<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 09:00:01 +0000</lastBuildDate>
    <item>
      <title>a6683904-10bb-488b-b5f1-488df3c080db</title>
      <link>https://vulnerability.circl.lu/sighting/a6683904-10bb-488b-b5f1-488df3c080db/export</link>
      <description>{"uuid": "a6683904-10bb-488b-b5f1-488df3c080db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9176", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a1. \u6d4b\u8bd5CVE-2024-10220\nURL\uff1ahttps://github.com/phoenixmerk/CVE-2024-10220-test-case\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-25T08:17:10.000000Z"}</description>
      <content:encoded>{"uuid": "a6683904-10bb-488b-b5f1-488df3c080db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9176", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a1. \u6d4b\u8bd5CVE-2024-10220\nURL\uff1ahttps://github.com/phoenixmerk/CVE-2024-10220-test-case\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-25T08:17:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a6683904-10bb-488b-b5f1-488df3c080db/export</guid>
      <pubDate>Mon, 25 Nov 2024 08:17:10 +0000</pubDate>
    </item>
    <item>
      <title>af59d7d6-c3be-44e8-8441-4c1395c47add</title>
      <link>https://vulnerability.circl.lu/sighting/af59d7d6-c3be-44e8-8441-4c1395c47add/export</link>
      <description>{"uuid": "af59d7d6-c3be-44e8-8441-4c1395c47add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/967", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0645\u062f\u06cc\u0631\u06cc\u062a \u062e\u0648\u0634\u0647 \u0645\u0627\u0634\u06cc\u0646 \u0645\u062c\u0627\u0632\u06cc Kubernetes \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0645\u062d\u062f\u0648\u062f\u06cc\u062a \u0646\u0627\u0645 \u0645\u0633\u06cc\u0631 \u0646\u0627\u062f\u0631\u0633\u062a \u062f\u0631 \u06cc\u06a9 \u0641\u0647\u0631\u0633\u062a \u0645\u062d\u062f\u0648\u062f \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u062e\u0627\u0631\u062c \u0627\u0632 \u0645\u0631\u0632\u0647\u0627\u06cc \u06a9\u0627\u0646\u062a\u06cc\u0646\u0631 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0645\u06cc\u0632\u0628\u0627\u0646 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nBDU: 2024-10035\nCVE-2024-10220\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f\n\u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062d\u062c\u0645 gitRepo\n\u0634\u0628\u06cc\u0647 \u0633\u0627\u0632\u06cc \u06cc\u06a9 \u0645\u062e\u0632\u0646\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0644\u06cc\u0633\u062a \"\u0633\u0641\u06cc\u062f\" \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627:\nhttps://discuss.kubernetes.io/t/security-advisory-cve-2024-10220-arbitrary-command-execution-through-gitrepo-volume/30571\nhttps://github.com/kubernetes/kubernetes/pull/124531\n\u26a0\ufe0f\u0628\u06cc\u0627\u0646\u06cc\u0647 \u0633\u0644\u0628 \u0645\u0633\u0626\u0648\u0644\u06cc\u062a\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2024-11-29T17:22:02.000000Z"}</description>
      <content:encoded>{"uuid": "af59d7d6-c3be-44e8-8441-4c1395c47add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/967", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0645\u062f\u06cc\u0631\u06cc\u062a \u062e\u0648\u0634\u0647 \u0645\u0627\u0634\u06cc\u0646 \u0645\u062c\u0627\u0632\u06cc Kubernetes \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0645\u062d\u062f\u0648\u062f\u06cc\u062a \u0646\u0627\u0645 \u0645\u0633\u06cc\u0631 \u0646\u0627\u062f\u0631\u0633\u062a \u062f\u0631 \u06cc\u06a9 \u0641\u0647\u0631\u0633\u062a \u0645\u062d\u062f\u0648\u062f \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u062e\u0627\u0631\u062c \u0627\u0632 \u0645\u0631\u0632\u0647\u0627\u06cc \u06a9\u0627\u0646\u062a\u06cc\u0646\u0631 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0645\u06cc\u0632\u0628\u0627\u0646 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nBDU: 2024-10035\nCVE-2024-10220\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f\n\u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062d\u062c\u0645 gitRepo\n\u0634\u0628\u06cc\u0647 \u0633\u0627\u0632\u06cc \u06cc\u06a9 \u0645\u062e\u0632\u0646\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0644\u06cc\u0633\u062a \"\u0633\u0641\u06cc\u062f\" \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627:\nhttps://discuss.kubernetes.io/t/security-advisory-cve-2024-10220-arbitrary-command-execution-through-gitrepo-volume/30571\nhttps://github.com/kubernetes/kubernetes/pull/124531\n\u26a0\ufe0f\u0628\u06cc\u0627\u0646\u06cc\u0647 \u0633\u0644\u0628 \u0645\u0633\u0626\u0648\u0644\u06cc\u062a\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2024-11-29T17:22:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/af59d7d6-c3be-44e8-8441-4c1395c47add/export</guid>
