<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 20:18:07 +0000</lastBuildDate>
    <item>
      <title>b2435803-ea5a-4f4d-8e00-31213ef798cc</title>
      <link>https://vulnerability.circl.lu/sighting/b2435803-ea5a-4f4d-8e00-31213ef798cc/export</link>
      <description>{"uuid": "b2435803-ea5a-4f4d-8e00-31213ef798cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22396", "type": "seen", "source": "https://t.me/ctinow/207461", "content": "https://ift.tt/muVtIrC\nCVE-2024-22396", "creation_timestamp": "2024-03-14T05:21:45.000000Z"}</description>
      <content:encoded>{"uuid": "b2435803-ea5a-4f4d-8e00-31213ef798cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22396", "type": "seen", "source": "https://t.me/ctinow/207461", "content": "https://ift.tt/muVtIrC\nCVE-2024-22396", "creation_timestamp": "2024-03-14T05:21:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b2435803-ea5a-4f4d-8e00-31213ef798cc/export</guid>
      <pubDate>Thu, 14 Mar 2024 05:21:45 +0000</pubDate>
    </item>
    <item>
      <title>77a87796-c393-493d-b87a-a85fda243aae</title>
      <link>https://vulnerability.circl.lu/sighting/77a87796-c393-493d-b87a-a85fda243aae/export</link>
      <description>{"uuid": "77a87796-c393-493d-b87a-a85fda243aae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22397", "type": "seen", "source": "https://t.me/ctinow/207462", "content": "https://ift.tt/4Go7x6C\nCVE-2024-22397", "creation_timestamp": "2024-03-14T05:21:46.000000Z"}</description>
      <content:encoded>{"uuid": "77a87796-c393-493d-b87a-a85fda243aae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22397", "type": "seen", "source": "https://t.me/ctinow/207462", "content": "https://ift.tt/4Go7x6C\nCVE-2024-22397", "creation_timestamp": "2024-03-14T05:21:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/77a87796-c393-493d-b87a-a85fda243aae/export</guid>
      <pubDate>Thu, 14 Mar 2024 05:21:46 +0000</pubDate>
    </item>
    <item>
      <title>d77220ff-2e68-4efd-9bae-84b99df70b3d</title>
      <link>https://vulnerability.circl.lu/sighting/d77220ff-2e68-4efd-9bae-84b99df70b3d/export</link>
      <description>{"uuid": "d77220ff-2e68-4efd-9bae-84b99df70b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22398", "type": "seen", "source": "https://t.me/ctinow/207463", "content": "https://ift.tt/gIUXmVa\nCVE-2024-22398", "creation_timestamp": "2024-03-14T05:21:47.000000Z"}</description>
      <content:encoded>{"uuid": "d77220ff-2e68-4efd-9bae-84b99df70b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22398", "type": "seen", "source": "https://t.me/ctinow/207463", "content": "https://ift.tt/gIUXmVa\nCVE-2024-22398", "creation_timestamp": "2024-03-14T05:21:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d77220ff-2e68-4efd-9bae-84b99df70b3d/export</guid>
      <pubDate>Thu, 14 Mar 2024 05:21:47 +0000</pubDate>
    </item>
    <item>
      <title>76fdd6ae-2d91-433e-8bf6-f318d79a20ed</title>
      <link>https://vulnerability.circl.lu/sighting/76fdd6ae-2d91-433e-8bf6-f318d79a20ed/export</link>
      <description>{"uuid": "76fdd6ae-2d91-433e-8bf6-f318d79a20ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22396", "type": "seen", "source": "https://t.me/ctinow/207469", "content": "https://ift.tt/muVtIrC\nCVE-2024-22396", "creation_timestamp": "2024-03-14T05:26:55.000000Z"}</description>
      <content:encoded>{"uuid": "76fdd6ae-2d91-433e-8bf6-f318d79a20ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22396", "type": "seen", "source": "https://t.me/ctinow/207469", "content": "https://ift.tt/muVtIrC\nCVE-2024-22396", "creation_timestamp": "2024-03-14T05:26:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/76fdd6ae-2d91-433e-8bf6-f318d79a20ed/export</guid>
      <pubDate>Thu, 14 Mar 2024 05:26:55 +0000</pubDate>
    </item>
    <item>
      <title>d6dd2fb4-f10f-4ac2-a6d3-cf897f629611</title>
      <link>https://vulnerability.circl.lu/sighting/d6dd2fb4-f10f-4ac2-a6d3-cf897f629611/export</link>
      <description>{"uuid": "d6dd2fb4-f10f-4ac2-a6d3-cf897f629611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22397", "type": "seen", "source": "https://t.me/ctinow/207470", "content": "https://ift.tt/4Go7x6C\nCVE-2024-22397", "creation_timestamp": "2024-03-14T05:26:56.000000Z"}</description>
