<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 15:50:18 +0000</lastBuildDate>
    <item>
      <title>93ff6ebe-90bb-4f14-94cd-785cb301cc1d</title>
      <link>https://vulnerability.circl.lu/sighting/93ff6ebe-90bb-4f14-94cd-785cb301cc1d/export</link>
      <description>{"uuid": "93ff6ebe-90bb-4f14-94cd-785cb301cc1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/CyberBulletin/1036", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:12:34.000000Z"}</description>
      <content:encoded>{"uuid": "93ff6ebe-90bb-4f14-94cd-785cb301cc1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/CyberBulletin/1036", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:12:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/93ff6ebe-90bb-4f14-94cd-785cb301cc1d/export</guid>
      <pubDate>Fri, 04 Oct 2024 14:12:34 +0000</pubDate>
    </item>
    <item>
      <title>f31bf4e2-20e9-44b2-b53e-8e831bb793c2</title>
      <link>https://vulnerability.circl.lu/sighting/f31bf4e2-20e9-44b2-b53e-8e831bb793c2/export</link>
      <description>{"uuid": "f31bf4e2-20e9-44b2-b53e-8e831bb793c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/CyberBulletin/25931", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:12:34.000000Z"}</description>
      <content:encoded>{"uuid": "f31bf4e2-20e9-44b2-b53e-8e831bb793c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/CyberBulletin/25931", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:12:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f31bf4e2-20e9-44b2-b53e-8e831bb793c2/export</guid>
      <pubDate>Fri, 04 Oct 2024 14:12:34 +0000</pubDate>
    </item>
    <item>
      <title>265d6335-e381-4801-bc4d-e7bb1ab1d42f</title>
      <link>https://vulnerability.circl.lu/sighting/265d6335-e381-4801-bc4d-e7bb1ab1d42f/export</link>
      <description>{"uuid": "265d6335-e381-4801-bc4d-e7bb1ab1d42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/InfoSecInsider/24006", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:16:22.000000Z"}</description>
      <content:encoded>{"uuid": "265d6335-e381-4801-bc4d-e7bb1ab1d42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/InfoSecInsider/24006", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:16:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/265d6335-e381-4801-bc4d-e7bb1ab1d42f/export</guid>
      <pubDate>Fri, 04 Oct 2024 14:16:22 +0000</pubDate>
    </item>
    <item>
      <title>ff190ca4-cf83-4bd4-a107-41bae75651f9</title>
      <link>https://vulnerability.circl.lu/sighting/ff190ca4-cf83-4bd4-a107-41bae75651f9/export</link>
      <description>{"uuid": "ff190ca4-cf83-4bd4-a107-41bae75651f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/InfoSecInsider/448", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:16:24.000000Z"}</description>
      <content:encoded>{"uuid": "ff190ca4-cf83-4bd4-a107-41bae75651f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "seen", "source": "https://t.me/InfoSecInsider/448", "content": "\u26a1\ufe0fCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM.\n\n#CyberBulletin", "creation_timestamp": "2024-10-04T14:16:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ff190ca4-cf83-4bd4-a107-41bae75651f9/export</guid>
      <pubDate>Fri, 04 Oct 2024 14:16:24 +0000</pubDate>
    </item>
    <item>
      <title>62c3c434-d06e-4a98-a6ea-2442de9128d4</title>
      <link>https://vulnerability.circl.lu/sighting/62c3c434-d06e-4a98-a6ea-2442de9128d4/export</link>
      <description>{"uuid": "62c3c434-d06e-4a98-a6ea-2442de9128d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15197", "content": "\u200aCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM\n\nhttps://securityonline.info/cve-2024-5102-avast-antivirus-flaw-could-allow-hackers-to-delete-files-and-run-code-as-system/", "creation_timestamp": "2024-10-05T17:00:35.000000Z"}</description>
      <content:encoded>{"uuid": "62c3c434-d06e-4a98-a6ea-2442de9128d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5102", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15197", "content": "\u200aCVE-2024-5102: Avast Antivirus Flaw Could Allow Hackers to Delete Files and Run Code as SYSTEM\n\nhttps://securityonline.info/cve-2024-5102-avast-antivirus-flaw-could-allow-hackers-to-delete-files-and-run-code-as-system/", "creation_timestamp": "2024-10-05T17:00:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/62c3c434-d06e-4a98-a6ea-2442de9128d4/export</guid>
      <pubDate>Sat, 05 Oct 2024 17:00:35 +0000</pubDate>
    </item>
    <item>
      <title>6382e05d-5d3d-43a2-b2d0-f0cd030c52df</title>
      <link>https://vulnerability.circl.lu/sighting/6382e05d-5d3d-43a2-b2d0-f0cd030c52df/export</link>
      <description>{"uuid": "6382e05d-5d3d-43a2-b2d0-f0cd030c52df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51024", "type": "seen", "source": "https://t.me/cvedetector/9882", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51024 - D-Link DIR-823G Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51024 \nPublished : Nov. 5, 2024, 3:15 p.m. | 40\u00a0minutes ago \nDescription : D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the HostName parameter in the SetWanSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T17:13:11.000000Z"}</description>
