<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 03:36:30 +0000</lastBuildDate>
    <item>
      <title>c5951ff2-25fe-4d53-8a01-605b654d1509</title>
      <link>https://vulnerability.circl.lu/sighting/c5951ff2-25fe-4d53-8a01-605b654d1509/export</link>
      <description>{"uuid": "c5951ff2-25fe-4d53-8a01-605b654d1509", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54037", "type": "seen", "source": "https://t.me/cvedetector/12584", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54037 - Adobe Connect DOM-based Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54037 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to visit a malicious link or input data into a compromised form. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:48.000000Z"}</description>
      <content:encoded>{"uuid": "c5951ff2-25fe-4d53-8a01-605b654d1509", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54037", "type": "seen", "source": "https://t.me/cvedetector/12584", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54037 - Adobe Connect DOM-based Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54037 \nPublished : Dec. 10, 2024, 9:15 p.m. | 45\u00a0minutes ago \nDescription : Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to visit a malicious link or input data into a compromised form. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T23:20:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c5951ff2-25fe-4d53-8a01-605b654d1509/export</guid>
      <pubDate>Tue, 10 Dec 2024 23:20:48 +0000</pubDate>
    </item>
    <item>
      <title>a1149c1f-93e0-462c-813e-661fd3f25007</title>
      <link>https://vulnerability.circl.lu/sighting/a1149c1f-93e0-462c-813e-661fd3f25007/export</link>
      <description>{"uuid": "a1149c1f-93e0-462c-813e-661fd3f25007", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54037", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1641", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54037\n\ud83d\udd39 Description: Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the high-privileged attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to visit a malicious link or input data into a compromised form. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. This attack is dependent on the victim allowing all popups, increasing the attack complexity.\n\ud83d\udccf Published: 2024-12-10T20:42:18.680Z\n\ud83d\udccf Modified: 2025-01-14T22:01:32.503Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/connect/apsb24-99.html", "creation_timestamp": "2025-01-14T23:09:50.000000Z"}</description>
      <content:encoded>{"uuid": "a1149c1f-93e0-462c-813e-661fd3f25007", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54037", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1641", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54037\n\ud83d\udd39 Description: Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute arbitrary code in the context of the victim's browser session. By manipulating a DOM element through a crafted URL or user input, the high-privileged attacker can inject malicious scripts that run when the page is rendered. This type of attack requires user interaction, as the victim would need to visit a malicious link or input data into a compromised form. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. This attack is dependent on the victim allowing all popups, increasing the attack complexity.\n\ud83d\udccf Published: 2024-12-10T20:42:18.680Z\n\ud83d\udccf Modified: 2025-01-14T22:01:32.503Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/connect/apsb24-99.html", "creation_timestamp": "2025-01-14T23:09:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a1149c1f-93e0-462c-813e-661fd3f25007/export</guid>
      <pubDate>Tue, 14 Jan 2025 23:09:50 +0000</pubDate>
    </item>
  </channel>
</rss>
