<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 04:33:26 +0000</lastBuildDate>
    <item>
      <title>bfa6b33c-f8bd-4ed8-a512-861e4010792c</title>
      <link>https://vulnerability.circl.lu/sighting/bfa6b33c-f8bd-4ed8-a512-861e4010792c/export</link>
      <description>{"uuid": "bfa6b33c-f8bd-4ed8-a512-861e4010792c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49260", "type": "seen", "source": "https://t.me/cvedetector/8069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49260 - Limb WordPress Gallery Plugin Unrestricted File Upload and Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49260 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Limb WordPress Gallery Plugin \u2013 Limb Image Gallery allows Code Injection.This issue affects WordPress Gallery Plugin \u2013 Limb Image Gallery: from n/a through 1.5.7. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:17.000000Z"}</description>
      <content:encoded>{"uuid": "bfa6b33c-f8bd-4ed8-a512-861e4010792c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49260", "type": "seen", "source": "https://t.me/cvedetector/8069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49260 - Limb WordPress Gallery Plugin Unrestricted File Upload and Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49260 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in Limb WordPress Gallery Plugin \u2013 Limb Image Gallery allows Code Injection.This issue affects WordPress Gallery Plugin \u2013 Limb Image Gallery: from n/a through 1.5.7. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bfa6b33c-f8bd-4ed8-a512-861e4010792c/export</guid>
      <pubDate>Wed, 16 Oct 2024 17:13:17 +0000</pubDate>
    </item>
    <item>
      <title>2eee425e-40f6-46a7-ba59-b15d8ec15888</title>
      <link>https://vulnerability.circl.lu/sighting/2eee425e-40f6-46a7-ba59-b15d8ec15888/export</link>
      <description>{"uuid": "2eee425e-40f6-46a7-ba59-b15d8ec15888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49268", "type": "seen", "source": "https://t.me/cvedetector/8086", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49268 - Sunburntkamel Disconnected Reflected Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-49268 \nPublished : Oct. 16, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in sunburntkamel disconnected allows Reflected XSS.This issue affects disconnected: from n/a through 1.3.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T18:03:46.000000Z"}</description>
      <content:encoded>{"uuid": "2eee425e-40f6-46a7-ba59-b15d8ec15888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49268", "type": "seen", "source": "https://t.me/cvedetector/8086", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49268 - Sunburntkamel Disconnected Reflected Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-49268 \nPublished : Oct. 16, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in sunburntkamel disconnected allows Reflected XSS.This issue affects disconnected: from n/a through 1.3.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T18:03:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2eee425e-40f6-46a7-ba59-b15d8ec15888/export</guid>
      <pubDate>Wed, 16 Oct 2024 18:03:46 +0000</pubDate>
    </item>
    <item>
      <title>3a723eda-06e8-436f-9ad5-68ce60de6f91</title>
      <link>https://vulnerability.circl.lu/sighting/3a723eda-06e8-436f-9ad5-68ce60de6f91/export</link>
      <description>{"uuid": "3a723eda-06e8-436f-9ad5-68ce60de6f91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49266", "type": "seen", "source": "https://t.me/cvedetector/8087", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49266 - Thimo Grauerholz WP-Spreadplugin Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-49266 \nPublished : Oct. 16, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Thimo Grauerholz WP-Spreadplugin allows Stored XSS.This issue affects WP-Spreadplugin: from n/a through 4.8.9. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T18:03:47.000000Z"}</description>
      <content:encoded>{"uuid": "3a723eda-06e8-436f-9ad5-68ce60de6f91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49266", "type": "seen", "source": "https://t.me/cvedetector/8087", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49266 - Thimo Grauerholz WP-Spreadplugin Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-49266 \nPublished : Oct. 16, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Thimo Grauerholz WP-Spreadplugin allows Stored XSS.This issue affects WP-Spreadplugin: from n/a through 4.8.9. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T18:03:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3a723eda-06e8-436f-9ad5-68ce60de6f91/export</guid>
      <pubDate>Wed, 16 Oct 2024 18:03:47 +0000</pubDate>
    </item>
    <item>
      <title>721ae612-f9eb-4bd8-a4b7-42184e853740</title>
      <link>https://vulnerability.circl.lu/sighting/721ae612-f9eb-4bd8-a4b7-42184e853740/export</link>
