<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:48:00 +0000</lastBuildDate>
    <item>
      <title>f505dfe9-0c33-4b8a-abae-6182acceb7db</title>
      <link>https://vulnerability.circl.lu/sighting/f505dfe9-0c33-4b8a-abae-6182acceb7db/export</link>
      <description>{"uuid": "f505dfe9-0c33-4b8a-abae-6182acceb7db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10828", "type": "seen", "source": "https://t.me/cvedetector/10792", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10828 - WooCommerce Advanced Order Export PHP Object Injection\", \n  \"Content\": \"CVE ID : CVE-2024-10828 \nPublished : Nov. 13, 2024, 4:15 a.m. | 23\u00a0minutes ago \nDescription : The Advanced Order Export For WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.5.5 via deserialization of untrusted input during Order export when the \"Try to convert serialized values\" option is enabled. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T05:47:58.000000Z"}</description>
      <content:encoded>{"uuid": "f505dfe9-0c33-4b8a-abae-6182acceb7db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10828", "type": "seen", "source": "https://t.me/cvedetector/10792", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10828 - WooCommerce Advanced Order Export PHP Object Injection\", \n  \"Content\": \"CVE ID : CVE-2024-10828 \nPublished : Nov. 13, 2024, 4:15 a.m. | 23\u00a0minutes ago \nDescription : The Advanced Order Export For WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.5.5 via deserialization of untrusted input during Order export when the \"Try to convert serialized values\" option is enabled. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T05:47:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f505dfe9-0c33-4b8a-abae-6182acceb7db/export</guid>
      <pubDate>Wed, 13 Nov 2024 05:47:58 +0000</pubDate>
    </item>
  </channel>
</rss>
