<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 15:53:44 +0000</lastBuildDate>
    <item>
      <title>596c4cd9-a1a0-4ac0-b2e7-38e8cee3e01c</title>
      <link>https://vulnerability.circl.lu/sighting/596c4cd9-a1a0-4ac0-b2e7-38e8cee3e01c/export</link>
      <description>{"uuid": "596c4cd9-a1a0-4ac0-b2e7-38e8cee3e01c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43329", "type": "seen", "source": "https://t.me/cvedetector/3455", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43329 - WP Chill Allegiant Allegiant Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-43329 \nPublished : Aug. 18, 2024, 2:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Chill Allegiant allegiant allows Stored XSS.This issue affects Allegiant: from n/a through 1.2.7. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T16:36:20.000000Z"}</description>
      <content:encoded>{"uuid": "596c4cd9-a1a0-4ac0-b2e7-38e8cee3e01c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43329", "type": "seen", "source": "https://t.me/cvedetector/3455", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43329 - WP Chill Allegiant Allegiant Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-43329 \nPublished : Aug. 18, 2024, 2:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Chill Allegiant allegiant allows Stored XSS.This issue affects Allegiant: from n/a through 1.2.7. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T16:36:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/596c4cd9-a1a0-4ac0-b2e7-38e8cee3e01c/export</guid>
      <pubDate>Sun, 18 Aug 2024 16:36:20 +0000</pubDate>
    </item>
    <item>
      <title>fe550e3b-8ac4-4a9d-8a2b-14a76adc7fec</title>
      <link>https://vulnerability.circl.lu/sighting/fe550e3b-8ac4-4a9d-8a2b-14a76adc7fec/export</link>
      <description>{"uuid": "fe550e3b-8ac4-4a9d-8a2b-14a76adc7fec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43327", "type": "seen", "source": "https://t.me/cvedetector/3456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43327 - Boone Gorges Invite Anyone Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-43327 \nPublished : Aug. 18, 2024, 2:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Boone Gorges Invite Anyone allows Reflected XSS.This issue affects Invite Anyone: from n/a through 1.4.7. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T16:36:21.000000Z"}</description>
      <content:encoded>{"uuid": "fe550e3b-8ac4-4a9d-8a2b-14a76adc7fec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43327", "type": "seen", "source": "https://t.me/cvedetector/3456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43327 - Boone Gorges Invite Anyone Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-43327 \nPublished : Aug. 18, 2024, 2:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Boone Gorges Invite Anyone allows Reflected XSS.This issue affects Invite Anyone: from n/a through 1.4.7. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T16:36:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fe550e3b-8ac4-4a9d-8a2b-14a76adc7fec/export</guid>
      <pubDate>Sun, 18 Aug 2024 16:36:21 +0000</pubDate>
    </item>
    <item>
      <title>715de82d-920c-46c4-ada0-9d7fbcd394fc</title>
      <link>https://vulnerability.circl.lu/sighting/715de82d-920c-46c4-ada0-9d7fbcd394fc/export</link>
      <description>{"uuid": "715de82d-920c-46c4-ada0-9d7fbcd394fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43324", "type": "seen", "source": "https://t.me/cvedetector/3459", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43324 - CleverSoft Clever Addons for Elementor Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43324 \nPublished : Aug. 18, 2024, 2:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CleverSoft Clever Addons for Elementor allows Stored XSS.This issue affects Clever Addons for Elementor: from n/a through 2.2.0. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T16:36:27.000000Z"}</description>
      <content:encoded>{"uuid": "715de82d-920c-46c4-ada0-9d7fbcd394fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43324", "type": "seen", "source": "https://t.me/cvedetector/3459", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43324 - CleverSoft Clever Addons for Elementor Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43324 \nPublished : Aug. 18, 2024, 2:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CleverSoft Clever Addons for Elementor allows Stored XSS.This issue affects Clever Addons for Elementor: from n/a through 2.2.0. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T16:36:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/715de82d-920c-46c4-ada0-9d7fbcd394fc/export</guid>
      <pubDate>Sun, 18 Aug 2024 16:36:27 +0000</pubDate>
    </item>
    <item>
      <title>794f3890-3d62-4dd4-98a9-da0d087f489d</title>
      <link>https://vulnerability.circl.lu/sighting/794f3890-3d62-4dd4-98a9-da0d087f489d/export</link>