      <content:encoded>{"uuid": "d6dd2fb4-f10f-4ac2-a6d3-cf897f629611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22397", "type": "seen", "source": "https://t.me/ctinow/207470", "content": "https://ift.tt/4Go7x6C\nCVE-2024-22397", "creation_timestamp": "2024-03-14T05:26:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d6dd2fb4-f10f-4ac2-a6d3-cf897f629611/export</guid>
      <pubDate>Thu, 14 Mar 2024 05:26:56 +0000</pubDate>
    </item>
    <item>
      <title>3a24073f-3c13-4a9e-ae6b-4d7dbe885213</title>
      <link>https://vulnerability.circl.lu/sighting/3a24073f-3c13-4a9e-ae6b-4d7dbe885213/export</link>
      <description>{"uuid": "3a24073f-3c13-4a9e-ae6b-4d7dbe885213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22398", "type": "seen", "source": "https://t.me/ctinow/207471", "content": "https://ift.tt/gIUXmVa\nCVE-2024-22398", "creation_timestamp": "2024-03-14T05:27:00.000000Z"}</description>
      <content:encoded>{"uuid": "3a24073f-3c13-4a9e-ae6b-4d7dbe885213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22398", "type": "seen", "source": "https://t.me/ctinow/207471", "content": "https://ift.tt/gIUXmVa\nCVE-2024-22398", "creation_timestamp": "2024-03-14T05:27:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3a24073f-3c13-4a9e-ae6b-4d7dbe885213/export</guid>
      <pubDate>Thu, 14 Mar 2024 05:27:00 +0000</pubDate>
    </item>
    <item>
      <title>9664e8bd-7769-4ae8-9a76-01affce4ce9c</title>
      <link>https://vulnerability.circl.lu/sighting/9664e8bd-7769-4ae8-9a76-01affce4ce9c/export</link>
      <description>{"uuid": "9664e8bd-7769-4ae8-9a76-01affce4ce9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22393", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7281", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit CVE-2024-22393\nURL\uff1ahttps://github.com/omranisecurity/CVE-2024-22393\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-12T07:43:02.000000Z"}</description>
      <content:encoded>{"uuid": "9664e8bd-7769-4ae8-9a76-01affce4ce9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22393", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7281", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit CVE-2024-22393\nURL\uff1ahttps://github.com/omranisecurity/CVE-2024-22393\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-12T07:43:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9664e8bd-7769-4ae8-9a76-01affce4ce9c/export</guid>
      <pubDate>Sun, 12 May 2024 07:43:02 +0000</pubDate>
    </item>
    <item>
      <title>bbcc4906-c490-43ff-a18c-ca68c5debe03</title>
      <link>https://vulnerability.circl.lu/sighting/bbcc4906-c490-43ff-a18c-ca68c5debe03/export</link>
      <description>{"uuid": "bbcc4906-c490-43ff-a18c-ca68c5debe03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22399", "type": "seen", "source": "https://t.me/cvedetector/5719", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22399 - Apache Seata Deserialization of Untrusted Data RCE\", \n  \"Content\": \"CVE ID : CVE-2024-22399 \nPublished : Sept. 16, 2024, 12:15 p.m. | 43\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Apache Seata.\u00a0  \n  \nWhen developers disable authentication on the Seata-Server and do not use the Seata client SDK dependencies, they may construct uncontrolled serialized malicious requests by directly sending bytecode based on the Seata private protocol.  \n  \nThis issue affects Apache Seata: 2.0.0, from 1.0.0 through 1.8.0.  \n  \nUsers are recommended to upgrade to version 2.1.0/1.8.1, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T15:21:30.000000Z"}</description>
      <content:encoded>{"uuid": "bbcc4906-c490-43ff-a18c-ca68c5debe03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22399", "type": "seen", "source": "https://t.me/cvedetector/5719", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22399 - Apache Seata Deserialization of Untrusted Data RCE\", \n  \"Content\": \"CVE ID : CVE-2024-22399 \nPublished : Sept. 16, 2024, 12:15 p.m. | 43\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Apache Seata.\u00a0  \n  \nWhen developers disable authentication on the Seata-Server and do not use the Seata client SDK dependencies, they may construct uncontrolled serialized malicious requests by directly sending bytecode based on the Seata private protocol.  \n  \nThis issue affects Apache Seata: 2.0.0, from 1.0.0 through 1.8.0.  \n  \nUsers are recommended to upgrade to version 2.1.0/1.8.1, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T15:21:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bbcc4906-c490-43ff-a18c-ca68c5debe03/export</guid>