      <pubDate>Fri, 29 Nov 2024 17:22:02 +0000</pubDate>
    </item>
    <item>
      <title>84ad0210-ac44-481d-ae16-f969fd15fbbc</title>
      <link>https://vulnerability.circl.lu/sighting/84ad0210-ac44-481d-ae16-f969fd15fbbc/export</link>
      <description>{"uuid": "84ad0210-ac44-481d-ae16-f969fd15fbbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9272", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-10220 Test repo\nURL\uff1ahttps://github.com/XiaomingX/cve-2024-10220-githooks\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-01T05:19:59.000000Z"}</description>
      <content:encoded>{"uuid": "84ad0210-ac44-481d-ae16-f969fd15fbbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9272", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-10220 Test repo\nURL\uff1ahttps://github.com/XiaomingX/cve-2024-10220-githooks\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-01T05:19:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/84ad0210-ac44-481d-ae16-f969fd15fbbc/export</guid>
      <pubDate>Sun, 01 Dec 2024 05:19:59 +0000</pubDate>
    </item>
    <item>
      <title>69b28388-9a5f-48aa-bcc5-289dafedbc26</title>
      <link>https://vulnerability.circl.lu/sighting/69b28388-9a5f-48aa-bcc5-289dafedbc26/export</link>
      <description>{"uuid": "69b28388-9a5f-48aa-bcc5-289dafedbc26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9461", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-10220 POC\nURL\uff1ahttps://github.com/candranapits/poc-CVE-2024-10220\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-17T08:29:04.000000Z"}</description>
      <content:encoded>{"uuid": "69b28388-9a5f-48aa-bcc5-289dafedbc26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9461", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-10220 POC\nURL\uff1ahttps://github.com/candranapits/poc-CVE-2024-10220\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-17T08:29:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/69b28388-9a5f-48aa-bcc5-289dafedbc26/export</guid>
      <pubDate>Tue, 17 Dec 2024 08:29:04 +0000</pubDate>
    </item>
    <item>
      <title>bd0121ee-d226-40e2-b4a1-1e32fcc78821</title>
      <link>https://vulnerability.circl.lu/sighting/bd0121ee-d226-40e2-b4a1-1e32fcc78821/export</link>
      <description>{"uuid": "bd0121ee-d226-40e2-b4a1-1e32fcc78821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10229", "type": "published-proof-of-concept", "source": "https://t.me/slonser_notes/881", "content": "\u0412 2024 \u0433\u043e\u0434\u0443 \u044f \u043f\u043e\u0442\u0440\u0430\u0442\u0438\u043b \u043c\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430 \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439\n\u041a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u043d\u0435 \u0431\u044b\u043b\u043e \u0435\u0434\u0438\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 Chrome.\n\u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u044f \u0435\u0433\u043e \u0441\u0434\u0435\u043b\u0430\u043b!\n\u041d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0441\u0430\u043c\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u043c\u043d\u043e\u044e \u0442\u0435\u0445\u043d\u0438\u043a\u0438, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437 \u043d\u0438\u0445 \u043a\u0430\u0436\u0435\u0442\u0441\u044f \u043d\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0438\u0441\u044c \u0434\u043e \u043c\u0435\u043d\u044f.\n\u0422\u0430\u043a \u0436\u0435 \u0440\u0435\u0441\u0443\u0440\u0441 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0431\u0430\u0437\u043e\u0432\u043e\u0435 \u0432\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 \u0438 \u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443.