<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T08:26:55.876944+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/19cf1718-5e03-485d-8f49-85ba59e93a4a/export</id>
    <title>19cf1718-5e03-485d-8f49-85ba59e93a4a</title>
    <updated>2026-05-08T08:26:56.257233+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "19cf1718-5e03-485d-8f49-85ba59e93a4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9873", "type": "seen", "source": "https://t.me/cvedetector/8002", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9873 - PeepSo - Stored Cross-Site Scripting (XSS) in The Community by PeepSo Social Network Plugin\", \n  \"Content\": \"CVE ID : CVE-2024-9873 \nPublished : Oct. 16, 2024, 6:15 a.m. | 26\u00a0minutes ago \nDescription : The Community by PeepSo \u2013 Social Network, Membership, Registration, User Profiles, Premium \u2013 Mobile App plugin for WordPress is vulnerable to Stored Cross-Site Scripting via URLs in posts, comments, and profiles when Markdown support is enabled in all versions up to, and including, 6.4.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T08:49:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/19cf1718-5e03-485d-8f49-85ba59e93a4a/export"/>
    <published>2024-10-16T08:49:50+00:00</published>
  </entry>
</feed>
