Fri, 18 Apr 2025 20:33:42 +0000</pubDate>
    </item>
    <item>
      <title>56f0e273-47b5-4c20-bd28-c56cdbc773dd</title>
      <link>https://vulnerability.circl.lu/sighting/56f0e273-47b5-4c20-bd28-c56cdbc773dd/export</link>
      <description>{"uuid": "56f0e273-47b5-4c20-bd28-c56cdbc773dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57493", "type": "seen", "source": "https://t.me/cvedetector/23349", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57493 - RedoxOS Relibc Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57493 \nPublished : April 18, 2025, 8:15 p.m. | 29\u00a0minutes ago \nDescription : An issue in redoxOS relibc before commit 98aa4ea5 allows a local attacker to cause a denial of service via the setsockopt function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T23:16:13.000000Z"}</description>
      <content:encoded>{"uuid": "56f0e273-47b5-4c20-bd28-c56cdbc773dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57493", "type": "seen", "source": "https://t.me/cvedetector/23349", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57493 - RedoxOS Relibc Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57493 \nPublished : April 18, 2025, 8:15 p.m. | 29\u00a0minutes ago \nDescription : An issue in redoxOS relibc before commit 98aa4ea5 allows a local attacker to cause a denial of service via the setsockopt function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T23:16:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/56f0e273-47b5-4c20-bd28-c56cdbc773dd/export</guid>
      <pubDate>Fri, 18 Apr 2025 23:16:13 +0000</pubDate>
    </item>
    <item>
      <title>ddc2e90c-68cc-49be-b10e-2698900f0f7e</title>
      <link>https://vulnerability.circl.lu/sighting/ddc2e90c-68cc-49be-b10e-2698900f0f7e/export</link>
      <description>{"uuid": "ddc2e90c-68cc-49be-b10e-2698900f0f7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57493", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ln4ryiuugmm2", "content": "", "creation_timestamp": "2025-04-18T23:36:37.575859Z"}</description>
      <content:encoded>{"uuid": "ddc2e90c-68cc-49be-b10e-2698900f0f7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57493", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ln4ryiuugmm2", "content": "", "creation_timestamp": "2025-04-18T23:36:37.575859Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ddc2e90c-68cc-49be-b10e-2698900f0f7e/export</guid>
      <pubDate>Fri, 18 Apr 2025 23:36:37 +0000</pubDate>
    </item>
    <item>
      <title>e8fc5e81-5d78-45a2-b51d-1dfcef28cabd</title>
      <link>https://vulnerability.circl.lu/sighting/e8fc5e81-5d78-45a2-b51d-1dfcef28cabd/export</link>
      <description>{"uuid": "e8fc5e81-5d78-45a2-b51d-1dfcef28cabd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57490", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}</description>
      <content:encoded>{"uuid": "e8fc5e81-5d78-45a2-b51d-1dfcef28cabd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57490", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e8fc5e81-5d78-45a2-b51d-1dfcef28cabd/export</guid>
      <pubDate>Mon, 11 Aug 2025 18:27:49 +0000</pubDate>
    </item>
    <item>
      <title>447ff532-7bc0-42b1-9c97-b3295428fa3b</title>
      <link>https://vulnerability.circl.lu/sighting/447ff532-7bc0-42b1-9c97-b3295428fa3b/export</link>
      <description>{"uuid": "447ff532-7bc0-42b1-9c97-b3295428fa3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57491", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lwu2uumy2l2a", "content": "", "creation_timestamp": "2025-08-20T18:33:32.425155Z"}</description>
      <content:encoded>{"uuid": "447ff532-7bc0-42b1-9c97-b3295428fa3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57491", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lwu2uumy2l2a", "content": "", "creation_timestamp": "2025-08-20T18:33:32.425155Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/447ff532-7bc0-42b1-9c97-b3295428fa3b/export</guid>
      <pubDate>Wed, 20 Aug 2025 18:33:32 +0000</pubDate>
    </item>
    <item>
      <title>e0e4910d-3da0-4550-9294-d31c1b286965</title>
      <link>https://vulnerability.circl.lu/sighting/e0e4910d-3da0-4550-9294-d31c1b286965/export</link>
      <description>{"uuid": "e0e4910d-3da0-4550-9294-d31c1b286965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57497", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lxatiypqxc2u", "content": "", "creation_timestamp": "2025-08-25T20:26:17.229305Z"}</description>
      <content:encoded>{"uuid": "e0e4910d-3da0-4550-9294-d31c1b286965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57497", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lxatiypqxc2u", "content": "", "creation_timestamp": "2025-08-25T20:26:17.229305Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e0e4910d-3da0-4550-9294-d31c1b286965/export</guid>
      <pubDate>Mon, 25 Aug 2025 20:26:17 +0000</pubDate>
    </item>
    <item>
      <title>f6699a53-dc05-442a-9740-4d2c17902a03</title>
      <link>https://vulnerability.circl.lu/sighting/f6699a53-dc05-442a-9740-4d2c17902a03/export</link>
      <description>{"uuid": "f6699a53-dc05-442a-9740-4d2c17902a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5749", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mfml3hvdcr24", "content": "", "creation_timestamp": "2026-02-24T16:20:10.267833Z"}</description>
      <content:encoded>{"uuid": "f6699a53-dc05-442a-9740-4d2c17902a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5749", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mfml3hvdcr24", "content": "", "creation_timestamp": "2026-02-24T16:20:10.267833Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f6699a53-dc05-442a-9740-4d2c17902a03/export</guid>
      <pubDate>Tue, 24 Feb 2026 16:20:10 +0000</pubDate>
    </item>
  </channel>
</rss>
