<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 14:44:32 +0000</lastBuildDate>
    <item>
      <title>6413ba06-5608-49ca-8142-3d186e6b561f</title>
      <link>https://vulnerability.circl.lu/sighting/6413ba06-5608-49ca-8142-3d186e6b561f/export</link>
      <description>{"uuid": "6413ba06-5608-49ca-8142-3d186e6b561f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48441", "type": "seen", "source": "https://t.me/cvedetector/8825", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48441 - Wuhan Tianyu Information Industry Co., Ltd Tianyu CPE Router Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-48441 \nPublished : Oct. 24, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : Wuhan Tianyu Information Industry Co., Ltd Tianyu CPE Router CommonCPExCPETS_v3.2.468.11.04_P4 was discovered to contain a command injection vulnerability via the component at_command.asp. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:00:18.000000Z"}</description>
      <content:encoded>{"uuid": "6413ba06-5608-49ca-8142-3d186e6b561f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48441", "type": "seen", "source": "https://t.me/cvedetector/8825", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48441 - Wuhan Tianyu Information Industry Co., Ltd Tianyu CPE Router Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-48441 \nPublished : Oct. 24, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : Wuhan Tianyu Information Industry Co., Ltd Tianyu CPE Router CommonCPExCPETS_v3.2.468.11.04_P4 was discovered to contain a command injection vulnerability via the component at_command.asp. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:00:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6413ba06-5608-49ca-8142-3d186e6b561f/export</guid>
      <pubDate>Thu, 24 Oct 2024 21:00:18 +0000</pubDate>
    </item>
    <item>
      <title>1825a4c1-a862-4563-afef-9a51b91394ea</title>
      <link>https://vulnerability.circl.lu/sighting/1825a4c1-a862-4563-afef-9a51b91394ea/export</link>
      <description>{"uuid": "1825a4c1-a862-4563-afef-9a51b91394ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48448", "type": "seen", "source": "https://t.me/cvedetector/8972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48448 - Huly Platform Arbitrary File Upload RCE\", \n  \"Content\": \"CVE ID : CVE-2024-48448 \nPublished : Oct. 25, 2024, 6:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in Huly Platform v0.6.295 allows attackers to execute arbitrary code via uploading a crafted HTML file into the tracker comments page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T21:16:06.000000Z"}</description>
      <content:encoded>{"uuid": "1825a4c1-a862-4563-afef-9a51b91394ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48448", "type": "seen", "source": "https://t.me/cvedetector/8972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48448 - Huly Platform Arbitrary File Upload RCE\", \n  \"Content\": \"CVE ID : CVE-2024-48448 \nPublished : Oct. 25, 2024, 6:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in Huly Platform v0.6.295 allows attackers to execute arbitrary code via uploading a crafted HTML file into the tracker comments page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T21:16:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1825a4c1-a862-4563-afef-9a51b91394ea/export</guid>
      <pubDate>Fri, 25 Oct 2024 21:16:06 +0000</pubDate>
    </item>
    <item>
      <title>45739aab-ea92-40ce-ad99-23b95f1064ea</title>
      <link>https://vulnerability.circl.lu/sighting/45739aab-ea92-40ce-ad99-23b95f1064ea/export</link>
      <description>{"uuid": "45739aab-ea92-40ce-ad99-23b95f1064ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947928064913968", "content": "", "creation_timestamp": "2025-02-04T22:16:39.001107Z"}</description>
      <content:encoded>{"uuid": "45739aab-ea92-40ce-ad99-23b95f1064ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947928064913968", "content": "", "creation_timestamp": "2025-02-04T22:16:39.001107Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/45739aab-ea92-40ce-ad99-23b95f1064ea/export</guid>
      <pubDate>Tue, 04 Feb 2025 22:16:39 +0000</pubDate>
    </item>
    <item>
      <title>9db76ccf-45ee-4390-8905-aefcd5fcddbd</title>
      <link>https://vulnerability.circl.lu/sighting/9db76ccf-45ee-4390-8905-aefcd5fcddbd/export</link>
      <description>{"uuid": "9db76ccf-45ee-4390-8905-aefcd5fcddbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhf6s7p3jw2w", "content": "", "creation_timestamp": "2025-02-04T23:15:47.892031Z"}</description>
      <content:encoded>{"uuid": "9db76ccf-45ee-4390-8905-aefcd5fcddbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhf6s7p3jw2w", "content": "", "creation_timestamp": "2025-02-04T23:15:47.892031Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9db76ccf-45ee-4390-8905-aefcd5fcddbd/export</guid>
      <pubDate>Tue, 04 Feb 2025 23:15:47 +0000</pubDate>
    </item>
    <item>
      <title>3a738bed-77f3-4564-aea5-587859e1116f</title>
      <link>https://vulnerability.circl.lu/sighting/3a738bed-77f3-4564-aea5-587859e1116f/export</link>
