<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:26:21 +0000</lastBuildDate>
    <item>
      <title>923dd703-2bde-4e6d-b278-b61b196f6e23</title>
      <link>https://vulnerability.circl.lu/sighting/923dd703-2bde-4e6d-b278-b61b196f6e23/export</link>
      <description>{"uuid": "923dd703-2bde-4e6d-b278-b61b196f6e23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10162", "type": "seen", "source": "https://t.me/cvedetector/8375", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10162 - PHPGurukul Boat Booking System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10162 \nPublished : Oct. 20, 2024, 1:15 a.m. | 45\u00a0minutes ago \nDescription : A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php of the component Edit Subdomain Details Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"mobilenumber\" to be affected. But it must be assumed that other parameters are affected as well. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T04:02:36.000000Z"}</description>
      <content:encoded>{"uuid": "923dd703-2bde-4e6d-b278-b61b196f6e23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10162", "type": "seen", "source": "https://t.me/cvedetector/8375", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10162 - PHPGurukul Boat Booking System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10162 \nPublished : Oct. 20, 2024, 1:15 a.m. | 45\u00a0minutes ago \nDescription : A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-subadmin.php of the component Edit Subdomain Details Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"mobilenumber\" to be affected. But it must be assumed that other parameters are affected as well. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T04:02:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/923dd703-2bde-4e6d-b278-b61b196f6e23/export</guid>
      <pubDate>Sun, 20 Oct 2024 04:02:36 +0000</pubDate>
    </item>
    <item>
      <title>499b4a06-9388-4f39-b111-269344efe720</title>
      <link>https://vulnerability.circl.lu/sighting/499b4a06-9388-4f39-b111-269344efe720/export</link>
      <description>{"uuid": "499b4a06-9388-4f39-b111-269344efe720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10161", "type": "seen", "source": "https://t.me/cvedetector/8376", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10161 - PHPGurukul Boat Booking System File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10161 \nPublished : Oct. 20, 2024, 1:15 a.m. | 45\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in PHPGurukul Boat Booking System 1.0. This affects an unknown part of the file change-image.php of the component Update Boat Image Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T04:02:37.000000Z"}</description>
      <content:encoded>{"uuid": "499b4a06-9388-4f39-b111-269344efe720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10161", "type": "seen", "source": "https://t.me/cvedetector/8376", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10161 - PHPGurukul Boat Booking System File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10161 \nPublished : Oct. 20, 2024, 1:15 a.m. | 45\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in PHPGurukul Boat Booking System 1.0. This affects an unknown part of the file change-image.php of the component Update Boat Image Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T04:02:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/499b4a06-9388-4f39-b111-269344efe720/export</guid>
      <pubDate>Sun, 20 Oct 2024 04:02:37 +0000</pubDate>
    </item>
    <item>
      <title>95ec7bb1-3876-4dad-b26a-9bdf0458ec64</title>
      <link>https://vulnerability.circl.lu/sighting/95ec7bb1-3876-4dad-b26a-9bdf0458ec64/export</link>
      <description>{"uuid": "95ec7bb1-3876-4dad-b26a-9bdf0458ec64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10163", "type": "seen", "source": "https://t.me/cvedetector/8377", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10163 - SourceCodester Sentiment Based Movie Rating System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10163 \nPublished : Oct. 20, 2024, 2:15 a.m. | 34\u00a0minutes ago \nDescription : A vulnerability was found in SourceCodester Sentiment Based Movie Rating System 1.0. It has been classified as critical. Affected is an unknown function of the file /msrps/movie_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher disclosure mentions a slightly changed product name. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T04:52:48.000000Z"}</description>
      <content:encoded>{"uuid": "95ec7bb1-3876-4dad-b26a-9bdf0458ec64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10163", "type": "seen", "source": "https://t.me/cvedetector/8377", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10163 - SourceCodester Sentiment Based Movie Rating System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10163 \nPublished : Oct. 20, 2024, 2:15 a.m. | 34\u00a0minutes ago \nDescription : A vulnerability was found in SourceCodester Sentiment Based Movie Rating System 1.0. It has been classified as critical. Affected is an unknown function of the file /msrps/movie_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher disclosure mentions a slightly changed product name. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T04:52:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/95ec7bb1-3876-4dad-b26a-9bdf0458ec64/export</guid>
