<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T18:14:11.645168+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c4c8be71-83ef-4b84-a8c7-282e5f364cdd/export</id>
    <title>c4c8be71-83ef-4b84-a8c7-282e5f364cdd</title>
    <updated>2026-05-08T18:14:11.995416+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c4c8be71-83ef-4b84-a8c7-282e5f364cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7129", "type": "seen", "source": "https://t.me/cvedetector/5539", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7129 - \"Simply Schedule Appointments WordPress Plugin Twig Template Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-7129 \nPublished : Sept. 13, 2024, 6:15 a.m. | 29\u00a0minutes ago \nDescription : The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin WordPress plugin before 1.6.7.43 does not escape template syntax provided via user input, leading to Twig Template Injection which further exploited can result to remote code Execution by high privilege such as admins \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T08:45:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c4c8be71-83ef-4b84-a8c7-282e5f364cdd/export"/>
    <published>2024-09-13T08:45:33+00:00</published>
  </entry>
</feed>