      <description>{"uuid": "794f3890-3d62-4dd4-98a9-da0d087f489d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43320", "type": "seen", "source": "https://t.me/cvedetector/3462", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43320 - Livemesh Addons for WPBakery Page Builder Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-43320 \nPublished : Aug. 18, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Livemesh Livemesh Addons for WPBakery Page Builder addons-for-visual-composer allows Stored XSS.This issue affects Livemesh Addons for WPBakery Page Builder: from n/a through 3.9. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T18:16:50.000000Z"}</description>
      <content:encoded>{"uuid": "794f3890-3d62-4dd4-98a9-da0d087f489d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43320", "type": "seen", "source": "https://t.me/cvedetector/3462", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43320 - Livemesh Addons for WPBakery Page Builder Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-43320 \nPublished : Aug. 18, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Livemesh Livemesh Addons for WPBakery Page Builder addons-for-visual-composer allows Stored XSS.This issue affects Livemesh Addons for WPBakery Page Builder: from n/a through 3.9. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T18:16:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/794f3890-3d62-4dd4-98a9-da0d087f489d/export</guid>
      <pubDate>Sun, 18 Aug 2024 18:16:50 +0000</pubDate>
    </item>
    <item>
      <title>ed95ac96-64b6-494c-986e-894047baba84</title>
      <link>https://vulnerability.circl.lu/sighting/ed95ac96-64b6-494c-986e-894047baba84/export</link>
      <description>{"uuid": "ed95ac96-64b6-494c-986e-894047baba84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43321", "type": "seen", "source": "https://t.me/cvedetector/3464", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43321 - PickPlugins Team Showcase Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43321 \nPublished : Aug. 18, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Team Showcase allows Stored XSS.This issue affects Team Showcase: from n/a through 1.22.23. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T18:16:52.000000Z"}</description>
      <content:encoded>{"uuid": "ed95ac96-64b6-494c-986e-894047baba84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43321", "type": "seen", "source": "https://t.me/cvedetector/3464", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43321 - PickPlugins Team Showcase Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43321 \nPublished : Aug. 18, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Team Showcase allows Stored XSS.This issue affects Team Showcase: from n/a through 1.22.23. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-18T18:16:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ed95ac96-64b6-494c-986e-894047baba84/export</guid>
      <pubDate>Sun, 18 Aug 2024 18:16:52 +0000</pubDate>
    </item>
    <item>
      <title>74f11c27-6639-4711-b9a5-e44fee1412a3</title>
      <link>https://vulnerability.circl.lu/sighting/74f11c27-6639-4711-b9a5-e44fee1412a3/export</link>
      <description>{"uuid": "74f11c27-6639-4711-b9a5-e44fee1412a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43322", "type": "seen", "source": "https://t.me/cvedetector/3482", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43322 - Zephyr Project Manager Credentials Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-43322 \nPublished : Aug. 18, 2024, 10:15 p.m. | 34\u00a0minutes ago \nDescription : Authorization Bypass Through User-Controlled Key vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.100. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T00:58:25.000000Z"}</description>
      <content:encoded>{"uuid": "74f11c27-6639-4711-b9a5-e44fee1412a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43322", "type": "seen", "source": "https://t.me/cvedetector/3482", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43322 - Zephyr Project Manager Credentials Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-43322 \nPublished : Aug. 18, 2024, 10:15 p.m. | 34\u00a0minutes ago \nDescription : Authorization Bypass Through User-Controlled Key vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.100. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T00:58:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/74f11c27-6639-4711-b9a5-e44fee1412a3/export</guid>
      <pubDate>Mon, 19 Aug 2024 00:58:25 +0000</pubDate>
    </item>
    <item>
      <title>74940a3c-ccf2-4754-919a-d112d4b076f8</title>
      <link>https://vulnerability.circl.lu/sighting/74940a3c-ccf2-4754-919a-d112d4b076f8/export</link>
      <description>{"uuid": "74940a3c-ccf2-4754-919a-d112d4b076f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43326", "type": "seen", "source": "https://t.me/cvedetector/3562", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43326 - Jamie Bergen Plugin Notes Plus Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43326 \nPublished : Aug. 19, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Jamie Bergen Plugin Notes Plus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Plugin Notes Plus: from n/a through 1.2.7. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T22:43:31.000000Z"}</description>
