<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 09:18:26 +0000</lastBuildDate>
    <item>
      <title>8911fcab-1ef8-43a2-bf6a-96092e1a72ea</title>
      <link>https://vulnerability.circl.lu/sighting/8911fcab-1ef8-43a2-bf6a-96092e1a72ea/export</link>
      <description>{"uuid": "8911fcab-1ef8-43a2-bf6a-96092e1a72ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10101", "type": "seen", "source": "https://t.me/cvedetector/8239", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10101 - Binary-Husky GPT Academic Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-10101 \nPublished : Oct. 17, 2024, 7:15 p.m. | 16\u00a0minutes ago \nDescription : A stored cross-site scripting (XSS) vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability occurs at the /file endpoint, which renders HTML files. Malicious HTML files containing XSS payloads can be uploaded and stored in the backend, leading to the execution of the payload in the victim's browser when the file is accessed. This can result in the theft of session cookies or other sensitive information. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T21:40:32.000000Z"}</description>
      <content:encoded>{"uuid": "8911fcab-1ef8-43a2-bf6a-96092e1a72ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10101", "type": "seen", "source": "https://t.me/cvedetector/8239", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10101 - Binary-Husky GPT Academic Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-10101 \nPublished : Oct. 17, 2024, 7:15 p.m. | 16\u00a0minutes ago \nDescription : A stored cross-site scripting (XSS) vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability occurs at the /file endpoint, which renders HTML files. Malicious HTML files containing XSS payloads can be uploaded and stored in the backend, leading to the execution of the payload in the victim's browser when the file is accessed. This can result in the theft of session cookies or other sensitive information. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T21:40:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8911fcab-1ef8-43a2-bf6a-96092e1a72ea/export</guid>
      <pubDate>Thu, 17 Oct 2024 21:40:32 +0000</pubDate>
    </item>
  </channel>
</rss>
