<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 08:26:53 +0000</lastBuildDate>
    <item>
      <title>3139a75a-bcbb-4bd9-ae50-d09e6d2be456</title>
      <link>https://vulnerability.circl.lu/sighting/3139a75a-bcbb-4bd9-ae50-d09e6d2be456/export</link>
      <description>{"uuid": "3139a75a-bcbb-4bd9-ae50-d09e6d2be456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "seen", "source": "https://t.me/cvedetector/6101", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9043 - Cellopoint Secure Email Gateway Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9043 \nPublished : Sept. 20, 2024, 11:15 a.m. | 31\u00a0minutes ago \nDescription : Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing authentication and obtaining system administrator privileges. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T13:54:11.000000Z"}</description>
      <content:encoded>{"uuid": "3139a75a-bcbb-4bd9-ae50-d09e6d2be456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "seen", "source": "https://t.me/cvedetector/6101", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9043 - Cellopoint Secure Email Gateway Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9043 \nPublished : Sept. 20, 2024, 11:15 a.m. | 31\u00a0minutes ago \nDescription : Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing authentication and obtaining system administrator privileges. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T13:54:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3139a75a-bcbb-4bd9-ae50-d09e6d2be456/export</guid>
      <pubDate>Fri, 20 Sep 2024 13:54:11 +0000</pubDate>
    </item>
    <item>
      <title>30d6ff3c-d201-4026-abba-1fd0848c5d10</title>
      <link>https://vulnerability.circl.lu/sighting/30d6ff3c-d201-4026-abba-1fd0848c5d10/export</link>
      <description>{"uuid": "30d6ff3c-d201-4026-abba-1fd0848c5d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "seen", "source": "https://t.me/HackingInsights/14183", "content": "\u200aCVE-2024-9043 (CVSS 9.8): Cellopoint Secure Email Gateway Flaw Puts Sensitive Data at Risk\n\nhttps://securityonline.info/cve-2024-9043-cvss-9-8-cellopoint-secure-email-gateway-flaw-puts-sensitive-data-at-risk/", "creation_timestamp": "2024-09-24T10:52:18.000000Z"}</description>
      <content:encoded>{"uuid": "30d6ff3c-d201-4026-abba-1fd0848c5d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "seen", "source": "https://t.me/HackingInsights/14183", "content": "\u200aCVE-2024-9043 (CVSS 9.8): Cellopoint Secure Email Gateway Flaw Puts Sensitive Data at Risk\n\nhttps://securityonline.info/cve-2024-9043-cvss-9-8-cellopoint-secure-email-gateway-flaw-puts-sensitive-data-at-risk/", "creation_timestamp": "2024-09-24T10:52:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/30d6ff3c-d201-4026-abba-1fd0848c5d10/export</guid>
      <pubDate>Tue, 24 Sep 2024 10:52:18 +0000</pubDate>
    </item>
    <item>
      <title>0f4199bc-2740-4d95-ac12-01c39476fbb4</title>
      <link>https://vulnerability.circl.lu/sighting/0f4199bc-2740-4d95-ac12-01c39476fbb4/export</link>
      <description>{"uuid": "0f4199bc-2740-4d95-ac12-01c39476fbb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1340", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T13:30:44.000000Z"}</description>
      <content:encoded>{"uuid": "0f4199bc-2740-4d95-ac12-01c39476fbb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1340", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T13:30:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0f4199bc-2740-4d95-ac12-01c39476fbb4/export</guid>
      <pubDate>Wed, 25 Sep 2024 13:30:44 +0000</pubDate>
    </item>
    <item>
      <title>f63f7593-2419-49f2-93e0-4f7534a65b85</title>
      <link>https://vulnerability.circl.lu/sighting/f63f7593-2419-49f2-93e0-4f7534a65b85/export</link>
      <description>{"uuid": "f63f7593-2419-49f2-93e0-4f7534a65b85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/4491", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T13:30:44.000000Z"}</description>
      <content:encoded>{"uuid": "f63f7593-2419-49f2-93e0-4f7534a65b85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/4491", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T13:30:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f63f7593-2419-49f2-93e0-4f7534a65b85/export</guid>
      <pubDate>Wed, 25 Sep 2024 13:30:44 +0000</pubDate>
    </item>
    <item>
      <title>ecc12e55-cfe4-4085-9905-3ef134e7c6d8</title>
      <link>https://vulnerability.circl.lu/sighting/ecc12e55-cfe4-4085-9905-3ef134e7c6d8/export</link>
      <description>{"uuid": "ecc12e55-cfe4-4085-9905-3ef134e7c6d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/447", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T14:59:40.000000Z"}</description>
      <content:encoded>{"uuid": "ecc12e55-cfe4-4085-9905-3ef134e7c6d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/447", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T14:59:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ecc12e55-cfe4-4085-9905-3ef134e7c6d8/export</guid>
      <pubDate>Wed, 25 Sep 2024 14:59:40 +0000</pubDate>
    </item>
    <item>
      <title>13a8d65e-db72-4021-a50c-fa027aa85ac8</title>
      <link>https://vulnerability.circl.lu/sighting/13a8d65e-db72-4021-a50c-fa027aa85ac8/export</link>
      <description>{"uuid": "13a8d65e-db72-4021-a50c-fa027aa85ac8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11189", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T22:02:36.000000Z"}</description>
      <content:encoded>{"uuid": "13a8d65e-db72-4021-a50c-fa027aa85ac8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9043", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11189", "content": "#exploit\n1. CVE-2024-9043:\nCellopoint Secure Email Gateway - Buffer Overflow in authentication process\nhttps://github.com/maybeheisenberg/CVE-2024-9043\n\n2. CVE-2024-7120:\nRaisecom Command Injection\nhttps://github.com/codeb0ss/CVE-2024-7120-PoC\n]-&amp;gt; https://github.com/fa-rrel/CVE-2024-7120\n\n3. CVE-2024-20439/\nCVE-2024-20440:\nCisco Smart Licensing Utility Static Credential/Information Disclosure\nhttps://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html", "creation_timestamp": "2024-09-25T22:02:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/13a8d65e-db72-4021-a50c-fa027aa85ac8/export</guid>
      <pubDate>Wed, 25 Sep 2024 22:02:36 +0000</pubDate>
    </item>
  </channel>
</rss>
