<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 00:09:52 +0000</lastBuildDate>
    <item>
      <title>e4b24b4e-8b42-4c09-a238-38bccf84fe7f</title>
      <link>https://vulnerability.circl.lu/sighting/e4b24b4e-8b42-4c09-a238-38bccf84fe7f/export</link>
      <description>{"uuid": "e4b24b4e-8b42-4c09-a238-38bccf84fe7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10436", "type": "seen", "source": "https://t.me/cvedetector/9278", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10436 - WPC Smart Messages for WooCommerce Local File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10436 \nPublished : Oct. 29, 2024, 10:15 a.m. | 39\u00a0minutes ago \nDescription : The WPC Smart Messages for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.2.1 via the get_condition_value function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T12:15:38.000000Z"}</description>
      <content:encoded>{"uuid": "e4b24b4e-8b42-4c09-a238-38bccf84fe7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10436", "type": "seen", "source": "https://t.me/cvedetector/9278", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10436 - WPC Smart Messages for WooCommerce Local File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10436 \nPublished : Oct. 29, 2024, 10:15 a.m. | 39\u00a0minutes ago \nDescription : The WPC Smart Messages for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.2.1 via the get_condition_value function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T12:15:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e4b24b4e-8b42-4c09-a238-38bccf84fe7f/export</guid>
      <pubDate>Tue, 29 Oct 2024 12:15:38 +0000</pubDate>
    </item>
  </channel>
</rss>