      <pubDate>Sun, 20 Oct 2024 04:52:48 +0000</pubDate>
    </item>
    <item>
      <title>2f00c3fe-4418-49a2-88c8-a93f4960a5a2</title>
      <link>https://vulnerability.circl.lu/sighting/2f00c3fe-4418-49a2-88c8-a93f4960a5a2/export</link>
      <description>{"uuid": "2f00c3fe-4418-49a2-88c8-a93f4960a5a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10167", "type": "seen", "source": "https://t.me/cvedetector/8378", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10167 - Codezips Sales Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10167 \nPublished : Oct. 20, 2024, 3:15 a.m. | 26\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in Codezips Sales Management System 1.0. This affects an unknown part of the file deletecustind.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T05:42:57.000000Z"}</description>
      <content:encoded>{"uuid": "2f00c3fe-4418-49a2-88c8-a93f4960a5a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10167", "type": "seen", "source": "https://t.me/cvedetector/8378", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10167 - Codezips Sales Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10167 \nPublished : Oct. 20, 2024, 3:15 a.m. | 26\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in Codezips Sales Management System 1.0. This affects an unknown part of the file deletecustind.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T05:42:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2f00c3fe-4418-49a2-88c8-a93f4960a5a2/export</guid>
      <pubDate>Sun, 20 Oct 2024 05:42:57 +0000</pubDate>
    </item>
    <item>
      <title>02d9fefa-0cf6-483e-8fbd-6ddc7cfd017b</title>
      <link>https://vulnerability.circl.lu/sighting/02d9fefa-0cf6-483e-8fbd-6ddc7cfd017b/export</link>
      <description>{"uuid": "02d9fefa-0cf6-483e-8fbd-6ddc7cfd017b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10166", "type": "seen", "source": "https://t.me/cvedetector/8380", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10166 - Codezips Sales Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-10166 \nPublished : Oct. 20, 2024, 3:15 a.m. | 26\u00a0minutes ago \nDescription : A vulnerability was found in Codezips Sales Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file checkuser.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T05:42:58.000000Z"}</description>
      <content:encoded>{"uuid": "02d9fefa-0cf6-483e-8fbd-6ddc7cfd017b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10166", "type": "seen", "source": "https://t.me/cvedetector/8380", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10166 - Codezips Sales Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-10166 \nPublished : Oct. 20, 2024, 3:15 a.m. | 26\u00a0minutes ago \nDescription : A vulnerability was found in Codezips Sales Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file checkuser.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T05:42:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/02d9fefa-0cf6-483e-8fbd-6ddc7cfd017b/export</guid>
      <pubDate>Sun, 20 Oct 2024 05:42:58 +0000</pubDate>
    </item>
    <item>
      <title>241cbacc-5787-4d19-aaeb-9e1a67b4bef1</title>
      <link>https://vulnerability.circl.lu/sighting/241cbacc-5787-4d19-aaeb-9e1a67b4bef1/export</link>
      <description>{"uuid": "241cbacc-5787-4d19-aaeb-9e1a67b4bef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10165", "type": "seen", "source": "https://t.me/cvedetector/8379", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10165 - Codezips Sales Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10165 \nPublished : Oct. 20, 2024, 3:15 a.m. | 27\u00a0minutes ago \nDescription : A vulnerability was found in Codezips Sales Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file deletecustcom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T05:42:58.000000Z"}</description>
      <content:encoded>{"uuid": "241cbacc-5787-4d19-aaeb-9e1a67b4bef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10165", "type": "seen", "source": "https://t.me/cvedetector/8379", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10165 - Codezips Sales Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10165 \nPublished : Oct. 20, 2024, 3:15 a.m. | 27\u00a0minutes ago \nDescription : A vulnerability was found in Codezips Sales Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file deletecustcom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T05:42:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/241cbacc-5787-4d19-aaeb-9e1a67b4bef1/export</guid>
      <pubDate>Sun, 20 Oct 2024 05:42:58 +0000</pubDate>
    </item>
    <item>
      <title>8b9e8fb0-7795-4b2b-b885-05651b964931</title>
