<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T18:14:26.101570+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6413ba06-5608-49ca-8142-3d186e6b561f/export</id>
    <title>6413ba06-5608-49ca-8142-3d186e6b561f</title>
    <updated>2026-05-09T18:14:26.357973+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6413ba06-5608-49ca-8142-3d186e6b561f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48441", "type": "seen", "source": "https://t.me/cvedetector/8825", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48441 - Wuhan Tianyu Information Industry Co., Ltd Tianyu CPE Router Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-48441 \nPublished : Oct. 24, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : Wuhan Tianyu Information Industry Co., Ltd Tianyu CPE Router CommonCPExCPETS_v3.2.468.11.04_P4 was discovered to contain a command injection vulnerability via the component at_command.asp. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:00:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6413ba06-5608-49ca-8142-3d186e6b561f/export"/>
    <published>2024-10-24T21:00:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1825a4c1-a862-4563-afef-9a51b91394ea/export</id>
    <title>1825a4c1-a862-4563-afef-9a51b91394ea</title>
    <updated>2026-05-09T18:14:26.357873+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1825a4c1-a862-4563-afef-9a51b91394ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48448", "type": "seen", "source": "https://t.me/cvedetector/8972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48448 - Huly Platform Arbitrary File Upload RCE\", \n  \"Content\": \"CVE ID : CVE-2024-48448 \nPublished : Oct. 25, 2024, 6:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in Huly Platform v0.6.295 allows attackers to execute arbitrary code via uploading a crafted HTML file into the tracker comments page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T21:16:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1825a4c1-a862-4563-afef-9a51b91394ea/export"/>
    <published>2024-10-25T21:16:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/45739aab-ea92-40ce-ad99-23b95f1064ea/export</id>
    <title>45739aab-ea92-40ce-ad99-23b95f1064ea</title>
    <updated>2026-05-09T18:14:26.357775+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "45739aab-ea92-40ce-ad99-23b95f1064ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947928064913968", "content": "", "creation_timestamp": "2025-02-04T22:16:39.001107Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/45739aab-ea92-40ce-ad99-23b95f1064ea/export"/>
    <published>2025-02-04T22:16:39.001107+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9db76ccf-45ee-4390-8905-aefcd5fcddbd/export</id>
    <title>9db76ccf-45ee-4390-8905-aefcd5fcddbd</title>
    <updated>2026-05-09T18:14:26.357688+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9db76ccf-45ee-4390-8905-aefcd5fcddbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhf6s7p3jw2w", "content": "", "creation_timestamp": "2025-02-04T23:15:47.892031Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9db76ccf-45ee-4390-8905-aefcd5fcddbd/export"/>
    <published>2025-02-04T23:15:47.892031+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3a738bed-77f3-4564-aea5-587859e1116f/export</id>
    <title>3a738bed-77f3-4564-aea5-587859e1116f</title>
    <updated>2026-05-09T18:14:26.357593+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3a738bed-77f3-4564-aea5-587859e1116f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhfjcgnlo22q", "content": "", "creation_timestamp": "2025-02-05T02:23:49.544210Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3a738bed-77f3-4564-aea5-587859e1116f/export"/>
    <published>2025-02-05T02:23:49.544210+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/892e384d-c8da-4c78-92a5-bf10aa6e4261/export</id>
    <title>892e384d-c8da-4c78-92a5-bf10aa6e4261</title>
    <updated>2026-05-09T18:14:26.357483+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "892e384d-c8da-4c78-92a5-bf10aa6e4261", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://t.me/cvedetector/17269", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48445 - Compop.ca ONLINESHOP SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48445 \nPublished : Feb. 4, 2025, 11:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : An issue in compop.ca ONLINE MALL v.3.5.3 allows a remote attacker to execute arbitrary code via the rid, tid, et, and ts parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T03:16:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/892e384d-c8da-4c78-92a5-bf10aa6e4261/export"/>
    <published>2025-02-05T03:16:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2721ec1e-4622-41f2-aecd-2729f1cc439d/export</id>
    <title>2721ec1e-4622-41f2-aecd-2729f1cc439d</title>
    <updated>2026-05-09T18:14:26.357385+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2721ec1e-4622-41f2-aecd-2729f1cc439d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhhhs2yhwb2a", "content": "", "creation_timestamp": "2025-02-05T21:02:07.290637Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2721ec1e-4622-41f2-aecd-2729f1cc439d/export"/>
    <published>2025-02-05T21:02:07.290637+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/df355476-83ac-4edd-abe7-2d43ec52c1c6/export</id>
    <title>df355476-83ac-4edd-abe7-2d43ec52c1c6</title>
    <updated>2026-05-09T18:14:26.357267+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "df355476-83ac-4edd-abe7-2d43ec52c1c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "Telegram/7ylFiB_H_J3n9z4Ee919Lvc5-uNfdW93PTMXzwFsmYzXTSfd", "content": "", "creation_timestamp": "2025-02-06T02:43:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/df355476-83ac-4edd-abe7-2d43ec52c1c6/export"/>
    <published>2025-02-06T02:43:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/27cb2564-33e7-4cde-bf03-f1c616eed0b6/export</id>
    <title>27cb2564-33e7-4cde-bf03-f1c616eed0b6</title>
    <updated>2026-05-09T18:14:26.357126+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "27cb2564-33e7-4cde-bf03-f1c616eed0b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113957962449273262", "content": "", "creation_timestamp": "2025-02-06T16:48:34.262644Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/27cb2564-33e7-4cde-bf03-f1c616eed0b6/export"/>
    <published>2025-02-06T16:48:34.262644+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f018baf8-7990-41b5-bb2f-59afd16ffb21/export</id>
    <title>f018baf8-7990-41b5-bb2f-59afd16ffb21</title>
    <updated>2026-05-09T18:14:26.354313+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f018baf8-7990-41b5-bb2f-59afd16ffb21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ln4jeme2ep27", "content": "", "creation_timestamp": "2025-04-18T21:02:16.038477Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f018baf8-7990-41b5-bb2f-59afd16ffb21/export"/>
    <published>2025-04-18T21:02:16.038477+00:00</published>
  </entry>
</feed>
