<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T07:37:33.338609+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7f69ac07-c590-4373-92ef-50986e7748a8/export</id>
    <title>7f69ac07-c590-4373-92ef-50986e7748a8</title>
    <updated>2026-05-08T07:37:33.774965+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7f69ac07-c590-4373-92ef-50986e7748a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43412", "type": "seen", "source": "https://t.me/cvedetector/4701", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43412 - Xibo Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-43412 \nPublished : Sept. 3, 2024, 5:15 p.m. | 39\u00a0minutes ago \nDescription : Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute arbitrary JavaScript via the file preview function. Users can upload HTML/CSS/JS files into the Xibo Library via the Generic File module to be referenced on Displays and in Layouts. This is intended functionality. When previewing these resources from the Library and Layout editor they are executed in the users browser. This will be disabled in future releases, and users are encouraged to use the new developer tools in 4.1 to design their widgets which require this type of functionality. This behavior has been changed in 4.1.0 to preview previewing of generic files. There are no workarounds for this issue. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T19:59:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7f69ac07-c590-4373-92ef-50986e7748a8/export"/>
    <published>2024-09-03T19:59:00+00:00</published>
  </entry>
</feed>
