<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T12:56:35.577245+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/89a13971-bc72-487f-87a4-b77961e592d8/export</id>
    <title>89a13971-bc72-487f-87a4-b77961e592d8</title>
    <updated>2026-05-10T12:56:35.831432+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "89a13971-bc72-487f-87a4-b77961e592d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54046", "type": "seen", "source": "https://t.me/cvedetector/12571", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54046 - Adobe Connect Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-54046 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/89a13971-bc72-487f-87a4-b77961e592d8/export"/>
    <published>2024-12-10T23:20:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/30a2af02-7442-44d7-b3ab-d7473f451e62/export</id>
    <title>30a2af02-7442-44d7-b3ab-d7473f451e62</title>
    <updated>2026-05-10T12:56:35.831348+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "30a2af02-7442-44d7-b3ab-d7473f451e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54045", "type": "seen", "source": "https://t.me/cvedetector/12573", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54045 - Adobe Connect Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-54045 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/30a2af02-7442-44d7-b3ab-d7473f451e62/export"/>
    <published>2024-12-10T23:20:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bdf66985-b686-4813-b679-34c415f12f1d/export</id>
    <title>bdf66985-b686-4813-b679-34c415f12f1d</title>
    <updated>2026-05-10T12:56:35.831264+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bdf66985-b686-4813-b679-34c415f12f1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54047", "type": "seen", "source": "https://t.me/cvedetector/12574", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54047 - Adobe Connect Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-54047 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bdf66985-b686-4813-b679-34c415f12f1d/export"/>
    <published>2024-12-10T23:20:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/db233059-55fa-4391-a82d-1f695baf08a1/export</id>
    <title>db233059-55fa-4391-a82d-1f695baf08a1</title>
    <updated>2026-05-10T12:56:35.831178+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "db233059-55fa-4391-a82d-1f695baf08a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54048", "type": "seen", "source": "https://t.me/cvedetector/12575", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54048 - Adobe Connect Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-54048 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/db233059-55fa-4391-a82d-1f695baf08a1/export"/>
    <published>2024-12-10T23:20:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8ff0fead-a499-46ce-ac9e-a3189085fb92/export</id>
    <title>8ff0fead-a499-46ce-ac9e-a3189085fb92</title>
    <updated>2026-05-10T12:56:35.831092+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8ff0fead-a499-46ce-ac9e-a3189085fb92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54049", "type": "seen", "source": "https://t.me/cvedetector/12576", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54049 - Adobe Connect Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-54049 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:39.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8ff0fead-a499-46ce-ac9e-a3189085fb92/export"/>
    <published>2024-12-10T23:20:39+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0549a572-6219-4d30-a6c4-d3ffb89cb267/export</id>
    <title>0549a572-6219-4d30-a6c4-d3ffb89cb267</title>
    <updated>2026-05-10T12:56:35.831000+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0549a572-6219-4d30-a6c4-d3ffb89cb267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54040", "type": "seen", "source": "https://t.me/cvedetector/12579", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54040 - Adobe Connect Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54040 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0549a572-6219-4d30-a6c4-d3ffb89cb267/export"/>
    <published>2024-12-10T23:20:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a8a6eb60-b5da-481f-8bc4-11ebfc25b33f/export</id>
    <title>a8a6eb60-b5da-481f-8bc4-11ebfc25b33f</title>
    <updated>2026-05-10T12:56:35.830908+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a8a6eb60-b5da-481f-8bc4-11ebfc25b33f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54041", "type": "seen", "source": "https://t.me/cvedetector/12580", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54041 - Adobe Connect Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54041 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a8a6eb60-b5da-481f-8bc4-11ebfc25b33f/export"/>
    <published>2024-12-10T23:20:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9a62fe52-fa3b-4155-8bcf-9b8d28492e3f/export</id>
    <title>9a62fe52-fa3b-4155-8bcf-9b8d28492e3f</title>
    <updated>2026-05-10T12:56:35.830806+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9a62fe52-fa3b-4155-8bcf-9b8d28492e3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54042", "type": "seen", "source": "https://t.me/cvedetector/12581", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54042 - Adobe Connect Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-54042 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9a62fe52-fa3b-4155-8bcf-9b8d28492e3f/export"/>
    <published>2024-12-10T23:20:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6c5373e8-fe40-4b09-bd3e-7346c5561cc6/export</id>
    <title>6c5373e8-fe40-4b09-bd3e-7346c5561cc6</title>
    <updated>2026-05-10T12:56:35.830670+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6c5373e8-fe40-4b09-bd3e-7346c5561cc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54043", "type": "seen", "source": "https://t.me/cvedetector/12582", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54043 - Adobe Connect Reflected Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54043 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6c5373e8-fe40-4b09-bd3e-7346c5561cc6/export"/>
    <published>2024-12-10T23:20:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/67746ca5-479f-41ce-95ca-0af2bbbf5382/export</id>
    <title>67746ca5-479f-41ce-95ca-0af2bbbf5382</title>
    <updated>2026-05-10T12:56:35.828446+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "67746ca5-479f-41ce-95ca-0af2bbbf5382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54044", "type": "seen", "source": "https://t.me/cvedetector/12583", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54044 - Adobe Connect Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-54044 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/67746ca5-479f-41ce-95ca-0af2bbbf5382/export"/>
    <published>2024-12-10T23:20:48+00:00</published>
  </entry>
</feed>
