<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T03:17:34.569127+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/08baf1bb-3b59-453a-9190-398336ea7d99/export</id>
    <title>08baf1bb-3b59-453a-9190-398336ea7d99</title>
    <updated>2026-05-10T03:17:34.829092+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "08baf1bb-3b59-453a-9190-398336ea7d99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50467", "type": "seen", "source": "https://t.me/cvedetector/9156", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50467 - WebXApp Scrollbar Stored Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-50467 \nPublished : Oct. 28, 2024, 6:15 p.m. | 44\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WebXApp Scrollbar by webxapp \u2013 Best vertical/horizontal scrollbars plugin allows Stored XSS.This issue affects Scrollbar by webxapp \u2013 Best vertical/horizontal scrollbars plugin: from n/a through 1.3.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T20:20:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/08baf1bb-3b59-453a-9190-398336ea7d99/export"/>
    <published>2024-10-28T20:20:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2d09c458-7dc6-4ccc-b0b8-53c372adb073/export</id>
    <title>2d09c458-7dc6-4ccc-b0b8-53c372adb073</title>
    <updated>2026-05-10T03:17:34.829004+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2d09c458-7dc6-4ccc-b0b8-53c372adb073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50468", "type": "seen", "source": "https://t.me/cvedetector/9157", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50468 - Raptor Editor DOM-Based Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-50468 \nPublished : Oct. 28, 2024, 6:15 p.m. | 44\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Robinson Raptor Editor allows DOM-Based XSS.This issue affects Raptor Editor: from n/a through 1.0.20. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T20:20:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2d09c458-7dc6-4ccc-b0b8-53c372adb073/export"/>
    <published>2024-10-28T20:20:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d6e5d718-c59f-4fb8-acb6-ab058ac1c931/export</id>
    <title>d6e5d718-c59f-4fb8-acb6-ab058ac1c931</title>
    <updated>2026-05-10T03:17:34.828924+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d6e5d718-c59f-4fb8-acb6-ab058ac1c931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50460", "type": "seen", "source": "https://t.me/cvedetector/9158", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50460 - FirelightWP Firelight Lightbox Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50460 \nPublished : Oct. 28, 2024, 6:15 p.m. | 44\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in FirelightWP Firelight Lightbox allows Stored XSS.This issue affects Firelight Lightbox: from n/a through 2.3.3. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T20:21:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d6e5d718-c59f-4fb8-acb6-ab058ac1c931/export"/>
    <published>2024-10-28T20:21:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8eb49f4c-781d-43f6-8938-c2519e59e4f4/export</id>
    <title>8eb49f4c-781d-43f6-8938-c2519e59e4f4</title>
    <updated>2026-05-10T03:17:34.828840+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8eb49f4c-781d-43f6-8938-c2519e59e4f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50461", "type": "seen", "source": "https://t.me/cvedetector/9159", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50461 - WPDeveloper EmbedPress Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50461 \nPublished : Oct. 28, 2024, 6:15 p.m. | 44\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloper EmbedPress allows Stored XSS.This issue affects EmbedPress: from n/a through 4.0.14. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T20:21:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8eb49f4c-781d-43f6-8938-c2519e59e4f4/export"/>
    <published>2024-10-28T20:21:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5e49f85b-21f8-40c4-b0ab-9375975a7983/export</id>
    <title>5e49f85b-21f8-40c4-b0ab-9375975a7983</title>
    <updated>2026-05-10T03:17:34.828739+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5e49f85b-21f8-40c4-b0ab-9375975a7983", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50462", "type": "seen", "source": "https://t.me/cvedetector/9160", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50462 - Fla-shop Interactive World Map Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50462 \nPublished : Oct. 28, 2024, 6:15 p.m. | 44\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Fla-shop Interactive World Map allows Stored XSS.This issue affects Interactive World Map: from n/a through 3.4.4. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T20:21:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5e49f85b-21f8-40c4-b0ab-9375975a7983/export"/>
    <published>2024-10-28T20:21:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4f1cf97f-8415-41f8-8178-c0d5a508f471/export</id>
    <title>4f1cf97f-8415-41f8-8178-c0d5a508f471</title>
    <updated>2026-05-10T03:17:34.828634+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4f1cf97f-8415-41f8-8178-c0d5a508f471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50466", "type": "seen", "source": "https://t.me/cvedetector/9349", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50466 - DarkMySite Advanced Dark Mode Plugin for WordPress CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-50466 \nPublished : Oct. 29, 2024, 5:15 p.m. | 39\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in DarkMySite DarkMySite \u2013 Advanced Dark Mode Plugin for WordPress darkmysite allows Cross Site Request Forgery.This issue affects DarkMySite \u2013 Advanced Dark Mode Plugin for WordPress: from n/a through 1.2.8. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T18:57:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4f1cf97f-8415-41f8-8178-c0d5a508f471/export"/>
    <published>2024-10-29T18:57:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/05e23762-46a3-4ee7-b965-93d34d75fa97/export</id>
    <title>05e23762-46a3-4ee7-b965-93d34d75fa97</title>
    <updated>2026-05-10T03:17:34.828529+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "05e23762-46a3-4ee7-b965-93d34d75fa97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5046", "type": "seen", "source": "Telegram/YoFLhPndb3wF0ifsiu_2WHPFo0RygxLpIJMzggH-GFFwHPc3", "content": "", "creation_timestamp": "2025-02-14T09:46:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/05e23762-46a3-4ee7-b965-93d34d75fa97/export"/>
    <published>2025-02-14T09:46:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d3eadb37-b84a-455f-aa5a-3651065ff9e8/export</id>
    <title>d3eadb37-b84a-455f-aa5a-3651065ff9e8</title>
    <updated>2026-05-10T03:17:34.828431+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d3eadb37-b84a-455f-aa5a-3651065ff9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50465", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d3eadb37-b84a-455f-aa5a-3651065ff9e8/export"/>
    <published>2025-10-01T18:11:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1818c22d-49b3-4d52-a92b-e08ca54339a3/export</id>
    <title>1818c22d-49b3-4d52-a92b-e08ca54339a3</title>
    <updated>2026-05-10T03:17:34.828293+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1818c22d-49b3-4d52-a92b-e08ca54339a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50465", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1818c22d-49b3-4d52-a92b-e08ca54339a3/export"/>
    <published>2025-10-08T21:59:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/557de00a-1fa2-4b30-8131-0cf24a14b87b/export</id>
    <title>557de00a-1fa2-4b30-8131-0cf24a14b87b</title>
    <updated>2026-05-10T03:17:34.826042+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "557de00a-1fa2-4b30-8131-0cf24a14b87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50465", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mk6h36s36d2p", "content": "", "creation_timestamp": "2026-04-23T16:37:07.735654Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/557de00a-1fa2-4b30-8131-0cf24a14b87b/export"/>
    <published>2026-04-23T16:37:07.735654+00:00</published>
  </entry>
</feed>
