<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 08:59:24 +0000</lastBuildDate>
    <item>
      <title>de06f9c3-8355-4063-906e-bbe0f6257753</title>
      <link>https://vulnerability.circl.lu/sighting/de06f9c3-8355-4063-906e-bbe0f6257753/export</link>
      <description>{"uuid": "de06f9c3-8355-4063-906e-bbe0f6257753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10848", "type": "seen", "source": "https://t.me/cvedetector/12069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10848 - The NewsMunch theme for WordPress is vulnerable to\", \n  \"Content\": \"CVE ID : CVE-2024-10848 \nPublished : Dec. 5, 2024, 10:31 a.m. | 1\u00a0hour, 10\u00a0minutes ago \nDescription : The NewsMunch theme for WordPress is vulnerable to Stored Cross-Site Scripting via a malicious display name in all versions up to, and including, 1.0.35 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T12:50:34.000000Z"}</description>
      <content:encoded>{"uuid": "de06f9c3-8355-4063-906e-bbe0f6257753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10848", "type": "seen", "source": "https://t.me/cvedetector/12069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10848 - The NewsMunch theme for WordPress is vulnerable to\", \n  \"Content\": \"CVE ID : CVE-2024-10848 \nPublished : Dec. 5, 2024, 10:31 a.m. | 1\u00a0hour, 10\u00a0minutes ago \nDescription : The NewsMunch theme for WordPress is vulnerable to Stored Cross-Site Scripting via a malicious display name in all versions up to, and including, 1.0.35 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T12:50:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/de06f9c3-8355-4063-906e-bbe0f6257753/export</guid>
      <pubDate>Thu, 05 Dec 2024 12:50:34 +0000</pubDate>
    </item>
    <item>
      <title>dadcc7e5-657c-489c-ba41-e6ff60055335</title>
      <link>https://vulnerability.circl.lu/sighting/dadcc7e5-657c-489c-ba41-e6ff60055335/export</link>
      <description>{"uuid": "dadcc7e5-657c-489c-ba41-e6ff60055335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10849", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113604963616642781", "content": "", "creation_timestamp": "2024-12-06T08:36:16.800263Z"}</description>
      <content:encoded>{"uuid": "dadcc7e5-657c-489c-ba41-e6ff60055335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10849", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113604963616642781", "content": "", "creation_timestamp": "2024-12-06T08:36:16.800263Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dadcc7e5-657c-489c-ba41-e6ff60055335/export</guid>
      <pubDate>Fri, 06 Dec 2024 08:36:16 +0000</pubDate>
    </item>
    <item>
      <title>2e01da6a-a656-4c2a-bf42-94e7a656b905</title>
      <link>https://vulnerability.circl.lu/sighting/2e01da6a-a656-4c2a-bf42-94e7a656b905/export</link>
      <description>{"uuid": "2e01da6a-a656-4c2a-bf42-94e7a656b905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878382100891566", "content": "", "creation_timestamp": "2025-01-23T15:30:12.371335Z"}</description>
      <content:encoded>{"uuid": "2e01da6a-a656-4c2a-bf42-94e7a656b905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878382100891566", "content": "", "creation_timestamp": "2025-01-23T15:30:12.371335Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2e01da6a-a656-4c2a-bf42-94e7a656b905/export</guid>
      <pubDate>Thu, 23 Jan 2025 15:30:12 +0000</pubDate>
    </item>
    <item>
      <title>b1a845fe-6a92-4244-9b33-9a17ddf56210</title>
      <link>https://vulnerability.circl.lu/sighting/b1a845fe-6a92-4244-9b33-9a17ddf56210/export</link>
      <description>{"uuid": "b1a845fe-6a92-4244-9b33-9a17ddf56210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878400720241278", "content": "", "creation_timestamp": "2025-01-23T15:34:55.918424Z"}</description>
      <content:encoded>{"uuid": "b1a845fe-6a92-4244-9b33-9a17ddf56210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113878400720241278", "content": "", "creation_timestamp": "2025-01-23T15:34:55.918424Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b1a845fe-6a92-4244-9b33-9a17ddf56210/export</guid>
      <pubDate>Thu, 23 Jan 2025 15:34:55 +0000</pubDate>
    </item>
    <item>
      <title>0d7f98cc-255b-4cf7-b67b-83fb2a8c44c3</title>
      <link>https://vulnerability.circl.lu/sighting/0d7f98cc-255b-4cf7-b67b-83fb2a8c44c3/export</link>
      <description>{"uuid": "0d7f98cc-255b-4cf7-b67b-83fb2a8c44c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggbqgn3ig2t", "content": "", "creation_timestamp": "2025-01-23T16:15:57.257217Z"}</description>
      <content:encoded>{"uuid": "0d7f98cc-255b-4cf7-b67b-83fb2a8c44c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggbqgn3ig2t", "content": "", "creation_timestamp": "2025-01-23T16:15:57.257217Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0d7f98cc-255b-4cf7-b67b-83fb2a8c44c3/export</guid>
      <pubDate>Thu, 23 Jan 2025 16:15:57 +0000</pubDate>
    </item>
    <item>
      <title>49871594-2dc5-4347-9181-66e48a637366</title>
