<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 17:34:58 +0000</lastBuildDate>
    <item>
      <title>d9a25f32-e74c-4a30-8e1a-0076384245f7</title>
      <link>https://vulnerability.circl.lu/sighting/d9a25f32-e74c-4a30-8e1a-0076384245f7/export</link>
      <description>{"uuid": "d9a25f32-e74c-4a30-8e1a-0076384245f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24490", "type": "seen", "source": "https://t.me/cibsecurity/28739", "content": "\u203c CVE-2021-24490 \u203c\n\nThe Email Artillery (MASS EMAIL) WordPress plugin through 4.1 does not properly check the uploaded files from the Import Emails feature, allowing arbitrary files to be uploaded. Furthermore, the plugin is also lacking any CSRF check, allowing such issue to be exploited via a CSRF attack as well. However, due to the presence of a .htaccess, denying access to everything in the folder the file is uploaded to, the malicious uploaded file will only be accessible on Web Servers such as Nginx/IIS\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-13T22:15:03.000000Z"}</description>
      <content:encoded>{"uuid": "d9a25f32-e74c-4a30-8e1a-0076384245f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24490", "type": "seen", "source": "https://t.me/cibsecurity/28739", "content": "\u203c CVE-2021-24490 \u203c\n\nThe Email Artillery (MASS EMAIL) WordPress plugin through 4.1 does not properly check the uploaded files from the Import Emails feature, allowing arbitrary files to be uploaded. Furthermore, the plugin is also lacking any CSRF check, allowing such issue to be exploited via a CSRF attack as well. However, due to the presence of a .htaccess, denying access to everything in the folder the file is uploaded to, the malicious uploaded file will only be accessible on Web Servers such as Nginx/IIS\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-13T22:15:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d9a25f32-e74c-4a30-8e1a-0076384245f7/export</guid>
      <pubDate>Mon, 13 Sep 2021 22:15:03 +0000</pubDate>
    </item>
  </channel>
</rss>