\n\u041f\u043e\u043c\u0438\u043c\u043e \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u0442\u0430\u043a \u0436\u0435 \u0431\u0443\u0434\u0443 \u0437\u0430\u043b\u0438\u0432\u0430\u0442\u044c \u0442\u0443\u0434\u0430 \u0431\u0430\u0433\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 extension \u0432 \u0441\u0430\u043c\u043e\u043c Chromium, \u043f\u0435\u0440\u0432\u044b\u0439 \u043c\u0438\u043d\u0438 \u0432\u0440\u0430\u0439\u0442\u0430\u043f \u043d\u0430 \u043c\u043e\u044e CVE-2024-10229.\nMake Chrome Extension Safe Again!\nhttps://extensions.neplox.security/", "creation_timestamp": "2025-01-18T11:21:27.000000Z"}</description>
      <content:encoded>{"uuid": "bd0121ee-d226-40e2-b4a1-1e32fcc78821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10229", "type": "published-proof-of-concept", "source": "https://t.me/slonser_notes/881", "content": "\u0412 2024 \u0433\u043e\u0434\u0443 \u044f \u043f\u043e\u0442\u0440\u0430\u0442\u0438\u043b \u043c\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430 \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439\n\u041a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u043d\u0435 \u0431\u044b\u043b\u043e \u0435\u0434\u0438\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 Chrome.\n\u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u044f \u0435\u0433\u043e \u0441\u0434\u0435\u043b\u0430\u043b!\n\u041d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0441\u0430\u043c\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u043c\u043d\u043e\u044e \u0442\u0435\u0445\u043d\u0438\u043a\u0438, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437 \u043d\u0438\u0445 \u043a\u0430\u0436\u0435\u0442\u0441\u044f \u043d\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0438\u0441\u044c \u0434\u043e \u043c\u0435\u043d\u044f.\n\u0422\u0430\u043a \u0436\u0435 \u0440\u0435\u0441\u0443\u0440\u0441 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0431\u0430\u0437\u043e\u0432\u043e\u0435 \u0432\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 \u0438 \u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443.\n\u041f\u043e\u043c\u0438\u043c\u043e \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u0442\u0430\u043a \u0436\u0435 \u0431\u0443\u0434\u0443 \u0437\u0430\u043b\u0438\u0432\u0430\u0442\u044c \u0442\u0443\u0434\u0430 \u0431\u0430\u0433\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 extension \u0432 \u0441\u0430\u043c\u043e\u043c Chromium, \u043f\u0435\u0440\u0432\u044b\u0439 \u043c\u0438\u043d\u0438 \u0432\u0440\u0430\u0439\u0442\u0430\u043f \u043d\u0430 \u043c\u043e\u044e CVE-2024-10229.\nMake Chrome Extension Safe Again!\nhttps://extensions.neplox.security/", "creation_timestamp": "2025-01-18T11:21:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bd0121ee-d226-40e2-b4a1-1e32fcc78821/export</guid>
      <pubDate>Sat, 18 Jan 2025 11:21:27 +0000</pubDate>
    </item>
    <item>
      <title>9a4b9c40-6e5d-4322-8767-b49a3c2c44f6</title>
      <link>https://vulnerability.circl.lu/sighting/9a4b9c40-6e5d-4322-8767-b49a3c2c44f6/export</link>
      <description>{"uuid": "9a4b9c40-6e5d-4322-8767-b49a3c2c44f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10229", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/4966", "content": "\u0412 2024 \u0433\u043e\u0434\u0443 \u044f \u043f\u043e\u0442\u0440\u0430\u0442\u0438\u043b \u043c\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430 \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439\n\u041a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u043d\u0435 \u0431\u044b\u043b\u043e \u0435\u0434\u0438\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 Chrome.\n\u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u044f \u0435\u0433\u043e \u0441\u0434\u0435\u043b\u0430\u043b!\n\u041d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0441\u0430\u043c\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u043c\u043d\u043e\u044e \u0442\u0435\u0445\u043d\u0438\u043a\u0438, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437 \u043d\u0438\u0445 \u043a\u0430\u0436\u0435\u0442\u0441\u044f \u043d\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0438\u0441\u044c \u0434\u043e \u043c\u0435\u043d\u044f.