<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 08:53:51 +0000</lastBuildDate>
    <item>
      <title>27ba0172-a246-4bbe-9074-95506ba07863</title>
      <link>https://vulnerability.circl.lu/sighting/27ba0172-a246-4bbe-9074-95506ba07863/export</link>
      <description>{"uuid": "27ba0172-a246-4bbe-9074-95506ba07863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/cvedetector/10277", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10470 - \"WPLMS/WordPress LMS Arbitrary File Access Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10470 \nPublished : Nov. 9, 2024, 6:15 a.m. | 37\u00a0minutes ago \nDescription : The WPLMS Learning Management System for WordPress, WordPress LMS theme for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation and permissions checks in the readfile and unlink functions in all versions up to, and including, 4.962. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The theme is vulnerable even when it is not activated. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T08:16:12.000000Z"}</description>
      <content:encoded>{"uuid": "27ba0172-a246-4bbe-9074-95506ba07863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/cvedetector/10277", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10470 - \"WPLMS/WordPress LMS Arbitrary File Access Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10470 \nPublished : Nov. 9, 2024, 6:15 a.m. | 37\u00a0minutes ago \nDescription : The WPLMS Learning Management System for WordPress, WordPress LMS theme for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation and permissions checks in the readfile and unlink functions in all versions up to, and including, 4.962. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The theme is vulnerable even when it is not activated. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T08:16:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/27ba0172-a246-4bbe-9074-95506ba07863/export</guid>
      <pubDate>Sat, 09 Nov 2024 08:16:12 +0000</pubDate>
    </item>
    <item>
      <title>e6e71aa5-b7cf-4156-a391-47f7de17c6f1</title>
      <link>https://vulnerability.circl.lu/sighting/e6e71aa5-b7cf-4156-a391-47f7de17c6f1/export</link>
      <description>{"uuid": "e6e71aa5-b7cf-4156-a391-47f7de17c6f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/CyberBulletin/1418", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:20:50.000000Z"}</description>
      <content:encoded>{"uuid": "e6e71aa5-b7cf-4156-a391-47f7de17c6f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/CyberBulletin/1418", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:20:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e6e71aa5-b7cf-4156-a391-47f7de17c6f1/export</guid>
      <pubDate>Sun, 10 Nov 2024 05:20:50 +0000</pubDate>
    </item>
    <item>
      <title>af47b4de-687d-4e88-a930-41489ac1bc75</title>
      <link>https://vulnerability.circl.lu/sighting/af47b4de-687d-4e88-a930-41489ac1bc75/export</link>
      <description>{"uuid": "af47b4de-687d-4e88-a930-41489ac1bc75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/CyberBulletin/26374", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:20:50.000000Z"}</description>
      <content:encoded>{"uuid": "af47b4de-687d-4e88-a930-41489ac1bc75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/CyberBulletin/26374", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:20:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/af47b4de-687d-4e88-a930-41489ac1bc75/export</guid>
      <pubDate>Sun, 10 Nov 2024 05:20:50 +0000</pubDate>
    </item>
    <item>
      <title>12ff3d42-3b6e-48ca-9d6f-f633462d03d4</title>
      <link>https://vulnerability.circl.lu/sighting/12ff3d42-3b6e-48ca-9d6f-f633462d03d4/export</link>
      <description>{"uuid": "12ff3d42-3b6e-48ca-9d6f-f633462d03d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/InfoSecInsider/24349", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:26:07.000000Z"}</description>
      <content:encoded>{"uuid": "12ff3d42-3b6e-48ca-9d6f-f633462d03d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/InfoSecInsider/24349", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:26:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/12ff3d42-3b6e-48ca-9d6f-f633462d03d4/export</guid>
