<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T09:00:01.082301+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de06f9c3-8355-4063-906e-bbe0f6257753/export</id>
    <title>de06f9c3-8355-4063-906e-bbe0f6257753</title>
    <updated>2026-05-06T09:00:01.378030+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "de06f9c3-8355-4063-906e-bbe0f6257753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10848", "type": "seen", "source": "https://t.me/cvedetector/12069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10848 - The NewsMunch theme for WordPress is vulnerable to\", \n  \"Content\": \"CVE ID : CVE-2024-10848 \nPublished : Dec. 5, 2024, 10:31 a.m. | 1\u00a0hour, 10\u00a0minutes ago \nDescription : The NewsMunch theme for WordPress is vulnerable to Stored Cross-Site Scripting via a malicious display name in all versions up to, and including, 1.0.35 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T12:50:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de06f9c3-8355-4063-906e-bbe0f6257753/export"/>
    <published>2024-12-05T12:50:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dadcc7e5-657c-489c-ba41-e6ff60055335/export</id>
    <title>dadcc7e5-657c-489c-ba41-e6ff60055335</title>
    <updated>2026-05-06T09:00:01.377936+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dadcc7e5-657c-489c-ba41-e6ff60055335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10849", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113604963616642781", "content": "", "creation_timestamp": "2024-12-06T08:36:16.800263Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dadcc7e5-657c-489c-ba41-e6ff60055335/export"/>
    <published>2024-12-06T08:36:16.800263+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2e01da6a-a656-4c2a-bf42-94e7a656b905/export</id>
    <title>2e01da6a-a656-4c2a-bf42-94e7a656b905</title>
    <updated>2026-05-06T09:00:01.377855+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2e01da6a-a656-4c2a-bf42-94e7a656b905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878382100891566", "content": "", "creation_timestamp": "2025-01-23T15:30:12.371335Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2e01da6a-a656-4c2a-bf42-94e7a656b905/export"/>
    <published>2025-01-23T15:30:12.371335+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b1a845fe-6a92-4244-9b33-9a17ddf56210/export</id>
    <title>b1a845fe-6a92-4244-9b33-9a17ddf56210</title>
    <updated>2026-05-06T09:00:01.377778+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b1a845fe-6a92-4244-9b33-9a17ddf56210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878400720241278", "content": "", "creation_timestamp": "2025-01-23T15:34:55.918424Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b1a845fe-6a92-4244-9b33-9a17ddf56210/export"/>
    <published>2025-01-23T15:34:55.918424+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0d7f98cc-255b-4cf7-b67b-83fb2a8c44c3/export</id>
    <title>0d7f98cc-255b-4cf7-b67b-83fb2a8c44c3</title>
    <updated>2026-05-06T09:00:01.377692+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0d7f98cc-255b-4cf7-b67b-83fb2a8c44c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggbqgn3ig2t", "content": "", "creation_timestamp": "2025-01-23T16:15:57.257217Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0d7f98cc-255b-4cf7-b67b-83fb2a8c44c3/export"/>
    <published>2025-01-23T16:15:57.257217+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/49871594-2dc5-4347-9181-66e48a637366/export</id>
    <title>49871594-2dc5-4347-9181-66e48a637366</title>
    <updated>2026-05-06T09:00:01.377613+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "49871594-2dc5-4347-9181-66e48a637366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10847", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113917612286403707", "content": "", "creation_timestamp": "2025-01-30T13:46:57.034629Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/49871594-2dc5-4347-9181-66e48a637366/export"/>
    <published>2025-01-30T13:46:57.034629+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/00e423b5-1a8a-4b08-b303-be353c4c7ebb/export</id>
    <title>00e423b5-1a8a-4b08-b303-be353c4c7ebb</title>
    <updated>2026-05-06T09:00:01.377521+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "00e423b5-1a8a-4b08-b303-be353c4c7ebb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10847", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgxocxm7732w", "content": "", "creation_timestamp": "2025-01-30T14:16:19.255694Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/00e423b5-1a8a-4b08-b303-be353c4c7ebb/export"/>
    <published>2025-01-30T14:16:19.255694+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fc1bba39-2eaf-496e-a10e-536c75ff6770/export</id>
    <title>fc1bba39-2eaf-496e-a10e-536c75ff6770</title>
    <updated>2026-05-06T09:00:01.377422+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fc1bba39-2eaf-496e-a10e-536c75ff6770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13560", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10846\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions  v2.27.0 to v2.29.7 included\n\ud83d\udccf Published: 2025-01-23T15:22:56.170Z\n\ud83d\udccf Modified: 2025-04-25T23:02:53.505Z\n\ud83d\udd17 References:\n1. https://github.com/compose-spec/compose-go/security/advisories/GHSA-36gq-35j3-p9r9", "creation_timestamp": "2025-04-26T00:07:36.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fc1bba39-2eaf-496e-a10e-536c75ff6770/export"/>
    <published>2025-04-26T00:07:36+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c871894a-f2b4-481f-9627-f56c1c5ef660/export</id>
    <title>c871894a-f2b4-481f-9627-f56c1c5ef660</title>
    <updated>2026-05-06T09:00:01.377286+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c871894a-f2b4-481f-9627-f56c1c5ef660", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10844", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhrytzo44o2q", "content": "", "creation_timestamp": "2026-03-24T07:00:15.022857Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c871894a-f2b4-481f-9627-f56c1c5ef660/export"/>
    <published>2026-03-24T07:00:15.022857+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/901893f8-bb65-4b91-bf0e-f8fc2d0f7d73/export</id>
    <title>901893f8-bb65-4b91-bf0e-f8fc2d0f7d73</title>
    <updated>2026-05-06T09:00:01.375428+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "901893f8-bb65-4b91-bf0e-f8fc2d0f7d73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10845", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhsjmi7gam2b", "content": "", "creation_timestamp": "2026-03-24T12:00:15.877992Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/901893f8-bb65-4b91-bf0e-f8fc2d0f7d73/export"/>
    <published>2026-03-24T12:00:15.877992+00:00</published>
  </entry>
</feed>
