<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T17:40:59.243119+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4db97b54-cc5c-4bb9-b47d-936de62f1fe9/export</id>
    <title>4db97b54-cc5c-4bb9-b47d-936de62f1fe9</title>
    <updated>2026-05-10T17:40:59.510694+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4db97b54-cc5c-4bb9-b47d-936de62f1fe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47392", "type": "seen", "source": "https://t.me/cvedetector/7089", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47392 - BdThemes Element Pack Elementor Addons Stored Cross-site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47392 \nPublished : Oct. 5, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BdThemes Element Pack Elementor Addons allows Stored XSS.This issue affects Element Pack Elementor Addons: from n/a through 5.7.5. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T17:58:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4db97b54-cc5c-4bb9-b47d-936de62f1fe9/export"/>
    <published>2024-10-05T17:58:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ac98aab7-c04c-49d7-9f10-8561c690f1ef/export</id>
    <title>ac98aab7-c04c-49d7-9f10-8561c690f1ef</title>
    <updated>2026-05-10T17:40:59.510549+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ac98aab7-c04c-49d7-9f10-8561c690f1ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47394", "type": "seen", "source": "https://t.me/cvedetector/7091", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47394 - Eyecix JobSearch Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-47394 \nPublished : Oct. 5, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in eyecix JobSearch allows Reflected XSS.This issue affects JobSearch: from n/a through 2.5.9. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T17:58:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ac98aab7-c04c-49d7-9f10-8561c690f1ef/export"/>
    <published>2024-10-05T17:58:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/24a10b0b-b115-4567-bc6d-119580321df6/export</id>
    <title>24a10b0b-b115-4567-bc6d-119580321df6</title>
    <updated>2026-05-10T17:40:59.510420+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "24a10b0b-b115-4567-bc6d-119580321df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47395", "type": "seen", "source": "https://t.me/cvedetector/7092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47395 - Robokassa Woocommerce Reflected XSS\", \n  \"Content\": \"CVE ID : CVE-2024-47395 \nPublished : Oct. 5, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Robokassa Robokassa payment gateway for Woocommerce allows Reflected XSS.This issue affects Robokassa payment gateway for Woocommerce: from n/a through 1.6.1. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T17:58:13.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/24a10b0b-b115-4567-bc6d-119580321df6/export"/>
    <published>2024-10-05T17:58:13+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/043409f7-d33f-4142-831b-03cea2f27f54/export</id>
    <title>043409f7-d33f-4142-831b-03cea2f27f54</title>
    <updated>2026-05-10T17:40:59.510291+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "043409f7-d33f-4142-831b-03cea2f27f54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4739", "type": "seen", "source": "https://t.me/cvedetector/8306", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4739 - MXsecurity Authenticated Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-4739 \nPublished : Oct. 18, 2024, 9:15 a.m. | 29\u00a0minutes ago \nDescription : The lack of access restriction to a resource from unauthorized users makes MXsecurity software versions v1.1.0 and prior vulnerable. By acquiring a valid authenticator, an attacker can pose as an authorized user and successfully access the resource. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-18T11:54:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/043409f7-d33f-4142-831b-03cea2f27f54/export"/>
    <published>2024-10-18T11:54:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/79287eae-b8e4-4d0d-8db7-92f71ee24414/export</id>
    <title>79287eae-b8e4-4d0d-8db7-92f71ee24414</title>
    <updated>2026-05-10T17:40:59.510155+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "79287eae-b8e4-4d0d-8db7-92f71ee24414", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47397", "type": "seen", "source": "https://t.me/cvedetector/13174", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47397 - AE1021/AE1021PE Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47397 \nPublished : Dec. 18, 2024, 7:15 a.m. | 24\u00a0minutes ago \nDescription : Weak authentication issue exists in AE1021 firmware versions 2.0.10 and earlier and AE1021PE firmware versions 2.0.10 and earlier. If this vulnerability is exploited, the authentication may be bypassed with an undocumented specific string. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T08:40:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/79287eae-b8e4-4d0d-8db7-92f71ee24414/export"/>
    <published>2024-12-18T08:40:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/773eb516-61d8-45df-bd28-e0b62d148da3/export</id>
    <title>773eb516-61d8-45df-bd28-e0b62d148da3</title>
    <updated>2026-05-10T17:40:59.510022+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "773eb516-61d8-45df-bd28-e0b62d148da3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113786024577853273", "content": "", "creation_timestamp": "2025-01-07T08:02:28.007940Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/773eb516-61d8-45df-bd28-e0b62d148da3/export"/>
    <published>2025-01-07T08:02:28.007940+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/30c0c3e5-945f-4bf2-80f6-e833a11f8c00/export</id>
    <title>30c0c3e5-945f-4bf2-80f6-e833a11f8c00</title>
    <updated>2026-05-10T17:40:59.509885+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "30c0c3e5-945f-4bf2-80f6-e833a11f8c00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf57hlrnae22", "content": "", "creation_timestamp": "2025-01-07T08:16:03.835371Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/30c0c3e5-945f-4bf2-80f6-e833a11f8c00/export"/>
    <published>2025-01-07T08:16:03.835371+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6e5cedec-19d6-4507-91ff-d185126da221/export</id>
    <title>6e5cedec-19d6-4507-91ff-d185126da221</title>
    <updated>2026-05-10T17:40:59.509742+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6e5cedec-19d6-4507-91ff-d185126da221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/381", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47398\n\ud83d\udd39 Description: in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write.\n\ud83d\udccf Published: 2025-01-07T07:57:02.974Z\n\ud83d\udccf Modified: 2025-01-07T07:57:02.974Z\n\ud83d\udd17 References:\n1. https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-01.md", "creation_timestamp": "2025-01-07T08:39:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6e5cedec-19d6-4507-91ff-d185126da221/export"/>
    <published>2025-01-07T08:39:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c77362a3-e073-4c49-85e1-18f76b9c3401/export</id>
    <title>c77362a3-e073-4c49-85e1-18f76b9c3401</title>
    <updated>2026-05-10T17:40:59.509563+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c77362a3-e073-4c49-85e1-18f76b9c3401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113786206198889937", "content": "", "creation_timestamp": "2025-01-07T08:48:39.185764Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c77362a3-e073-4c49-85e1-18f76b9c3401/export"/>
    <published>2025-01-07T08:48:39.185764+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/69576c51-c9fd-4d13-b841-7b7697fc5824/export</id>
    <title>69576c51-c9fd-4d13-b841-7b7697fc5824</title>
    <updated>2026-05-10T17:40:59.504951+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "69576c51-c9fd-4d13-b841-7b7697fc5824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47398", "type": "seen", "source": "https://t.me/cvedetector/14496", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47398 - OpenHarmony Boot Problematic OUT-of-Bounds Write\", \n  \"Content\": \"CVE ID : CVE-2024-47398 \nPublished : Jan. 7, 2025, 8:15 a.m. | 20\u00a0minutes ago \nDescription : in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T09:41:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/69576c51-c9fd-4d13-b841-7b7697fc5824/export"/>
    <published>2025-01-07T09:41:17+00:00</published>
  </entry>
</feed>
