<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 02:51:51 +0000</lastBuildDate>
    <item>
      <title>03f368e7-65bf-412e-8b99-13e34864ffac</title>
      <link>https://vulnerability.circl.lu/sighting/03f368e7-65bf-412e-8b99-13e34864ffac/export</link>
      <description>{"uuid": "03f368e7-65bf-412e-8b99-13e34864ffac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9977", "content": "#exploit\n1. CVE-2024-23749:\nCommand Injection in KiTTY Get Remote File Through SCP Input\nhttps://blog.defcesco.io/CVE-2024-23749\n\n2. CVE-2024-23724:\nGhost CMS Stored XSS Leading to Owner Takeover\nhttps://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss\n]-&amp;gt; https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724\n\n3. CVE-2024-24386:\nVitalPBX &amp;lt;3.2.5 - Command Injection\nhttps://github.com/erick-duarte/CVE-2024-24386", "creation_timestamp": "2024-02-23T06:29:10.000000Z"}</description>
      <content:encoded>{"uuid": "03f368e7-65bf-412e-8b99-13e34864ffac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9977", "content": "#exploit\n1. CVE-2024-23749:\nCommand Injection in KiTTY Get Remote File Through SCP Input\nhttps://blog.defcesco.io/CVE-2024-23749\n\n2. CVE-2024-23724:\nGhost CMS Stored XSS Leading to Owner Takeover\nhttps://rhinosecuritylabs.com/research/cve-2024-23724-ghost-cms-stored-xss\n]-&amp;gt; https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724\n\n3. CVE-2024-24386:\nVitalPBX &amp;lt;3.2.5 - Command Injection\nhttps://github.com/erick-duarte/CVE-2024-24386", "creation_timestamp": "2024-02-23T06:29:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/03f368e7-65bf-412e-8b99-13e34864ffac/export</guid>
      <pubDate>Fri, 23 Feb 2024 06:29:10 +0000</pubDate>
    </item>
    <item>
      <title>1abee689-1a59-49e9-85dd-ae81f85dbb00</title>
      <link>https://vulnerability.circl.lu/sighting/1abee689-1a59-49e9-85dd-ae81f85dbb00/export</link>
      <description>{"uuid": "1abee689-1a59-49e9-85dd-ae81f85dbb00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "seen", "source": "https://t.me/ctinow/192606", "content": "https://ift.tt/6FY2mrt\nCVE-2024-23746 | Miro Desktop 0.8.18 on macOS Electron code injection", "creation_timestamp": "2024-02-24T14:47:06.000000Z"}</description>
      <content:encoded>{"uuid": "1abee689-1a59-49e9-85dd-ae81f85dbb00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "seen", "source": "https://t.me/ctinow/192606", "content": "https://ift.tt/6FY2mrt\nCVE-2024-23746 | Miro Desktop 0.8.18 on macOS Electron code injection", "creation_timestamp": "2024-02-24T14:47:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1abee689-1a59-49e9-85dd-ae81f85dbb00/export</guid>
      <pubDate>Sat, 24 Feb 2024 14:47:06 +0000</pubDate>
    </item>
    <item>
      <title>d720c215-4c7f-46dc-8809-3b6fbf881198</title>
      <link>https://vulnerability.circl.lu/sighting/d720c215-4c7f-46dc-8809-3b6fbf881198/export</link>
      <description>{"uuid": "d720c215-4c7f-46dc-8809-3b6fbf881198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/198452", "content": "https://ift.tt/sGbaXrV\nCVE-2024-23749 | KiTTY up to 0.76.1.13 filename command injection (ID 177031)", "creation_timestamp": "2024-03-02T19:21:23.000000Z"}</description>
      <content:encoded>{"uuid": "d720c215-4c7f-46dc-8809-3b6fbf881198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "seen", "source": "https://t.me/ctinow/198452", "content": "https://ift.tt/sGbaXrV\nCVE-2024-23749 | KiTTY up to 0.76.1.13 filename command injection (ID 177031)", "creation_timestamp": "2024-03-02T19:21:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d720c215-4c7f-46dc-8809-3b6fbf881198/export</guid>
      <pubDate>Sat, 02 Mar 2024 19:21:23 +0000</pubDate>
    </item>
    <item>
      <title>3a82d6cc-ef8b-44d0-92ab-74e5561c42b7</title>
