<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T15:50:18.431285+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/93ff6ebe-90bb-4f14-94cd-785cb301cc1d/export</id>
    <title>93ff6ebe-90bb-4f14-94cd-785cb301cc1d</title>
    <updated>2026-05-10T15:50:18.844809+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "93ff6ebe-90bb-4f14-94cd-785cb301cc1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/CyberBulletin/1036", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:12:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/93ff6ebe-90bb-4f14-94cd-785cb301cc1d/export"/>
    <published>2024-10-04T14:12:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f31bf4e2-20e9-44b2-b53e-8e831bb793c2/export</id>
    <title>f31bf4e2-20e9-44b2-b53e-8e831bb793c2</title>
    <updated>2026-05-10T15:50:18.844725+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f31bf4e2-20e9-44b2-b53e-8e831bb793c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/CyberBulletin/25931", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:12:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f31bf4e2-20e9-44b2-b53e-8e831bb793c2/export"/>
    <published>2024-10-04T14:12:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/265d6335-e381-4801-bc4d-e7bb1ab1d42f/export</id>
    <title>265d6335-e381-4801-bc4d-e7bb1ab1d42f</title>
    <updated>2026-05-10T15:50:18.844598+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "265d6335-e381-4801-bc4d-e7bb1ab1d42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/InfoSecInsider/24006", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:16:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/265d6335-e381-4801-bc4d-e7bb1ab1d42f/export"/>
    <published>2024-10-04T14:16:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ff190ca4-cf83-4bd4-a107-41bae75651f9/export</id>
    <title>ff190ca4-cf83-4bd4-a107-41bae75651f9</title>
    <updated>2026-05-10T15:50:18.844470+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ff190ca4-cf83-4bd4-a107-41bae75651f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/InfoSecInsider/448", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:16:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ff190ca4-cf83-4bd4-a107-41bae75651f9/export"/>
    <published>2024-10-04T14:16:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/62c3c434-d06e-4a98-a6ea-2442de9128d4/export</id>
    <title>62c3c434-d06e-4a98-a6ea-2442de9128d4</title>
    <updated>2026-05-10T15:50:18.844290+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "62c3c434-d06e-4a98-a6ea-2442de9128d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15197", "content": "\u200aCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM\n\nhttps://securityonline.info/cve-2024-5102-avast-antivirus-flaw-could-allow-hackers-to-delete-files-and-run-code-as-system/", "creation_timestamp": "2024-10-05T17:00:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/62c3c434-d06e-4a98-a6ea-2442de9128d4/export"/>
    <published>2024-10-05T17:00:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6382e05d-5d3d-43a2-b2d0-f0cd030c52df/export</id>
    <title>6382e05d-5d3d-43a2-b2d0-f0cd030c52df</title>
    <updated>2026-05-10T15:50:18.844097+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6382e05d-5d3d-43a2-b2d0-f0cd030c52df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51024", "type": "seen", "source": "https://t.me/cvedetector/9882", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51024 - D-Link DIR-823G Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51024 \nPublished : Nov. 5, 2024, 3:15 p.m. | 40\u00a0minutes ago \nDescription : D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the HostName parameter in the SetWanSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T17:13:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6382e05d-5d3d-43a2-b2d0-f0cd030c52df/export"/>
    <published>2024-11-05T17:13:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/38c5ce6d-7292-4060-ae0d-45f99c2ff0ca/export</id>
    <title>38c5ce6d-7292-4060-ae0d-45f99c2ff0ca</title>
    <updated>2026-05-10T15:50:18.843909+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "38c5ce6d-7292-4060-ae0d-45f99c2ff0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51026", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113466252528085696", "content": "", "creation_timestamp": "2024-11-11T20:40:15.920219Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/38c5ce6d-7292-4060-ae0d-45f99c2ff0ca/export"/>
    <published>2024-11-11T20:40:15.920219+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7d573a4c-9367-4400-a8e5-a687a90ce8eb/export</id>
    <title>7d573a4c-9367-4400-a8e5-a687a90ce8eb</title>
    <updated>2026-05-10T15:50:18.843633+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7d573a4c-9367-4400-a8e5-a687a90ce8eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51026", "type": "seen", "source": "https://t.me/cvedetector/10547", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51026 - NetAdmin IAM Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51026 \nPublished : Nov. 11, 2024, 9:15 p.m. | 27\u00a0minutes ago \nDescription : The NetAdmin IAM system (version 4.0.30319) has a Cross Site Scripting (XSS) vulnerability in the /BalloonSave.ashx endpoint, where it is possible to inject a malicious payload into the Content= field. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T22:48:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7d573a4c-9367-4400-a8e5-a687a90ce8eb/export"/>
    <published>2024-11-11T22:48:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8c1d8857-1738-4692-a051-e363efe46fb2/export</id>
    <title>8c1d8857-1738-4692-a051-e363efe46fb2</title>
    <updated>2026-05-10T15:50:18.840784+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8c1d8857-1738-4692-a051-e363efe46fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51027", "type": "seen", "source": "https://t.me/cvedetector/10897", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51027 - Ruijie NBR800G Gateway Authenticated Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51027 \nPublished : Nov. 13, 2024, 10:15 p.m. | 33\u00a0minutes ago \nDescription : Ruijie NBR800G gateway NBR_RGOS_11.1(6)B4P9 is vulnerable to command execution in /itbox_pi/networksafe.php via the province parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T23:55:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8c1d8857-1738-4692-a051-e363efe46fb2/export"/>
    <published>2024-11-13T23:55:58+00:00</published>
  </entry>
</feed>
