<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T22:21:43.099471+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0d06a8d4-46a9-4da5-b5d5-f9924225ec02/export</id>
    <title>0d06a8d4-46a9-4da5-b5d5-f9924225ec02</title>
    <updated>2026-05-07T22:21:43.533814+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0d06a8d4-46a9-4da5-b5d5-f9924225ec02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40873", "type": "seen", "source": "https://t.me/cvedetector/1639", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40873 - \"Absolute Secure Access Cross-Site Scripting\"\", \n  \"Content\": \"CVE ID : CVE-2024-40873 \nPublished : July 25, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : There is a cross-site scripting vulnerability in the Secure  \nAccess administrative console of Absolute Secure Access prior to version 13.07.  \nAttackers with system administrator permissions can interfere with another  \nsystem administrator\u2019s use of the publishing UI when the administrators are  \nediting the same management object. The scope is unchanged, there is no loss of  \nconfidentiality. Impact to system availability is none, impact to system  \nintegrity is high. \nSeverity: 4.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-25T21:05:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0d06a8d4-46a9-4da5-b5d5-f9924225ec02/export"/>
    <published>2024-07-25T21:05:53+00:00</published>
  </entry>
</feed>
