<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T00:46:54.059288+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a02d116e-b013-4d07-8d41-db751ac2ee31/export</id>
    <title>a02d116e-b013-4d07-8d41-db751ac2ee31</title>
    <updated>2026-05-07T00:46:54.445959+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a02d116e-b013-4d07-8d41-db751ac2ee31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36450", "type": "seen", "source": "https://t.me/cvedetector/522", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36450 - Cross-site scripting vulnerability exists in sysin\", \n  \"Content\": \"CVE ID : CVE-2024-36450 \nPublished : July 10, 2024, 7:15 a.m. | 18\u00a0minutes ago \nDescription : Cross-site scripting vulnerability exists in sysinfo.cgi of Webmin versions prior to 1.910. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a session ID may be obtained, a webpage may be altered, or a server may be halted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T09:39:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a02d116e-b013-4d07-8d41-db751ac2ee31/export"/>
    <published>2024-07-10T09:39:28+00:00</published>
  </entry>
</feed>