      <link>https://vulnerability.circl.lu/sighting/3a82d6cc-ef8b-44d0-92ab-74e5561c42b7/export</link>
      <description>{"uuid": "3a82d6cc-ef8b-44d0-92ab-74e5561c42b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6859", "content": "https://blog.defcesco.io/CVE-2024-23749\n\nCommand Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)\n#exploit", "creation_timestamp": "2024-06-08T00:13:08.000000Z"}</description>
      <content:encoded>{"uuid": "3a82d6cc-ef8b-44d0-92ab-74e5561c42b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23749", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6859", "content": "https://blog.defcesco.io/CVE-2024-23749\n\nCommand Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)\n#exploit", "creation_timestamp": "2024-06-08T00:13:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3a82d6cc-ef8b-44d0-92ab-74e5561c42b7/export</guid>
      <pubDate>Sat, 08 Jun 2024 00:13:08 +0000</pubDate>
    </item>
    <item>
      <title>d01cf44b-aec7-4c89-93e1-3a77d77209a9</title>
      <link>https://vulnerability.circl.lu/sighting/d01cf44b-aec7-4c89-93e1-3a77d77209a9/export</link>
      <description>{"uuid": "d01cf44b-aec7-4c89-93e1-3a77d77209a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/75", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &amp;lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-07-30T07:06:00.000000Z"}</description>
      <content:encoded>{"uuid": "d01cf44b-aec7-4c89-93e1-3a77d77209a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/75", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &amp;lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-07-30T07:06:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d01cf44b-aec7-4c89-93e1-3a77d77209a9/export</guid>
      <pubDate>Tue, 30 Jul 2024 07:06:00 +0000</pubDate>
    </item>
    <item>
      <title>0716b3cc-a994-4cb6-84e5-0f7970c3d700</title>
      <link>https://vulnerability.circl.lu/sighting/0716b3cc-a994-4cb6-84e5-0f7970c3d700/export</link>
      <description>{"uuid": "0716b3cc-a994-4cb6-84e5-0f7970c3d700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10903", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &amp;lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-07-30T11:01:36.000000Z"}</description>
      <content:encoded>{"uuid": "0716b3cc-a994-4cb6-84e5-0f7970c3d700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10903", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &amp;lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-07-30T11:01:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0716b3cc-a994-4cb6-84e5-0f7970c3d700/export</guid>
      <pubDate>Tue, 30 Jul 2024 11:01:36 +0000</pubDate>
    </item>
    <item>
      <title>de97f726-cf6c-4921-98bd-3935ab22b224</title>
      <link>https://vulnerability.circl.lu/sighting/de97f726-cf6c-4921-98bd-3935ab22b224/export</link>
      <description>{"uuid": "de97f726-cf6c-4921-98bd-3935ab22b224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2634", "content": "#exploit\n1. CVE-2024-22894:\nWithin heatpump root user\u00a0psw decrypt/crack\nhttps://github.com/Jaarden/CVE-2024-22894\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746\n\n3. CVE-2023-6112:\nChrome content::NavigationURLLoaderImpl::FallbackToNonInterceptedRequest Heap UaF\nhttps://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html", "creation_timestamp": "2024-08-16T09:12:43.000000Z"}</description>
      <content:encoded>{"uuid": "de97f726-cf6c-4921-98bd-3935ab22b224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2634", "content": "#exploit\n1. CVE-2024-22894:\nWithin heatpump root user\u00a0psw decrypt/crack\nhttps://github.com/Jaarden/CVE-2024-22894\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746\n\n3. CVE-2023-6112:\nChrome content::NavigationURLLoaderImpl::FallbackToNonInterceptedRequest Heap UaF\nhttps://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html", "creation_timestamp": "2024-08-16T09:12:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/de97f726-cf6c-4921-98bd-3935ab22b224/export</guid>