      <content:encoded>{"uuid": "74940a3c-ccf2-4754-919a-d112d4b076f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43326", "type": "seen", "source": "https://t.me/cvedetector/3562", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43326 - Jamie Bergen Plugin Notes Plus Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43326 \nPublished : Aug. 19, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Jamie Bergen Plugin Notes Plus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Plugin Notes Plus: from n/a through 1.2.7. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T22:43:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/74940a3c-ccf2-4754-919a-d112d4b076f8/export</guid>
      <pubDate>Mon, 19 Aug 2024 22:43:31 +0000</pubDate>
    </item>
    <item>
      <title>89fb7c18-7081-41c2-82d7-6cbaa0fbde69</title>
      <link>https://vulnerability.circl.lu/sighting/89fb7c18-7081-41c2-82d7-6cbaa0fbde69/export</link>
      <description>{"uuid": "89fb7c18-7081-41c2-82d7-6cbaa0fbde69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43328", "type": "seen", "source": "https://t.me/cvedetector/3564", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43328 - EmbedPress Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43328 \nPublished : Aug. 19, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPDeveloper EmbedPress allows PHP Local File Inclusion.This issue affects EmbedPress: from n/a through 4.0.9. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T22:43:35.000000Z"}</description>
      <content:encoded>{"uuid": "89fb7c18-7081-41c2-82d7-6cbaa0fbde69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43328", "type": "seen", "source": "https://t.me/cvedetector/3564", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43328 - EmbedPress Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43328 \nPublished : Aug. 19, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPDeveloper EmbedPress allows PHP Local File Inclusion.This issue affects EmbedPress: from n/a through 4.0.9. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T22:43:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/89fb7c18-7081-41c2-82d7-6cbaa0fbde69/export</guid>
      <pubDate>Mon, 19 Aug 2024 22:43:35 +0000</pubDate>
    </item>
    <item>
      <title>187e25d6-79ec-4afb-9859-cae87615eab3</title>
      <link>https://vulnerability.circl.lu/sighting/187e25d6-79ec-4afb-9859-cae87615eab3/export</link>
      <description>{"uuid": "187e25d6-79ec-4afb-9859-cae87615eab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43325", "type": "seen", "source": "https://t.me/cvedetector/4209", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43325 - Naiche Dark Mode for WP Dashboard CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-43325 \nPublished : Aug. 26, 2024, 9:15 p.m. | 31\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Naiche Dark Mode for WP Dashboard.This issue affects Dark Mode for WP Dashboard: from n/a through 1.2.3. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T23:50:58.000000Z"}</description>
      <content:encoded>{"uuid": "187e25d6-79ec-4afb-9859-cae87615eab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43325", "type": "seen", "source": "https://t.me/cvedetector/4209", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43325 - Naiche Dark Mode for WP Dashboard CSRF\", \n  \"Content\": \"CVE ID : CVE-2024-43325 \nPublished : Aug. 26, 2024, 9:15 p.m. | 31\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Naiche Dark Mode for WP Dashboard.This issue affects Dark Mode for WP Dashboard: from n/a through 1.2.3. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T23:50:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/187e25d6-79ec-4afb-9859-cae87615eab3/export</guid>
      <pubDate>Mon, 26 Aug 2024 23:50:58 +0000</pubDate>
    </item>
    <item>
      <title>c1773c81-e4da-4e1d-ba51-8a0492f82bda</title>
      <link>https://vulnerability.circl.lu/sighting/c1773c81-e4da-4e1d-ba51-8a0492f82bda/export</link>
      <description>{"uuid": "c1773c81-e4da-4e1d-ba51-8a0492f82bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43322", "type": "seen", "source": "Telegram/aL4UFJ9m3Kyck29fm1g3_XwNQC89J_WL1LSb9DRPeZ9cvdTl", "content": "", "creation_timestamp": "2025-02-14T10:03:12.000000Z"}</description>
      <content:encoded>{"uuid": "c1773c81-e4da-4e1d-ba51-8a0492f82bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43322", "type": "seen", "source": "Telegram/aL4UFJ9m3Kyck29fm1g3_XwNQC89J_WL1LSb9DRPeZ9cvdTl", "content": "", "creation_timestamp": "2025-02-14T10:03:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c1773c81-e4da-4e1d-ba51-8a0492f82bda/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:03:12 +0000</pubDate>
    </item>
  </channel>
</rss>