      <pubDate>Sun, 10 Nov 2024 05:26:07 +0000</pubDate>
    </item>
    <item>
      <title>ec10afb7-8608-4823-9115-124eb92c319b</title>
      <link>https://vulnerability.circl.lu/sighting/ec10afb7-8608-4823-9115-124eb92c319b/export</link>
      <description>{"uuid": "ec10afb7-8608-4823-9115-124eb92c319b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "exploited", "source": "https://t.me/InfoSecInsider/673", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:26:08.000000Z"}</description>
      <content:encoded>{"uuid": "ec10afb7-8608-4823-9115-124eb92c319b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "exploited", "source": "https://t.me/InfoSecInsider/673", "content": "\u26a1\ufe0fCVE-2024-10470 (CVSS 9.8) in Popular WordPress Theme Exposes Thousands of Sites.\n\n#CyberBulletin", "creation_timestamp": "2024-11-10T05:26:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ec10afb7-8608-4823-9115-124eb92c319b/export</guid>
      <pubDate>Sun, 10 Nov 2024 05:26:08 +0000</pubDate>
    </item>
    <item>
      <title>1ea40e81-bcd7-4011-8825-cf6446afe7bc</title>
      <link>https://vulnerability.circl.lu/sighting/1ea40e81-bcd7-4011-8825-cf6446afe7bc/export</link>
      <description>{"uuid": "1ea40e81-bcd7-4011-8825-cf6446afe7bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/hackyourmom/9623", "content": "\ud83d\udc40 \u0423 \u0442\u0435\u043c\u0456 WPLMS \u0434\u043b\u044f WordPress \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u0443 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u0456\u0441\u0442\u044c (CVE-2024-10470), \u044f\u043a\u0430 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0432\u0456\u0434\u0434\u0430\u043b\u0435\u043d\u0435 \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f \u043a\u043e\u0434\u0443 (RCE) \u2139\ufe0f \u0411\u0456\u043b\u044c\u0448\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u0438\u0446\u044c \ud83d\udc48", "creation_timestamp": "2024-11-12T14:16:36.000000Z"}</description>
      <content:encoded>{"uuid": "1ea40e81-bcd7-4011-8825-cf6446afe7bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10470", "type": "seen", "source": "https://t.me/hackyourmom/9623", "content": "\ud83d\udc40 \u0423 \u0442\u0435\u043c\u0456 WPLMS \u0434\u043b\u044f WordPress \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u0443 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u0456\u0441\u0442\u044c (CVE-2024-10470), \u044f\u043a\u0430 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0432\u0456\u0434\u0434\u0430\u043b\u0435\u043d\u0435 \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f \u043a\u043e\u0434\u0443 (RCE) \u2139\ufe0f \u0411\u0456\u043b\u044c\u0448\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u0438\u0446\u044c \ud83d\udc48", "creation_timestamp": "2024-11-12T14:16:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1ea40e81-bcd7-4011-8825-cf6446afe7bc/export</guid>
      <pubDate>Tue, 12 Nov 2024 14:16:36 +0000</pubDate>
    </item>
    <item>
      <title>4ad1b398-d6ae-4484-b4fd-0b114fb699cf</title>
      <link>https://vulnerability.circl.lu/sighting/4ad1b398-d6ae-4484-b4fd-0b114fb699cf/export</link>
      <description>{"uuid": "4ad1b398-d6ae-4484-b4fd-0b114fb699cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10471", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113547774089547106", "content": "", "creation_timestamp": "2024-11-26T06:12:14.162000Z"}</description>
      <content:encoded>{"uuid": "4ad1b398-d6ae-4484-b4fd-0b114fb699cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10471", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113547774089547106", "content": "", "creation_timestamp": "2024-11-26T06:12:14.162000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4ad1b398-d6ae-4484-b4fd-0b114fb699cf/export</guid>
      <pubDate>Tue, 26 Nov 2024 06:12:14 +0000</pubDate>
    </item>
    <item>
      <title>34fcb67d-33af-4cbf-955c-5bef144fd8e7</title>
      <link>https://vulnerability.circl.lu/sighting/34fcb67d-33af-4cbf-955c-5bef144fd8e7/export</link>
