<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T04:07:22.137407+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/003112a9-0f63-4a9e-af5f-768a632bcb68/export</id>
    <title>003112a9-0f63-4a9e-af5f-768a632bcb68</title>
    <updated>2026-05-06T04:07:22.495154+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "003112a9-0f63-4a9e-af5f-768a632bcb68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38503", "type": "seen", "source": "https://t.me/cvedetector/1409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38503 - Syncope Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38503 \nPublished : July 22, 2024, 10:15 a.m. | 31\u00a0minutes ago \nDescription : When editing a user, group or any object in the Syncope Console, HTML tags could be added to any text field and could lead to potential exploits.  \nThe same vulnerability was found in the Syncope Enduser, when editing \u201cPersonal Information\u201d or \u201cUser Requests\u201d.  \n  \nUsers are recommended to upgrade to version 3.0.8, which fixes this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T12:48:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/003112a9-0f63-4a9e-af5f-768a632bcb68/export"/>
    <published>2024-07-22T12:48:01+00:00</published>
  </entry>
</feed>
