<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 08:14:16 +0000</lastBuildDate>
    <item>
      <title>e721ec9d-c50c-44a1-92aa-a0cbd1a8cbd0</title>
      <link>https://vulnerability.circl.lu/sighting/e721ec9d-c50c-44a1-92aa-a0cbd1a8cbd0/export</link>
      <description>{"uuid": "e721ec9d-c50c-44a1-92aa-a0cbd1a8cbd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11289", "type": "seen", "source": "https://t.me/cvedetector/12198", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11289 - The Soledad theme for WordPress is vulnerable to L\", \n  \"Content\": \"CVE ID : CVE-2024-11289 \nPublished : Dec. 6, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : The Soledad theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 8.5.9 via several functions like penci_archive_more_post_ajax_func, penci_more_post_ajax_func, and penci_more_featured_post_ajax_func. This makes it possible for unauthenticated attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. The exploitability of this is limited to Windows. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T12:16:22.000000Z"}</description>
      <content:encoded>{"uuid": "e721ec9d-c50c-44a1-92aa-a0cbd1a8cbd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11289", "type": "seen", "source": "https://t.me/cvedetector/12198", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11289 - The Soledad theme for WordPress is vulnerable to L\", \n  \"Content\": \"CVE ID : CVE-2024-11289 \nPublished : Dec. 6, 2024, 10:15 a.m. | 41\u00a0minutes ago \nDescription : The Soledad theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 8.5.9 via several functions like penci_archive_more_post_ajax_func, penci_more_post_ajax_func, and penci_more_featured_post_ajax_func. This makes it possible for unauthenticated attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. The exploitability of this is limited to Windows. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T12:16:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e721ec9d-c50c-44a1-92aa-a0cbd1a8cbd0/export</guid>
      <pubDate>Fri, 06 Dec 2024 12:16:22 +0000</pubDate>
    </item>
  </channel>
</rss>