      <pubDate>Fri, 16 Aug 2024 09:12:43 +0000</pubDate>
    </item>
    <item>
      <title>357ba09e-47e2-4490-912c-72b6984afe9b</title>
      <link>https://vulnerability.circl.lu/sighting/357ba09e-47e2-4490-912c-72b6984afe9b/export</link>
      <description>{"uuid": "357ba09e-47e2-4490-912c-72b6984afe9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2665", "content": "#exploit\n1. CVE-2024-22894:\nWithin heatpump root user\u00a0psw decrypt/crack\nhttps://github.com/Jaarden/CVE-2024-22894\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746\n\n3. CVE-2023-6112:\nChrome content::NavigationURLLoaderImpl::FallbackToNonInterceptedRequest Heap UaF\nhttps://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html", "creation_timestamp": "2024-08-16T09:12:55.000000Z"}</description>
      <content:encoded>{"uuid": "357ba09e-47e2-4490-912c-72b6984afe9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2665", "content": "#exploit\n1. CVE-2024-22894:\nWithin heatpump root user\u00a0psw decrypt/crack\nhttps://github.com/Jaarden/CVE-2024-22894\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746\n\n3. CVE-2023-6112:\nChrome content::NavigationURLLoaderImpl::FallbackToNonInterceptedRequest Heap UaF\nhttps://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html", "creation_timestamp": "2024-08-16T09:12:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/357ba09e-47e2-4490-912c-72b6984afe9b/export</guid>
      <pubDate>Fri, 16 Aug 2024 09:12:55 +0000</pubDate>
    </item>
    <item>
      <title>a53393d1-7f72-4bcb-b6b8-94a35060e39e</title>
      <link>https://vulnerability.circl.lu/sighting/a53393d1-7f72-4bcb-b6b8-94a35060e39e/export</link>
      <description>{"uuid": "a53393d1-7f72-4bcb-b6b8-94a35060e39e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/3510", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &amp;lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-08-16T11:18:08.000000Z"}</description>
      <content:encoded>{"uuid": "a53393d1-7f72-4bcb-b6b8-94a35060e39e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23746", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/3510", "content": "#exploit\n1. CVE-2024-3116:\nRCE in pgAdmin &amp;lt;=8.4\nhttps://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4\n\n2. CVE-2024-23746:\nMiro Desktop 0.8.18 on macOS allows Electron code injection\nhttps://github.com/louiselalanne/CVE-2024-23746", "creation_timestamp": "2024-08-16T11:18:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a53393d1-7f72-4bcb-b6b8-94a35060e39e/export</guid>
      <pubDate>Fri, 16 Aug 2024 11:18:08 +0000</pubDate>
    </item>
    <item>
      <title>04321f78-f3ec-4688-86b0-daf39ee42be9</title>
      <link>https://vulnerability.circl.lu/sighting/04321f78-f3ec-4688-86b0-daf39ee42be9/export</link>
      <description>{"uuid": "04321f78-f3ec-4688-86b0-daf39ee42be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2374", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mjm644xfd72t", "content": "", "creation_timestamp": "2026-04-16T10:08:48.661570Z"}</description>
      <content:encoded>{"uuid": "04321f78-f3ec-4688-86b0-daf39ee42be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2374", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mjm644xfd72t", "content": "", "creation_timestamp": "2026-04-16T10:08:48.661570Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/04321f78-f3ec-4688-86b0-daf39ee42be9/export</guid>
      <pubDate>Thu, 16 Apr 2026 10:08:48 +0000</pubDate>
    </item>
  </channel>
</rss>