\n\u0422\u0430\u043a \u0436\u0435 \u0440\u0435\u0441\u0443\u0440\u0441 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0431\u0430\u0437\u043e\u0432\u043e\u0435 \u0432\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 \u0438 \u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443.\n\u041f\u043e\u043c\u0438\u043c\u043e \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u0442\u0430\u043a \u0436\u0435 \u0431\u0443\u0434\u0443 \u0437\u0430\u043b\u0438\u0432\u0430\u0442\u044c \u0442\u0443\u0434\u0430 \u0431\u0430\u0433\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 extension \u0432 \u0441\u0430\u043c\u043e\u043c Chromium, \u043f\u0435\u0440\u0432\u044b\u0439 \u043c\u0438\u043d\u0438 \u0432\u0440\u0430\u0439\u0442\u0430\u043f \u043d\u0430 \u043c\u043e\u044e CVE-2024-10229.\nMake Chrome Extension Safe Again!\nhttps://extensions.neplox.security/", "creation_timestamp": "2025-01-26T06:57:16.000000Z"}</description>
      <content:encoded>{"uuid": "9a4b9c40-6e5d-4322-8767-b49a3c2c44f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10229", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/4966", "content": "\u0412 2024 \u0433\u043e\u0434\u0443 \u044f \u043f\u043e\u0442\u0440\u0430\u0442\u0438\u043b \u043c\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430 \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439\n\u041a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u043d\u0435 \u0431\u044b\u043b\u043e \u0435\u0434\u0438\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 Chrome.\n\u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u044f \u0435\u0433\u043e \u0441\u0434\u0435\u043b\u0430\u043b!\n\u041d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0441\u0430\u043c\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u043c\u043d\u043e\u044e \u0442\u0435\u0445\u043d\u0438\u043a\u0438, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437 \u043d\u0438\u0445 \u043a\u0430\u0436\u0435\u0442\u0441\u044f \u043d\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0438\u0441\u044c \u0434\u043e \u043c\u0435\u043d\u044f.\n\u0422\u0430\u043a \u0436\u0435 \u0440\u0435\u0441\u0443\u0440\u0441 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0431\u0430\u0437\u043e\u0432\u043e\u0435 \u0432\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 \u0438 \u0438\u0445 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443.\n\u041f\u043e\u043c\u0438\u043c\u043e \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u0442\u0430\u043a \u0436\u0435 \u0431\u0443\u0434\u0443 \u0437\u0430\u043b\u0438\u0432\u0430\u0442\u044c \u0442\u0443\u0434\u0430 \u0431\u0430\u0433\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 extension \u0432 \u0441\u0430\u043c\u043e\u043c Chromium, \u043f\u0435\u0440\u0432\u044b\u0439 \u043c\u0438\u043d\u0438 \u0432\u0440\u0430\u0439\u0442\u0430\u043f \u043d\u0430 \u043c\u043e\u044e CVE-2024-10229.\nMake Chrome Extension Safe Again!\nhttps://extensions.neplox.security/", "creation_timestamp": "2025-01-26T06:57:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9a4b9c40-6e5d-4322-8767-b49a3c2c44f6/export</guid>
      <pubDate>Sun, 26 Jan 2025 06:57:16 +0000</pubDate>
    </item>
    <item>
      <title>f23c1fa2-a30f-4e07-9b61-821b14ef55e9</title>
      <link>https://vulnerability.circl.lu/sighting/f23c1fa2-a30f-4e07-9b61-821b14ef55e9/export</link>
      <description>{"uuid": "f23c1fa2-a30f-4e07-9b61-821b14ef55e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10222", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4900", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10222\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to upload SVG files can be extended to authors.\n\ud83d\udccf Published: 2025-02-21T13:41:28.666Z\n\ud83d\udccf Modified: 2025-02-21T13:41:28.666Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5852f08d-0506-464e-afd1-c625e4034e1d?source=cve\n2. https://wordpress.org/plugins/svg-support/#developers\n3. https://plugins.trac.wordpress.org/changeset/3244181/\n4. https://github.com/benbodhi/svg-support/commit/eee3e13b650511c9cc9ee0746be485d031c7c072", "creation_timestamp": "2025-02-21T14:18:40.000000Z"}</description>