      <description>{"uuid": "721ae612-f9eb-4bd8-a4b7-42184e853740", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49267", "type": "seen", "source": "https://t.me/cvedetector/8088", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49267 - Nayon46 Unlimited Addon For Elementor Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-49267 \nPublished : Oct. 16, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in nayon46 Unlimited Addon For Elementor allows Stored XSS.This issue affects Unlimited Addon For Elementor: from n/a through 2.0.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T18:03:48.000000Z"}</description>
      <content:encoded>{"uuid": "721ae612-f9eb-4bd8-a4b7-42184e853740", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49267", "type": "seen", "source": "https://t.me/cvedetector/8088", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49267 - Nayon46 Unlimited Addon For Elementor Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-49267 \nPublished : Oct. 16, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in nayon46 Unlimited Addon For Elementor allows Stored XSS.This issue affects Unlimited Addon For Elementor: from n/a through 2.0.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T18:03:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/721ae612-f9eb-4bd8-a4b7-42184e853740/export</guid>
      <pubDate>Wed, 16 Oct 2024 18:03:48 +0000</pubDate>
    </item>
    <item>
      <title>dc7b4bf4-7970-4dd8-879d-06edd6ee4264</title>
      <link>https://vulnerability.circl.lu/sighting/dc7b4bf4-7970-4dd8-879d-06edd6ee4264/export</link>
      <description>{"uuid": "dc7b4bf4-7970-4dd8-879d-06edd6ee4264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49265", "type": "seen", "source": "https://t.me/cvedetector/8092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49265 - Booking.Com Banner Creator Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49265 \nPublished : Oct. 16, 2024, 4:15 p.m. | 34\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Partnerships at Booking.Com Booking.Com Banner Creator allows Stored XSS.This issue affects Booking.Com Banner Creator: from n/a through 1.4.6. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T18:53:59.000000Z"}</description>
      <content:encoded>{"uuid": "dc7b4bf4-7970-4dd8-879d-06edd6ee4264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49265", "type": "seen", "source": "https://t.me/cvedetector/8092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49265 - Booking.Com Banner Creator Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49265 \nPublished : Oct. 16, 2024, 4:15 p.m. | 34\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Partnerships at Booking.Com Booking.Com Banner Creator allows Stored XSS.This issue affects Booking.Com Banner Creator: from n/a through 1.4.6. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T18:53:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dc7b4bf4-7970-4dd8-879d-06edd6ee4264/export</guid>
      <pubDate>Wed, 16 Oct 2024 18:53:59 +0000</pubDate>
    </item>
    <item>
      <title>e05e7395-abb9-4fab-8df1-61689269aabe</title>
      <link>https://vulnerability.circl.lu/sighting/e05e7395-abb9-4fab-8df1-61689269aabe/export</link>
      <description>{"uuid": "e05e7395-abb9-4fab-8df1-61689269aabe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49264", "type": "seen", "source": "https://t.me/cvedetector/8248", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49264 - Elementor Events Addon Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-49264 \nPublished : Oct. 17, 2024, 8:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Events Addon for Elementor allows Stored XSS.This issue affects Events Addon for Elementor: from n/a through 2.2.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T23:20:46.000000Z"}</description>
      <content:encoded>{"uuid": "e05e7395-abb9-4fab-8df1-61689269aabe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49264", "type": "seen", "source": "https://t.me/cvedetector/8248", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49264 - Elementor Events Addon Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-49264 \nPublished : Oct. 17, 2024, 8:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NicheAddons Events Addon for Elementor allows Stored XSS.This issue affects Events Addon for Elementor: from n/a through 2.2.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T23:20:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e05e7395-abb9-4fab-8df1-61689269aabe/export</guid>
      <pubDate>Thu, 17 Oct 2024 23:20:46 +0000</pubDate>
    </item>
    <item>
      <title>2d726e54-a9a5-4953-8176-1908bfbbd8fe</title>
      <link>https://vulnerability.circl.lu/sighting/2d726e54-a9a5-4953-8176-1908bfbbd8fe/export</link>
      <description>{"uuid": "2d726e54-a9a5-4953-8176-1908bfbbd8fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49262", "type": "seen", "source": "https://t.me/cvedetector/8250", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49262 - WePic Country Flags for Elementor Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49262 \nPublished : Oct. 17, 2024, 8:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wepic Country Flags for Elementor allows Stored XSS.This issue affects Country Flags for Elementor: from n/a through 1.0.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T23:20:50.000000Z"}</description>