      <link>https://vulnerability.circl.lu/sighting/49871594-2dc5-4347-9181-66e48a637366/export</link>
      <description>{"uuid": "49871594-2dc5-4347-9181-66e48a637366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10847", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113917612286403707", "content": "", "creation_timestamp": "2025-01-30T13:46:57.034629Z"}</description>
      <content:encoded>{"uuid": "49871594-2dc5-4347-9181-66e48a637366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10847", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113917612286403707", "content": "", "creation_timestamp": "2025-01-30T13:46:57.034629Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/49871594-2dc5-4347-9181-66e48a637366/export</guid>
      <pubDate>Thu, 30 Jan 2025 13:46:57 +0000</pubDate>
    </item>
    <item>
      <title>00e423b5-1a8a-4b08-b303-be353c4c7ebb</title>
      <link>https://vulnerability.circl.lu/sighting/00e423b5-1a8a-4b08-b303-be353c4c7ebb/export</link>
      <description>{"uuid": "00e423b5-1a8a-4b08-b303-be353c4c7ebb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10847", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgxocxm7732w", "content": "", "creation_timestamp": "2025-01-30T14:16:19.255694Z"}</description>
      <content:encoded>{"uuid": "00e423b5-1a8a-4b08-b303-be353c4c7ebb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10847", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgxocxm7732w", "content": "", "creation_timestamp": "2025-01-30T14:16:19.255694Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/00e423b5-1a8a-4b08-b303-be353c4c7ebb/export</guid>
      <pubDate>Thu, 30 Jan 2025 14:16:19 +0000</pubDate>
    </item>
    <item>
      <title>fc1bba39-2eaf-496e-a10e-536c75ff6770</title>
      <link>https://vulnerability.circl.lu/sighting/fc1bba39-2eaf-496e-a10e-536c75ff6770/export</link>
      <description>{"uuid": "fc1bba39-2eaf-496e-a10e-536c75ff6770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13560", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10846\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions  v2.27.0 to v2.29.7 included\n\ud83d\udccf Published: 2025-01-23T15:22:56.170Z\n\ud83d\udccf Modified: 2025-04-25T23:02:53.505Z\n\ud83d\udd17 References:\n1. https://github.com/compose-spec/compose-go/security/advisories/GHSA-36gq-35j3-p9r9", "creation_timestamp": "2025-04-26T00:07:36.000000Z"}</description>
      <content:encoded>{"uuid": "fc1bba39-2eaf-496e-a10e-536c75ff6770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10846", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13560", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10846\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H)\n\ud83d\udd39 Description: The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions  v2.27.0 to v2.29.7 included\n\ud83d\udccf Published: 2025-01-23T15:22:56.170Z\n\ud83d\udccf Modified: 2025-04-25T23:02:53.505Z\n\ud83d\udd17 References:\n1. https://github.com/compose-spec/compose-go/security/advisories/GHSA-36gq-35j3-p9r9", "creation_timestamp": "2025-04-26T00:07:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fc1bba39-2eaf-496e-a10e-536c75ff6770/export</guid>
      <pubDate>Sat, 26 Apr 2025 00:07:36 +0000</pubDate>
    </item>
    <item>
      <title>c871894a-f2b4-481f-9627-f56c1c5ef660</title>
      <link>https://vulnerability.circl.lu/sighting/c871894a-f2b4-481f-9627-f56c1c5ef660/export</link>
      <description>{"uuid": "c871894a-f2b4-481f-9627-f56c1c5ef660", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10844", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhrytzo44o2q", "content": "", "creation_timestamp": "2026-03-24T07:00:15.022857Z"}</description>
      <content:encoded>{"uuid": "c871894a-f2b4-481f-9627-f56c1c5ef660", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10844", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhrytzo44o2q", "content": "", "creation_timestamp": "2026-03-24T07:00:15.022857Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c871894a-f2b4-481f-9627-f56c1c5ef660/export</guid>
      <pubDate>Tue, 24 Mar 2026 07:00:15 +0000</pubDate>
    </item>
    <item>
      <title>901893f8-bb65-4b91-bf0e-f8fc2d0f7d73</title>
      <link>https://vulnerability.circl.lu/sighting/901893f8-bb65-4b91-bf0e-f8fc2d0f7d73/export</link>
      <description>{"uuid": "901893f8-bb65-4b91-bf0e-f8fc2d0f7d73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10845", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhsjmi7gam2b", "content": "", "creation_timestamp": "2026-03-24T12:00:15.877992Z"}</description>
      <content:encoded>{"uuid": "901893f8-bb65-4b91-bf0e-f8fc2d0f7d73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10845", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhsjmi7gam2b", "content": "", "creation_timestamp": "2026-03-24T12:00:15.877992Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/901893f8-bb65-4b91-bf0e-f8fc2d0f7d73/export</guid>
      <pubDate>Tue, 24 Mar 2026 12:00:15 +0000</pubDate>
    </item>
  </channel>
</rss>