      <pubDate>Mon, 16 Sep 2024 15:21:30 +0000</pubDate>
    </item>
    <item>
      <title>e097ffb6-4303-4fd4-90a8-8aa499e054cb</title>
      <link>https://vulnerability.circl.lu/sighting/e097ffb6-4303-4fd4-90a8-8aa499e054cb/export</link>
      <description>{"uuid": "e097ffb6-4303-4fd4-90a8-8aa499e054cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22397", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9153", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22397\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in the SonicOS SSLVPN portal allows a remote authenticated attacker as a firewall 'admin' user to store and execute arbitrary JavaScript code.\n\ud83d\udccf Published: 2024-03-14T03:23:52.971Z\n\ud83d\udccf Modified: 2025-03-27T17:01:13.903Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0005", "creation_timestamp": "2025-03-27T17:26:45.000000Z"}</description>
      <content:encoded>{"uuid": "e097ffb6-4303-4fd4-90a8-8aa499e054cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22397", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9153", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22397\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in the SonicOS SSLVPN portal allows a remote authenticated attacker as a firewall 'admin' user to store and execute arbitrary JavaScript code.\n\ud83d\udccf Published: 2024-03-14T03:23:52.971Z\n\ud83d\udccf Modified: 2025-03-27T17:01:13.903Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0005", "creation_timestamp": "2025-03-27T17:26:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e097ffb6-4303-4fd4-90a8-8aa499e054cb/export</guid>
      <pubDate>Thu, 27 Mar 2025 17:26:45 +0000</pubDate>
    </item>
    <item>
      <title>425662cc-8eb8-40b8-a9f5-2f5d5a73c343</title>
      <link>https://vulnerability.circl.lu/sighting/425662cc-8eb8-40b8-a9f5-2f5d5a73c343/export</link>
      <description>{"uuid": "425662cc-8eb8-40b8-a9f5-2f5d5a73c343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22393", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12910", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22393\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.\n\nPixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user\u00a0can cause such an attack by uploading an image when posting content.\nUsers are recommended to upgrade to version [1.2.5], which fixes the issue.\n\ud83d\udccf Published: 2024-02-22T09:51:43.432Z\n\ud83d\udccf Modified: 2025-04-22T16:20:44.318Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/f58l6dr4r74hl6o71gn47kmn44vw12cv\n2. http://www.openwall.com/lists/oss-security/2024/02/22/1", "creation_timestamp": "2025-04-22T17:03:35.000000Z"}</description>
      <content:encoded>{"uuid": "425662cc-8eb8-40b8-a9f5-2f5d5a73c343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22393", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12910", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22393\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.\n\nPixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user\u00a0can cause such an attack by uploading an image when posting content.\nUsers are recommended to upgrade to version [1.2.5], which fixes the issue.\n\ud83d\udccf Published: 2024-02-22T09:51:43.432Z\n\ud83d\udccf Modified: 2025-04-22T16:20:44.318Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/f58l6dr4r74hl6o71gn47kmn44vw12cv\n2. http://www.openwall.com/lists/oss-security/2024/02/22/1", "creation_timestamp": "2025-04-22T17:03:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/425662cc-8eb8-40b8-a9f5-2f5d5a73c343/export</guid>
      <pubDate>Tue, 22 Apr 2025 17:03:35 +0000</pubDate>
    </item>
  </channel>
</rss>