      <content:encoded>{"uuid": "f23c1fa2-a30f-4e07-9b61-821b14ef55e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10222", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4900", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10222\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to upload SVG files can be extended to authors.\n\ud83d\udccf Published: 2025-02-21T13:41:28.666Z\n\ud83d\udccf Modified: 2025-02-21T13:41:28.666Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/5852f08d-0506-464e-afd1-c625e4034e1d?source=cve\n2. https://wordpress.org/plugins/svg-support/#developers\n3. https://plugins.trac.wordpress.org/changeset/3244181/\n4. https://github.com/benbodhi/svg-support/commit/eee3e13b650511c9cc9ee0746be485d031c7c072", "creation_timestamp": "2025-02-21T14:18:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f23c1fa2-a30f-4e07-9b61-821b14ef55e9/export</guid>
      <pubDate>Fri, 21 Feb 2025 14:18:40 +0000</pubDate>
    </item>
    <item>
      <title>cc9a4cbe-fef5-441a-bfe9-5c159e60dd41</title>
      <link>https://vulnerability.circl.lu/sighting/cc9a4cbe-fef5-441a-bfe9-5c159e60dd41/export</link>
      <description>{"uuid": "cc9a4cbe-fef5-441a-bfe9-5c159e60dd41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10222", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lip4jhxhus2y", "content": "", "creation_timestamp": "2025-02-21T15:26:59.887593Z"}</description>
      <content:encoded>{"uuid": "cc9a4cbe-fef5-441a-bfe9-5c159e60dd41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10222", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lip4jhxhus2y", "content": "", "creation_timestamp": "2025-02-21T15:26:59.887593Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cc9a4cbe-fef5-441a-bfe9-5c159e60dd41/export</guid>
      <pubDate>Fri, 21 Feb 2025 15:26:59 +0000</pubDate>
    </item>
    <item>
      <title>ecb30e8f-babd-45d0-b7e6-d9e531b69224</title>
      <link>https://vulnerability.circl.lu/sighting/ecb30e8f-babd-45d0-b7e6-d9e531b69224/export</link>
      <description>{"uuid": "ecb30e8f-babd-45d0-b7e6-d9e531b69224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10222", "type": "seen", "source": "https://t.me/cvedetector/18661", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10222 - \"WordPress SVG Support Stored Cross-Site Scripting\"\", \n  \"Content\": \"CVE ID : CVE-2024-10222 \nPublished : Feb. 21, 2025, 2:15 p.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : The SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to upload SVG files can be extended to authors. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T18:06:14.000000Z"}</description>
      <content:encoded>{"uuid": "ecb30e8f-babd-45d0-b7e6-d9e531b69224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10222", "type": "seen", "source": "https://t.me/cvedetector/18661", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10222 - \"WordPress SVG Support Stored Cross-Site Scripting\"\", \n  \"Content\": \"CVE ID : CVE-2024-10222 \nPublished : Feb. 21, 2025, 2:15 p.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : The SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to upload SVG files can be extended to authors. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T18:06:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ecb30e8f-babd-45d0-b7e6-d9e531b69224/export</guid>
      <pubDate>Fri, 21 Feb 2025 18:06:14 +0000</pubDate>
    </item>
    <item>
      <title>f62bf76e-572d-4b3c-95f4-527cd6ffcd98</title>
      <link>https://vulnerability.circl.lu/sighting/f62bf76e-572d-4b3c-95f4-527cd6ffcd98/export</link>
      <description>{"uuid": "f62bf76e-572d-4b3c-95f4-527cd6ffcd98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "Telegram/q7VD5LFLz0DQI0He0CdIi8UKDEAJAk3zBKou56yKpQVq99g", "content": "", "creation_timestamp": "2025-12-01T03:00:07.000000Z"}</description>
      <content:encoded>{"uuid": "f62bf76e-572d-4b3c-95f4-527cd6ffcd98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10220", "type": "published-proof-of-concept", "source": "Telegram/q7VD5LFLz0DQI0He0CdIi8UKDEAJAk3zBKou56yKpQVq99g", "content": "", "creation_timestamp": "2025-12-01T03:00:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f62bf76e-572d-4b3c-95f4-527cd6ffcd98/export</guid>
      <pubDate>Mon, 01 Dec 2025 03:00:07 +0000</pubDate>
    </item>
  </channel>
</rss>
