<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T15:33:22.296173+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/07f046fd-74a7-463a-94c8-d4360a6a4e30/export</id>
    <title>07f046fd-74a7-463a-94c8-d4360a6a4e30</title>
    <updated>2026-05-07T15:33:22.691226+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "07f046fd-74a7-463a-94c8-d4360a6a4e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41665", "type": "seen", "source": "https://t.me/cvedetector/1521", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41665 - Ampache Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-41665 \nPublished : July 23, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : Ampache, a web based audio/video streaming application and file manager, has a stored cross-site scripting (XSS) vulnerability in versions prior to 6.6.0. This vulnerability exists in the \"Playlists - Democratic - Configure Democratic Playlist\" feature. An attacker with Content Manager permissions can set the Name field to ``. When any administrator or user accesses the Democratic functionality, they will be affected by this stored XSS vulnerability. The attacker can exploit this vulnerability to obtain the cookies of any user or administrator who accesses the `democratic.php` file. Version 6.6.0 contains a patch for the issue. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T20:34:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/07f046fd-74a7-463a-94c8-d4360a6a4e30/export"/>
    <published>2024-07-23T20:34:56+00:00</published>
  </entry>
</feed>
