<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T19:12:14.123441+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/be385acf-ec91-4277-903b-4b2fdb648460/export</id>
    <title>be385acf-ec91-4277-903b-4b2fdb648460</title>
    <updated>2026-05-09T19:12:14.512226+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "be385acf-ec91-4277-903b-4b2fdb648460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37396", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17935", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-37395\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A stored cross-site scripting (XSS) vulnerability in the Public Survey function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Survey Title' and 'Survey Instructions' fields. This vulnerability could be exploited by attackers to execute malicious scripts when the survey is accessed through its public link. It is advised to update to version 14.2.1 or later to fix this issue.\n\ud83d\udccf Published: 2025-06-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-10T17:20:28.846Z\n\ud83d\udd17 References:\n1. https://www.evms.edu/research/resources_services/redcap/redcap_change_log/\n2. https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/\n3. https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt", "creation_timestamp": "2025-06-10T17:32:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/be385acf-ec91-4277-903b-4b2fdb648460/export"/>
    <published>2025-06-10T17:32:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/14835a6e-9f61-4e2a-af71-c4950528b0a5/export</id>
    <title>14835a6e-9f61-4e2a-af71-c4950528b0a5</title>
    <updated>2026-05-09T19:12:14.512045+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "14835a6e-9f61-4e2a-af71-c4950528b0a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37396", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17939", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-37396\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A stored cross-site scripting (XSS) vulnerability in the Calendar function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Notes' field of a calendar event. This could lead to the execution of malicious scripts when the event is viewed. Updating to version 14.2.1 or later is recommended to remediate this vulnerability.\n\ud83d\udccf Published: 2025-06-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-10T17:13:45.484Z\n\ud83d\udd17 References:\n1. https://www.evms.edu/research/resources_services/redcap/redcap_change_log/\n2. https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/\n3. https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt", "creation_timestamp": "2025-06-10T17:32:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/14835a6e-9f61-4e2a-af71-c4950528b0a5/export"/>
    <published>2025-06-10T17:32:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d093569c-dd77-4ff8-906b-01b1a16cded8/export</id>
    <title>d093569c-dd77-4ff8-906b-01b1a16cded8</title>
    <updated>2026-05-09T19:12:14.508796+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d093569c-dd77-4ff8-906b-01b1a16cded8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37396", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18083", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-37394\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A stored cross-site scripting (XSS) vulnerability in the Project Dashboards of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Dashboard title' and 'Dashboard content' text boxes. This can lead to the execution of malicious scripts when the dashboard is viewed. Users are recommended to update to version 14.2.1 or later to mitigate this vulnerability.\n\ud83d\udccf Published: 2025-06-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-11T15:07:28.709Z\n\ud83d\udd17 References:\n1. https://www.evms.edu/research/resources_services/redcap/redcap_change_log/\n2. https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/\n3. https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt", "creation_timestamp": "2025-06-11T15:31:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d093569c-dd77-4ff8-906b-01b1a16cded8/export"/>
    <published>2025-06-11T15:31:59+00:00</published>
  </entry>
</feed>