      <link>https://vulnerability.circl.lu/sighting/8b9e8fb0-7795-4b2b-b885-05651b964931/export</link>
      <description>{"uuid": "8b9e8fb0-7795-4b2b-b885-05651b964931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10169", "type": "seen", "source": "https://t.me/cvedetector/8382", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10169 - Code-Projects Hospital Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10169 \nPublished : Oct. 20, 2024, 4:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in code-projects Hospital Management System 1.0. This vulnerability affects unknown code of the file change-password.php. The manipulation of the argument cpass leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T07:23:13.000000Z"}</description>
      <content:encoded>{"uuid": "8b9e8fb0-7795-4b2b-b885-05651b964931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10169", "type": "seen", "source": "https://t.me/cvedetector/8382", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10169 - Code-Projects Hospital Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10169 \nPublished : Oct. 20, 2024, 4:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in code-projects Hospital Management System 1.0. This vulnerability affects unknown code of the file change-password.php. The manipulation of the argument cpass leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-20T07:23:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8b9e8fb0-7795-4b2b-b885-05651b964931/export</guid>
      <pubDate>Sun, 20 Oct 2024 07:23:13 +0000</pubDate>
    </item>
    <item>
      <title>fccd1d2d-0e0e-4f26-b93b-a1db46938c23</title>
      <link>https://vulnerability.circl.lu/sighting/fccd1d2d-0e0e-4f26-b93b-a1db46938c23/export</link>
      <description>{"uuid": "fccd1d2d-0e0e-4f26-b93b-a1db46938c23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10168", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113435798795156594", "content": "", "creation_timestamp": "2024-11-06T11:35:26.393922Z"}</description>
      <content:encoded>{"uuid": "fccd1d2d-0e0e-4f26-b93b-a1db46938c23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10168", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113435798795156594", "content": "", "creation_timestamp": "2024-11-06T11:35:26.393922Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fccd1d2d-0e0e-4f26-b93b-a1db46938c23/export</guid>
      <pubDate>Wed, 06 Nov 2024 11:35:26 +0000</pubDate>
    </item>
    <item>
      <title>4665a074-347c-43ee-8e33-8ace5ee1a530</title>
      <link>https://vulnerability.circl.lu/sighting/4665a074-347c-43ee-8e33-8ace5ee1a530/export</link>
      <description>{"uuid": "4665a074-347c-43ee-8e33-8ace5ee1a530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10168", "type": "seen", "source": "https://t.me/cvedetector/10003", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10168 - Active Products Tables for WooCommerce Stored Cross-Site Scripting Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-10168 \nPublished : Nov. 6, 2024, 12:15 p.m. | 41\u00a0minutes ago \nDescription : The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's woot_button shortcode in all versions up to, and including, 1.0.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T14:09:36.000000Z"}</description>
      <content:encoded>{"uuid": "4665a074-347c-43ee-8e33-8ace5ee1a530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10168", "type": "seen", "source": "https://t.me/cvedetector/10003", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10168 - Active Products Tables for WooCommerce Stored Cross-Site Scripting Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-10168 \nPublished : Nov. 6, 2024, 12:15 p.m. | 41\u00a0minutes ago \nDescription : The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's woot_button shortcode in all versions up to, and including, 1.0.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T14:09:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4665a074-347c-43ee-8e33-8ace5ee1a530/export</guid>
      <pubDate>Wed, 06 Nov 2024 14:09:36 +0000</pubDate>
    </item>
    <item>
      <title>495e99e6-bd76-405a-81fe-4a5248182440</title>
      <link>https://vulnerability.circl.lu/sighting/495e99e6-bd76-405a-81fe-4a5248182440/export</link>
      <description>{"uuid": "495e99e6-bd76-405a-81fe-4a5248182440", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10164", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113518619326643859", "content": "", "creation_timestamp": "2024-11-21T02:37:47.508235Z"}</description>
      <content:encoded>{"uuid": "495e99e6-bd76-405a-81fe-4a5248182440", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10164", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113518619326643859", "content": "", "creation_timestamp": "2024-11-21T02:37:47.508235Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/495e99e6-bd76-405a-81fe-4a5248182440/export</guid>
      <pubDate>Thu, 21 Nov 2024 02:37:47 +0000</pubDate>
    </item>
  </channel>
</rss>
