<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 05:01:45 +0000</lastBuildDate>
    <item>
      <title>a519e41d-ee75-4174-9c6a-baa7deb566af</title>
      <link>https://vulnerability.circl.lu/sighting/a519e41d-ee75-4174-9c6a-baa7deb566af/export</link>
      <description>{"uuid": "a519e41d-ee75-4174-9c6a-baa7deb566af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41706", "type": "seen", "source": "https://t.me/cvedetector/1621", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41706 - Archer Platform Stored Web Scripting Error\", \n  \"Content\": \"CVE ID : CVE-2024-41706 \nPublished : July 25, 2024, 8:15 a.m. | 38\u00a0minutes ago \nDescription : A stored XSS issue was discovered in Archer Platform 6 before version 2024.06. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 P4 (6.14.0.4) is also a fixed release. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-25T11:03:40.000000Z"}</description>
      <content:encoded>{"uuid": "a519e41d-ee75-4174-9c6a-baa7deb566af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41706", "type": "seen", "source": "https://t.me/cvedetector/1621", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41706 - Archer Platform Stored Web Scripting Error\", \n  \"Content\": \"CVE ID : CVE-2024-41706 \nPublished : July 25, 2024, 8:15 a.m. | 38\u00a0minutes ago \nDescription : A stored XSS issue was discovered in Archer Platform 6 before version 2024.06. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 P4 (6.14.0.4) is also a fixed release. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-25T11:03:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a519e41d-ee75-4174-9c6a-baa7deb566af/export</guid>
      <pubDate>Thu, 25 Jul 2024 11:03:40 +0000</pubDate>
    </item>
  </channel>
</rss>