      <content:encoded>{"uuid": "6382e05d-5d3d-43a2-b2d0-f0cd030c52df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51024", "type": "seen", "source": "https://t.me/cvedetector/9882", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51024 - D-Link DIR-823G Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51024 \nPublished : Nov. 5, 2024, 3:15 p.m. | 40\u00a0minutes ago \nDescription : D-Link DIR_823G 1.0.2B05 was discovered to contain a command injection vulnerability via the HostName parameter in the SetWanSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T17:13:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6382e05d-5d3d-43a2-b2d0-f0cd030c52df/export</guid>
      <pubDate>Tue, 05 Nov 2024 17:13:11 +0000</pubDate>
    </item>
    <item>
      <title>38c5ce6d-7292-4060-ae0d-45f99c2ff0ca</title>
      <link>https://vulnerability.circl.lu/sighting/38c5ce6d-7292-4060-ae0d-45f99c2ff0ca/export</link>
      <description>{"uuid": "38c5ce6d-7292-4060-ae0d-45f99c2ff0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51026", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113466252528085696", "content": "", "creation_timestamp": "2024-11-11T20:40:15.920219Z"}</description>
      <content:encoded>{"uuid": "38c5ce6d-7292-4060-ae0d-45f99c2ff0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51026", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113466252528085696", "content": "", "creation_timestamp": "2024-11-11T20:40:15.920219Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/38c5ce6d-7292-4060-ae0d-45f99c2ff0ca/export</guid>
      <pubDate>Mon, 11 Nov 2024 20:40:15 +0000</pubDate>
    </item>
    <item>
      <title>7d573a4c-9367-4400-a8e5-a687a90ce8eb</title>
      <link>https://vulnerability.circl.lu/sighting/7d573a4c-9367-4400-a8e5-a687a90ce8eb/export</link>
      <description>{"uuid": "7d573a4c-9367-4400-a8e5-a687a90ce8eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51026", "type": "seen", "source": "https://t.me/cvedetector/10547", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51026 - NetAdmin IAM Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51026 \nPublished : Nov. 11, 2024, 9:15 p.m. | 27\u00a0minutes ago \nDescription : The NetAdmin IAM system (version 4.0.30319) has a Cross Site Scripting (XSS) vulnerability in the /BalloonSave.ashx endpoint, where it is possible to inject a malicious payload into the Content= field. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T22:48:07.000000Z"}</description>
      <content:encoded>{"uuid": "7d573a4c-9367-4400-a8e5-a687a90ce8eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51026", "type": "seen", "source": "https://t.me/cvedetector/10547", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51026 - NetAdmin IAM Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51026 \nPublished : Nov. 11, 2024, 9:15 p.m. | 27\u00a0minutes ago \nDescription : The NetAdmin IAM system (version 4.0.30319) has a Cross Site Scripting (XSS) vulnerability in the /BalloonSave.ashx endpoint, where it is possible to inject a malicious payload into the Content= field. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T22:48:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7d573a4c-9367-4400-a8e5-a687a90ce8eb/export</guid>
      <pubDate>Mon, 11 Nov 2024 22:48:07 +0000</pubDate>
    </item>
    <item>
      <title>8c1d8857-1738-4692-a051-e363efe46fb2</title>
      <link>https://vulnerability.circl.lu/sighting/8c1d8857-1738-4692-a051-e363efe46fb2/export</link>
      <description>{"uuid": "8c1d8857-1738-4692-a051-e363efe46fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51027", "type": "seen", "source": "https://t.me/cvedetector/10897", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51027 - Ruijie NBR800G Gateway Authenticated Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51027 \nPublished : Nov. 13, 2024, 10:15 p.m. | 33\u00a0minutes ago \nDescription : Ruijie NBR800G gateway NBR_RGOS_11.1(6)B4P9 is vulnerable to command execution in /itbox_pi/networksafe.php via the province parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T23:55:58.000000Z"}</description>
      <content:encoded>{"uuid": "8c1d8857-1738-4692-a051-e363efe46fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51027", "type": "seen", "source": "https://t.me/cvedetector/10897", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51027 - Ruijie NBR800G Gateway Authenticated Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51027 \nPublished : Nov. 13, 2024, 10:15 p.m. | 33\u00a0minutes ago \nDescription : Ruijie NBR800G gateway NBR_RGOS_11.1(6)B4P9 is vulnerable to command execution in /itbox_pi/networksafe.php via the province parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T23:55:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8c1d8857-1738-4692-a051-e363efe46fb2/export</guid>
      <pubDate>Wed, 13 Nov 2024 23:55:58 +0000</pubDate>
    </item>
  </channel>
</rss>