      <description>{"uuid": "34fcb67d-33af-4cbf-955c-5bef144fd8e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10473", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113559074245551753", "content": "", "creation_timestamp": "2024-11-28T06:06:00.575973Z"}</description>
      <content:encoded>{"uuid": "34fcb67d-33af-4cbf-955c-5bef144fd8e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10473", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113559074245551753", "content": "", "creation_timestamp": "2024-11-28T06:06:00.575973Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/34fcb67d-33af-4cbf-955c-5bef144fd8e7/export</guid>
      <pubDate>Thu, 28 Nov 2024 06:06:00 +0000</pubDate>
    </item>
    <item>
      <title>2fa58716-4c9a-4e95-a1f5-997544ae2feb</title>
      <link>https://vulnerability.circl.lu/sighting/2fa58716-4c9a-4e95-a1f5-997544ae2feb/export</link>
      <description>{"uuid": "2fa58716-4c9a-4e95-a1f5-997544ae2feb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10476", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113668837652655192", "content": "", "creation_timestamp": "2024-12-17T15:20:17.358400Z"}</description>
      <content:encoded>{"uuid": "2fa58716-4c9a-4e95-a1f5-997544ae2feb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10476", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113668837652655192", "content": "", "creation_timestamp": "2024-12-17T15:20:17.358400Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2fa58716-4c9a-4e95-a1f5-997544ae2feb/export</guid>
      <pubDate>Tue, 17 Dec 2024 15:20:17 +0000</pubDate>
    </item>
    <item>
      <title>583a6fa8-987b-4df9-8c3f-8df6df59874c</title>
      <link>https://vulnerability.circl.lu/sighting/583a6fa8-987b-4df9-8c3f-8df6df59874c/export</link>
      <description>{"uuid": "583a6fa8-987b-4df9-8c3f-8df6df59874c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10476", "type": "seen", "source": "https://t.me/cvedetector/13113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10476 - BD Diagnostic Solutions Default Credentials Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10476 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : Default credentials are used in the above listed BD Diagnostic Solutions products. If exploited, threat actors may be able to access, modify or delete data, including sensitive information such as protected health information (PHI) and personally identifiable information (PII). Exploitation of this vulnerability may allow an attacker to shut down or otherwise impact the availability of the system. Note: BD Synapsys\u2122 Informatics  \nSolution is only in scope of  \nthis vulnerability when  \ninstalled on a NUC server. BD Synapsys\u2122  \nInformatics Solution installed  \non a customer-provided virtual machine or on the BD Kiestra\u2122 SCU hardware is  \nnot in scope. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:37:01.000000Z"}</description>
      <content:encoded>{"uuid": "583a6fa8-987b-4df9-8c3f-8df6df59874c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10476", "type": "seen", "source": "https://t.me/cvedetector/13113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10476 - BD Diagnostic Solutions Default Credentials Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10476 \nPublished : Dec. 17, 2024, 4:15 p.m. | 19\u00a0minutes ago \nDescription : Default credentials are used in the above listed BD Diagnostic Solutions products. If exploited, threat actors may be able to access, modify or delete data, including sensitive information such as protected health information (PHI) and personally identifiable information (PII). Exploitation of this vulnerability may allow an attacker to shut down or otherwise impact the availability of the system. Note: BD Synapsys\u2122 Informatics  \nSolution is only in scope of  \nthis vulnerability when  \ninstalled on a NUC server. BD Synapsys\u2122  \nInformatics Solution installed  \non a customer-provided virtual machine or on the BD Kiestra\u2122 SCU hardware is  \nnot in scope. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-17T17:37:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/583a6fa8-987b-4df9-8c3f-8df6df59874c/export</guid>
      <pubDate>Tue, 17 Dec 2024 17:37:01 +0000</pubDate>
    </item>
  </channel>
</rss>
