<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:29:06.458866+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/109052cd-fc3c-46a1-a21d-dceda0aa8b21/export</id>
    <title>109052cd-fc3c-46a1-a21d-dceda0aa8b21</title>
    <updated>2026-05-04T10:29:06.644706+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "109052cd-fc3c-46a1-a21d-dceda0aa8b21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6516", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13747\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query.\n\ud83d\udccf Published: 2025-03-05T09:21:50.106Z\n\ud83d\udccf Modified: 2025-03-05T09:21:50.106Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/e74e1a7c-4fe6-4041-8c4c-13389dacb9db?source=cve\n2. https://codecanyon.net/item/email-customizer-for-woocommerce-with-drag-drop-builder-woo-email-editor/22400984", "creation_timestamp": "2025-03-05T09:35:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/109052cd-fc3c-46a1-a21d-dceda0aa8b21/export"/>
    <published>2025-03-05T09:35:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c71c1aba-f5c5-4653-9998-e8197fde3e12/export</id>
    <title>c71c1aba-f5c5-4653-9998-e8197fde3e12</title>
    <updated>2026-05-04T10:29:06.644626+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c71c1aba-f5c5-4653-9998-e8197fde3e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "https://t.me/cvedetector/19622", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13747 - WooMail - WooCommerce Email Customizer SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13747 \nPublished : March 5, 2025, 10:15 a.m. | 48\u00a0minutes ago \nDescription : The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T12:46:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c71c1aba-f5c5-4653-9998-e8197fde3e12/export"/>
    <published>2025-03-05T12:46:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/58eab81c-0a42-4749-92c3-7ab32997fe7e/export</id>
    <title>58eab81c-0a42-4749-92c3-7ab32997fe7e</title>
    <updated>2026-05-04T10:29:06.644560+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "58eab81c-0a42-4749-92c3-7ab32997fe7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "Telegram/A_katm2tH23ArIKSyq8Z3TzB8wWJsSAz9SBB_WHUcxKaqgSP", "content": "", "creation_timestamp": "2025-03-06T02:16:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/58eab81c-0a42-4749-92c3-7ab32997fe7e/export"/>
    <published>2025-03-06T02:16:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/59892c45-a97a-46b8-9227-a3dd54367be6/export</id>
    <title>59892c45-a97a-46b8-9227-a3dd54367be6</title>
    <updated>2026-05-04T10:29:06.644490+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "59892c45-a97a-46b8-9227-a3dd54367be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13744\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-04-04T04:21:22.827Z\n\ud83d\udccf Modified: 2025-04-04T04:21:22.827Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f8e1aca8-3d82-4b1a-98c8-29501a377846?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3262569/woocommerce-jetpack/trunk/includes/input-fields/class-wcj-product-input-fields-core.php", "creation_timestamp": "2025-04-04T04:35:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/59892c45-a97a-46b8-9227-a3dd54367be6/export"/>
    <published>2025-04-04T04:35:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a2562feb-cbfd-4d09-89c4-ce6c5829869d/export</id>
    <title>a2562feb-cbfd-4d09-89c4-ce6c5829869d</title>
    <updated>2026-05-04T10:29:06.644427+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a2562feb-cbfd-4d09-89c4-ce6c5829869d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114278590468850131", "content": "", "creation_timestamp": "2025-04-04T07:48:27.253456Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a2562feb-cbfd-4d09-89c4-ce6c5829869d/export"/>
    <published>2025-04-04T07:48:27.253456+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b08625d9-2bd0-4b13-9337-e9421572ee81/export</id>
    <title>b08625d9-2bd0-4b13-9337-e9421572ee81</title>
    <updated>2026-05-04T10:29:06.644356+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b08625d9-2bd0-4b13-9337-e9421572ee81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114278590468850131", "content": "", "creation_timestamp": "2025-04-04T07:48:27.258010Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b08625d9-2bd0-4b13-9337-e9421572ee81/export"/>
    <published>2025-04-04T07:48:27.258010+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/db9c4742-c1ec-4ad9-b753-a234e66960fa/export</id>
    <title>db9c4742-c1ec-4ad9-b753-a234e66960fa</title>
    <updated>2026-05-04T10:29:06.644284+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "db9c4742-c1ec-4ad9-b753-a234e66960fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://t.me/cvedetector/22080", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13744 - WooCommerce Booster Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13744 \nPublished : April 4, 2025, 5:15 a.m. | 31\u00a0minutes ago \nDescription : The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T07:58:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/db9c4742-c1ec-4ad9-b753-a234e66960fa/export"/>
    <published>2025-04-04T07:58:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/34c734d0-2a5c-437e-9c31-422b797a02f5/export</id>
    <title>34c734d0-2a5c-437e-9c31-422b797a02f5</title>
    <updated>2026-05-04T10:29:06.644211+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "34c734d0-2a5c-437e-9c31-422b797a02f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxxaky53i2u", "content": "", "creation_timestamp": "2025-04-04T08:02:00.844645Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/34c734d0-2a5c-437e-9c31-422b797a02f5/export"/>
    <published>2025-04-04T08:02:00.844645+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dcf3e82b-b05b-4568-b5ae-877809a962e6/export</id>
    <title>dcf3e82b-b05b-4568-b5ae-877809a962e6</title>
    <updated>2026-05-04T10:29:06.644094+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dcf3e82b-b05b-4568-b5ae-877809a962e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1374", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15806", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1374\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via\u00a0nomad templates when configuring audit log forwarding. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the  GitHub Bug Bounty program https://bounty.github.com .\n\n\ud83d\udccf Published: 2024-02-13T18:54:18.668Z\n\ud83d\udccf Modified: 2025-05-09T18:18:30.616Z\n\ud83d\udd17 References:\n1. https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15\n2. https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10\n3. https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7\n4. https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5", "creation_timestamp": "2025-05-09T18:26:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dcf3e82b-b05b-4568-b5ae-877809a962e6/export"/>
    <published>2025-05-09T18:26:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/43b8c8c0-f9f0-45e8-bee8-bc3626f1574a/export</id>
    <title>43b8c8c0-f9f0-45e8-bee8-bc3626f1574a</title>
    <updated>2026-05-04T10:29:06.641897+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "43b8c8c0-f9f0-45e8-bee8-bc3626f1574a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:30:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/43b8c8c0-f9f0-45e8-bee8-bc3626f1574a/export"/>
    <published>2025-08-18T18:30:59+00:00</published>
  </entry>
</feed>