      <content:encoded>{"uuid": "2d726e54-a9a5-4953-8176-1908bfbbd8fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49262", "type": "seen", "source": "https://t.me/cvedetector/8250", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49262 - WePic Country Flags for Elementor Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49262 \nPublished : Oct. 17, 2024, 8:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wepic Country Flags for Elementor allows Stored XSS.This issue affects Country Flags for Elementor: from n/a through 1.0.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T23:20:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2d726e54-a9a5-4953-8176-1908bfbbd8fe/export</guid>
      <pubDate>Thu, 17 Oct 2024 23:20:50 +0000</pubDate>
    </item>
    <item>
      <title>40bf2e22-7d70-479a-a5c8-d8936b6d11ee</title>
      <link>https://vulnerability.circl.lu/sighting/40bf2e22-7d70-479a-a5c8-d8936b6d11ee/export</link>
      <description>{"uuid": "40bf2e22-7d70-479a-a5c8-d8936b6d11ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49263", "type": "seen", "source": "https://t.me/cvedetector/8251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49263 - Takashi Matsuyama My Favorites Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49263 \nPublished : Oct. 17, 2024, 8:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Takashi Matsuyama My Favorites allows Stored XSS.This issue affects My Favorites: from n/a through 1.4.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T23:20:51.000000Z"}</description>
      <content:encoded>{"uuid": "40bf2e22-7d70-479a-a5c8-d8936b6d11ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49263", "type": "seen", "source": "https://t.me/cvedetector/8251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49263 - Takashi Matsuyama My Favorites Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49263 \nPublished : Oct. 17, 2024, 8:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Takashi Matsuyama My Favorites allows Stored XSS.This issue affects My Favorites: from n/a through 1.4.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T23:20:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/40bf2e22-7d70-479a-a5c8-d8936b6d11ee/export</guid>
      <pubDate>Thu, 17 Oct 2024 23:20:51 +0000</pubDate>
    </item>
    <item>
      <title>706de504-b892-4d3e-8cfd-056ad9ca21ce</title>
      <link>https://vulnerability.circl.lu/sighting/706de504-b892-4d3e-8cfd-056ad9ca21ce/export</link>
      <description>{"uuid": "706de504-b892-4d3e-8cfd-056ad9ca21ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49261", "type": "seen", "source": "https://t.me/cvedetector/8253", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49261 - LOOS,Inc. Arkhe Blocks Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49261 \nPublished : Oct. 17, 2024, 8:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LOOS,Inc. Arkhe Blocks allows Stored XSS.This issue affects Arkhe Blocks: from n/a through 2.23.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T23:20:52.000000Z"}</description>
      <content:encoded>{"uuid": "706de504-b892-4d3e-8cfd-056ad9ca21ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49261", "type": "seen", "source": "https://t.me/cvedetector/8253", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49261 - LOOS,Inc. Arkhe Blocks Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49261 \nPublished : Oct. 17, 2024, 8:15 p.m. | 38\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in LOOS,Inc. Arkhe Blocks allows Stored XSS.This issue affects Arkhe Blocks: from n/a through 2.23.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T23:20:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/706de504-b892-4d3e-8cfd-056ad9ca21ce/export</guid>
      <pubDate>Thu, 17 Oct 2024 23:20:52 +0000</pubDate>
    </item>
    <item>
      <title>149afc5f-c992-4d21-b3e7-828727c4d2aa</title>
      <link>https://vulnerability.circl.lu/sighting/149afc5f-c992-4d21-b3e7-828727c4d2aa/export</link>
      <description>{"uuid": "149afc5f-c992-4d21-b3e7-828727c4d2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4926", "type": "seen", "source": "Telegram/r06u-u3xK3-FnPWKN71lsKTiQRV6gxm2bYQalhwTRp1AA2-3", "content": "", "creation_timestamp": "2025-02-14T09:46:58.000000Z"}</description>
      <content:encoded>{"uuid": "149afc5f-c992-4d21-b3e7-828727c4d2aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4926", "type": "seen", "source": "Telegram/r06u-u3xK3-FnPWKN71lsKTiQRV6gxm2bYQalhwTRp1AA2-3", "content": "", "creation_timestamp": "2025-02-14T09:46:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/149afc5f-c992-4d21-b3e7-828727c4d2aa/export</guid>
      <pubDate>Fri, 14 Feb 2025 09:46:58 +0000</pubDate>
    </item>
  </channel>
</rss>
