<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-14T16:37:22.210352+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c33fe6f2-ef15-4117-9a8c-100a65760d00/export</id>
    <title>c33fe6f2-ef15-4117-9a8c-100a65760d00</title>
    <updated>2026-05-14T16:37:22.666678+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c33fe6f2-ef15-4117-9a8c-100a65760d00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7573", "type": "seen", "source": "https://t.me/cvedetector/4298", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7573 - Relevanssi Live Ajax Search WordPress Argument Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7573 \nPublished : Aug. 28, 2024, 3:15 a.m. | 35\u00a0minutes ago \nDescription : The Relevanssi Live Ajax Search plugin for WordPress is vulnerable to argument injection in all versions up to, and including, 2.4. This is due to insufficient validation of input supplied via POST data in the 'search' function. This makes it possible for unauthenticated attackers to inject arbitrary arguments into a WP_Query query and potentially expose sensitive information such as attachments or private posts. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-28T05:56:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c33fe6f2-ef15-4117-9a8c-100a65760d00/export"/>
    <published>2024-08-28T05:56:05+00:00</published>
  </entry>
</feed>