      <description>{"uuid": "3a738bed-77f3-4564-aea5-587859e1116f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhfjcgnlo22q", "content": "", "creation_timestamp": "2025-02-05T02:23:49.544210Z"}</description>
      <content:encoded>{"uuid": "3a738bed-77f3-4564-aea5-587859e1116f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhfjcgnlo22q", "content": "", "creation_timestamp": "2025-02-05T02:23:49.544210Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3a738bed-77f3-4564-aea5-587859e1116f/export</guid>
      <pubDate>Wed, 05 Feb 2025 02:23:49 +0000</pubDate>
    </item>
    <item>
      <title>892e384d-c8da-4c78-92a5-bf10aa6e4261</title>
      <link>https://vulnerability.circl.lu/sighting/892e384d-c8da-4c78-92a5-bf10aa6e4261/export</link>
      <description>{"uuid": "892e384d-c8da-4c78-92a5-bf10aa6e4261", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://t.me/cvedetector/17269", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48445 - Compop.ca ONLINESHOP SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48445 \nPublished : Feb. 4, 2025, 11:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : An issue in compop.ca ONLINE MALL v.3.5.3 allows a remote attacker to execute arbitrary code via the rid, tid, et, and ts parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T03:16:35.000000Z"}</description>
      <content:encoded>{"uuid": "892e384d-c8da-4c78-92a5-bf10aa6e4261", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://t.me/cvedetector/17269", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48445 - Compop.ca ONLINESHOP SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48445 \nPublished : Feb. 4, 2025, 11:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : An issue in compop.ca ONLINE MALL v.3.5.3 allows a remote attacker to execute arbitrary code via the rid, tid, et, and ts parameters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T03:16:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/892e384d-c8da-4c78-92a5-bf10aa6e4261/export</guid>
      <pubDate>Wed, 05 Feb 2025 03:16:35 +0000</pubDate>
    </item>
    <item>
      <title>2721ec1e-4622-41f2-aecd-2729f1cc439d</title>
      <link>https://vulnerability.circl.lu/sighting/2721ec1e-4622-41f2-aecd-2729f1cc439d/export</link>
      <description>{"uuid": "2721ec1e-4622-41f2-aecd-2729f1cc439d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhhhs2yhwb2a", "content": "", "creation_timestamp": "2025-02-05T21:02:07.290637Z"}</description>
      <content:encoded>{"uuid": "2721ec1e-4622-41f2-aecd-2729f1cc439d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhhhs2yhwb2a", "content": "", "creation_timestamp": "2025-02-05T21:02:07.290637Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2721ec1e-4622-41f2-aecd-2729f1cc439d/export</guid>
      <pubDate>Wed, 05 Feb 2025 21:02:07 +0000</pubDate>
    </item>
    <item>
      <title>df355476-83ac-4edd-abe7-2d43ec52c1c6</title>
      <link>https://vulnerability.circl.lu/sighting/df355476-83ac-4edd-abe7-2d43ec52c1c6/export</link>
      <description>{"uuid": "df355476-83ac-4edd-abe7-2d43ec52c1c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "Telegram/7ylFiB_H_J3n9z4Ee919Lvc5-uNfdW93PTMXzwFsmYzXTSfd", "content": "", "creation_timestamp": "2025-02-06T02:43:27.000000Z"}</description>
      <content:encoded>{"uuid": "df355476-83ac-4edd-abe7-2d43ec52c1c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "Telegram/7ylFiB_H_J3n9z4Ee919Lvc5-uNfdW93PTMXzwFsmYzXTSfd", "content": "", "creation_timestamp": "2025-02-06T02:43:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/df355476-83ac-4edd-abe7-2d43ec52c1c6/export</guid>
      <pubDate>Thu, 06 Feb 2025 02:43:27 +0000</pubDate>
    </item>
    <item>
      <title>27cb2564-33e7-4cde-bf03-f1c616eed0b6</title>
      <link>https://vulnerability.circl.lu/sighting/27cb2564-33e7-4cde-bf03-f1c616eed0b6/export</link>
      <description>{"uuid": "27cb2564-33e7-4cde-bf03-f1c616eed0b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113957962449273262", "content": "", "creation_timestamp": "2025-02-06T16:48:34.262644Z"}</description>
      <content:encoded>{"uuid": "27cb2564-33e7-4cde-bf03-f1c616eed0b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113957962449273262", "content": "", "creation_timestamp": "2025-02-06T16:48:34.262644Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/27cb2564-33e7-4cde-bf03-f1c616eed0b6/export</guid>
      <pubDate>Thu, 06 Feb 2025 16:48:34 +0000</pubDate>
    </item>
    <item>
      <title>f018baf8-7990-41b5-bb2f-59afd16ffb21</title>
      <link>https://vulnerability.circl.lu/sighting/f018baf8-7990-41b5-bb2f-59afd16ffb21/export</link>
      <description>{"uuid": "f018baf8-7990-41b5-bb2f-59afd16ffb21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ln4jeme2ep27", "content": "", "creation_timestamp": "2025-04-18T21:02:16.038477Z"}</description>
      <content:encoded>{"uuid": "f018baf8-7990-41b5-bb2f-59afd16ffb21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-48445", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ln4jeme2ep27", "content": "", "creation_timestamp": "2025-04-18T21:02:16.038477Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f018baf8-7990-41b5-bb2f-59afd16ffb21/export</guid>
      <pubDate>Fri, 18 Apr 2025 21:02:16 +0000</pubDate>
    </item>
  </channel>
</rss>
