<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T03:17:33.841191+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9e5077d7-d46d-4d34-a24f-bbecc4fb20bb/export</id>
    <title>9e5077d7-d46d-4d34-a24f-bbecc4fb20bb</title>
    <updated>2026-05-10T03:17:34.255597+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9e5077d7-d46d-4d34-a24f-bbecc4fb20bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50989", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113464913774418226", "content": "", "creation_timestamp": "2024-11-11T14:59:45.707273Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9e5077d7-d46d-4d34-a24f-bbecc4fb20bb/export"/>
    <published>2024-11-11T14:59:45.707273+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c666aa8a-11bc-4b77-9615-ddfb61f8de66/export</id>
    <title>c666aa8a-11bc-4b77-9615-ddfb61f8de66</title>
    <updated>2026-05-10T03:17:34.255499+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c666aa8a-11bc-4b77-9615-ddfb61f8de66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50989", "type": "seen", "source": "https://t.me/cvedetector/10504", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50989 - PHPGurukul Online Marriage Registration System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-50989 \nPublished : Nov. 11, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : A SQL injection vulnerability in /omrs/admin/search.php in PHPGurukul Online Marriage Registration System v1.0 allows an attacker to execute arbitrary SQL commands via the \"searchdata \" parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T16:56:27.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c666aa8a-11bc-4b77-9615-ddfb61f8de66/export"/>
    <published>2024-11-11T16:56:27+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b49a82ee-dc21-42a5-823d-caee5dcc6648/export</id>
    <title>b49a82ee-dc21-42a5-823d-caee5dcc6648</title>
    <updated>2026-05-10T03:17:34.255400+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b49a82ee-dc21-42a5-823d-caee5dcc6648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50986", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/6954", "content": "\ud83d\udea8CVE-2024-50986: DLL Hijacking Exploit for Clementine\n\nhttps://darkwebinformer.com/cve-20224-50986-dll-hijacking-exploit-for-clementine/", "creation_timestamp": "2024-11-13T19:01:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b49a82ee-dc21-42a5-823d-caee5dcc6648/export"/>
    <published>2024-11-13T19:01:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84/export</id>
    <title>f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84</title>
    <updated>2026-05-10T03:17:34.255310+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50986", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113487607732298095", "content": "", "creation_timestamp": "2024-11-15T15:11:08.179102Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84/export"/>
    <published>2024-11-15T15:11:08.179102+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2012335d-bf92-444a-9943-32dda8adf323/export</id>
    <title>2012335d-bf92-444a-9943-32dda8adf323</title>
    <updated>2026-05-10T03:17:34.255211+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2012335d-bf92-444a-9943-32dda8adf323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50986", "type": "seen", "source": "https://t.me/cvedetector/11082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50986 - Clementine DLL Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50986 \nPublished : Nov. 15, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T16:36:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2012335d-bf92-444a-9943-32dda8adf323/export"/>
    <published>2024-11-15T16:36:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/63bb255c-84eb-4f85-9045-7484cb15c773/export</id>
    <title>63bb255c-84eb-4f85-9045-7484cb15c773</title>
    <updated>2026-05-10T03:17:34.255111+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "63bb255c-84eb-4f85-9045-7484cb15c773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50983", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113489233363805293", "content": "", "creation_timestamp": "2024-11-15T22:04:35.061682Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/63bb255c-84eb-4f85-9045-7484cb15c773/export"/>
    <published>2024-11-15T22:04:35.061682+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f6cd8105-e65e-4951-871a-e93db02b9d41/export</id>
    <title>f6cd8105-e65e-4951-871a-e93db02b9d41</title>
    <updated>2026-05-10T03:17:34.254965+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f6cd8105-e65e-4951-871a-e93db02b9d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50983", "type": "seen", "source": "https://t.me/cvedetector/11193", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50983 - FlightPath Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50983 \nPublished : Nov. 15, 2024, 10:15 p.m. | 34\u00a0minutes ago \nDescription : FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, which allows authenticated remote attackers with administrative rights to inject arbitrary JavaScript in the web browser of a user by including a malicious payload into the Last Name section in the Create/Edit Faculty/Staff User or Create/Edit Student User sections. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T00:09:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f6cd8105-e65e-4951-871a-e93db02b9d41/export"/>
    <published>2024-11-16T00:09:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/42124092-234a-412b-98f3-a55f1d6a53bb/export</id>
    <title>42124092-234a-412b-98f3-a55f1d6a53bb</title>
    <updated>2026-05-10T03:17:34.253347+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "42124092-234a-412b-98f3-a55f1d6a53bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5098", "type": "seen", "source": "Telegram/adWKqEhktE073DV6Xb7jwfur5hssPmsbmwtUdNDQrWL2xdK5", "content": "", "creation_timestamp": "2025-02-14T09:46:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/42124092-234a-412b-98f3-a55f1d6a53bb/export"/>
    <published>2025-02-14T09:46:59+00:00</published>
  </entry>
</feed>
