<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:51:47.425405+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/58df76d7-eb36-4700-a854-cf3df0594cb4/export</id>
    <title>58df76d7-eb36-4700-a854-cf3df0594cb4</title>
    <updated>2026-05-04T14:51:47.755148+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "58df76d7-eb36-4700-a854-cf3df0594cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21658", "type": "seen", "source": "https://t.me/cvedetector/4539", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21658 - Discourse Calendar Insufficient Input Validation Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2024-21658 \nPublished : Aug. 30, 2024, 6:15 p.m. | 15\u00a0minutes ago \nDescription : discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-30T20:39:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/58df76d7-eb36-4700-a854-cf3df0594cb4/export"/>
    <published>2024-08-30T20:39:59+00:00</published>
  </entry>
</feed>
