<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T23:17:56.545646+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/03f368e7-65bf-412e-8b99-13e34864ffac/export</id>
    <title>03f368e7-65bf-412e-8b99-13e34864ffac</title>
    <updated>2026-05-10T23:17:56.818478+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "03f368e7-65bf-412e-8b99-13e34864ffac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9977", "content": "#exploit\n1. CVE-2024-23749:\nCommand Injection in KiTTY Get Remote File Through SCP Input\nhttps://blog.defcesco.io/CVE-2024-23749\n\n2. CVE-2024-23724:\nGhost CMS Stored XSS Leading to Owner Takeover\nhttps://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss\n]-&amp;gt; https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724\n\n3. CVE-2024-24386:\nVitalPBX &amp;lt;3.2.5 - Command Injection\nhttps://github.com/erick-duarte/CVE-2024-24386", "creation_timestamp": "2024-02-23T06:29:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/03f368e7-65bf-412e-8b99-13e34864ffac/export"/>
    <published>2024-02-23T06:29:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1abee689-1a59-49e9-85dd-ae81f85dbb00/export</id>
    <title>1abee689-1a59-49e9-85dd-ae81f85dbb00</title>
    <updated>2026-05-10T23:17:56.818390+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1abee689-1a59-49e9-85dd-ae81f85dbb00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "seen", "source": "https://t.me/ctinow/192606", "content": "https://ift.tt/6FY2mrt\nCVE-2024-23746 | Miro Desktop 0.8.18 on macOS Electron code injection", "creation_timestamp": "2024-02-24T14:47:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1abee689-1a59-49e9-85dd-ae81f85dbb00/export"/>
    <published>2024-02-24T14:47:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d720c215-4c7f-46dc-8809-3b6fbf881198/export</id>
    <title>d720c215-4c7f-46dc-8809-3b6fbf881198</title>
    <updated>2026-05-10T23:17:56.818302+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d720c215-4c7f-46dc-8809-3b6fbf881198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/198452", "content": "https://ift.tt/sGbaXrV\nCVE-2024-23749 | KiTTY up to 0.76.1.13 filename command injection (ID 177031)", "creation_timestamp": "2024-03-02T19:21:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d720c215-4c7f-46dc-8809-3b6fbf881198/export"/>
    <published>2024-03-02T19:21:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3a82d6cc-ef8b-44d0-92ab-74e5561c42b7/export</id>
    <title>3a82d6cc-ef8b-44d0-92ab-74e5561c42b7</title>
    <updated>2026-05-10T23:17:56.818218+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3a82d6cc-ef8b-44d0-92ab-74e5561c42b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6859", "content": "https://blog.defcesco.io/CVE-2024-23749\n\nCommand Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)\n#exploit", "creation_timestamp": "2024-06-08T00:13:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3a82d6cc-ef8b-44d0-92ab-74e5561c42b7/export"/>
    <published>2024-06-08T00:13:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d01cf44b-aec7-4c89-93e1-3a77d77209a9/export</id>
    <title>d01cf44b-aec7-4c89-93e1-3a77d77209a9</title>
    <updated>2026-05-10T23:17:56.818136+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d01cf44b-aec7-4c89-93e1-3a77d77209a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/75", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &amp;lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-07-30T07:06:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d01cf44b-aec7-4c89-93e1-3a77d77209a9/export"/>
    <published>2024-07-30T07:06:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0716b3cc-a994-4cb6-84e5-0f7970c3d700/export</id>
    <title>0716b3cc-a994-4cb6-84e5-0f7970c3d700</title>
    <updated>2026-05-10T23:17:56.818049+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0716b3cc-a994-4cb6-84e5-0f7970c3d700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10903", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &amp;lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-07-30T11:01:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0716b3cc-a994-4cb6-84e5-0f7970c3d700/export"/>
    <published>2024-07-30T11:01:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de97f726-cf6c-4921-98bd-3935ab22b224/export</id>
    <title>de97f726-cf6c-4921-98bd-3935ab22b224</title>
    <updated>2026-05-10T23:17:56.817959+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "de97f726-cf6c-4921-98bd-3935ab22b224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2634", "content": "#exploit\n1. CVE-2024-22894:\nWithin heatpump root user\u00a0psw decrypt/crack\nhttps://github.com/Jaarden/CVE-2024-22894\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746\n\n3. CVE-2023-6112:\nChrome content::NavigationURLLoaderImpl::FallbackToNonInterceptedRequest Heap UaF\nhttps://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html", "creation_timestamp": "2024-08-16T09:12:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de97f726-cf6c-4921-98bd-3935ab22b224/export"/>
    <published>2024-08-16T09:12:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/357ba09e-47e2-4490-912c-72b6984afe9b/export</id>
    <title>357ba09e-47e2-4490-912c-72b6984afe9b</title>
    <updated>2026-05-10T23:17:56.817849+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "357ba09e-47e2-4490-912c-72b6984afe9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2665", "content": "#exploit\n1. CVE-2024-22894:\nWithin heatpump root user\u00a0psw decrypt/crack\nhttps://github.com/Jaarden/CVE-2024-22894\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746\n\n3. CVE-2023-6112:\nChrome content::NavigationURLLoaderImpl::FallbackToNonInterceptedRequest Heap UaF\nhttps://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html", "creation_timestamp": "2024-08-16T09:12:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/357ba09e-47e2-4490-912c-72b6984afe9b/export"/>
    <published>2024-08-16T09:12:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a53393d1-7f72-4bcb-b6b8-94a35060e39e/export</id>
    <title>a53393d1-7f72-4bcb-b6b8-94a35060e39e</title>
    <updated>2026-05-10T23:17:56.817707+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a53393d1-7f72-4bcb-b6b8-94a35060e39e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/3510", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &amp;lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-08-16T11:18:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a53393d1-7f72-4bcb-b6b8-94a35060e39e/export"/>
    <published>2024-08-16T11:18:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/04321f78-f3ec-4688-86b0-daf39ee42be9/export</id>
    <title>04321f78-f3ec-4688-86b0-daf39ee42be9</title>
    <updated>2026-05-10T23:17:56.814978+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "04321f78-f3ec-4688-86b0-daf39ee42be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2374", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mjm644xfd72t", "content": "", "creation_timestamp": "2026-04-16T10:08:48.661570Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/04321f78-f3ec-4688-86b0-daf39ee42be9/export"/>
    <published>2026-04-16T10:08:48.661570+00:00</published>
  </entry>
</feed>
