<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 22:50:06 +0000</lastBuildDate>
    <item>
      <title>109052cd-fc3c-46a1-a21d-dceda0aa8b21</title>
      <link>https://vulnerability.circl.lu/sighting/109052cd-fc3c-46a1-a21d-dceda0aa8b21/export</link>
      <description>{"uuid": "109052cd-fc3c-46a1-a21d-dceda0aa8b21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6516", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13747\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query.\n\ud83d\udccf Published: 2025-03-05T09:21:50.106Z\n\ud83d\udccf Modified: 2025-03-05T09:21:50.106Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/e74e1a7c-4fe6-4041-8c4c-13389dacb9db?source=cve\n2. https://codecanyon.net/item/email-customizer-for-woocommerce-with-drag-drop-builder-woo-email-editor/22400984", "creation_timestamp": "2025-03-05T09:35:50.000000Z"}</description>
      <content:encoded>{"uuid": "109052cd-fc3c-46a1-a21d-dceda0aa8b21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6516", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13747\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query.\n\ud83d\udccf Published: 2025-03-05T09:21:50.106Z\n\ud83d\udccf Modified: 2025-03-05T09:21:50.106Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/e74e1a7c-4fe6-4041-8c4c-13389dacb9db?source=cve\n2. https://codecanyon.net/item/email-customizer-for-woocommerce-with-drag-drop-builder-woo-email-editor/22400984", "creation_timestamp": "2025-03-05T09:35:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/109052cd-fc3c-46a1-a21d-dceda0aa8b21/export</guid>
      <pubDate>Wed, 05 Mar 2025 09:35:50 +0000</pubDate>
    </item>
    <item>
      <title>c71c1aba-f5c5-4653-9998-e8197fde3e12</title>
      <link>https://vulnerability.circl.lu/sighting/c71c1aba-f5c5-4653-9998-e8197fde3e12/export</link>
      <description>{"uuid": "c71c1aba-f5c5-4653-9998-e8197fde3e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "https://t.me/cvedetector/19622", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13747 - WooMail - WooCommerce Email Customizer SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13747 \nPublished : March 5, 2025, 10:15 a.m. | 48\u00a0minutes ago \nDescription : The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T12:46:07.000000Z"}</description>
      <content:encoded>{"uuid": "c71c1aba-f5c5-4653-9998-e8197fde3e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "https://t.me/cvedetector/19622", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13747 - WooMail - WooCommerce Email Customizer SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13747 \nPublished : March 5, 2025, 10:15 a.m. | 48\u00a0minutes ago \nDescription : The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T12:46:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c71c1aba-f5c5-4653-9998-e8197fde3e12/export</guid>
      <pubDate>Wed, 05 Mar 2025 12:46:07 +0000</pubDate>
    </item>
    <item>
      <title>58eab81c-0a42-4749-92c3-7ab32997fe7e</title>
      <link>https://vulnerability.circl.lu/sighting/58eab81c-0a42-4749-92c3-7ab32997fe7e/export</link>
      <description>{"uuid": "58eab81c-0a42-4749-92c3-7ab32997fe7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "Telegram/A_katm2tH23ArIKSyq8Z3TzB8wWJsSAz9SBB_WHUcxKaqgSP", "content": "", "creation_timestamp": "2025-03-06T02:16:31.000000Z"}</description>
      <content:encoded>{"uuid": "58eab81c-0a42-4749-92c3-7ab32997fe7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "Telegram/A_katm2tH23ArIKSyq8Z3TzB8wWJsSAz9SBB_WHUcxKaqgSP", "content": "", "creation_timestamp": "2025-03-06T02:16:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/58eab81c-0a42-4749-92c3-7ab32997fe7e/export</guid>
      <pubDate>Thu, 06 Mar 2025 02:16:31 +0000</pubDate>
    </item>
    <item>
      <title>59892c45-a97a-46b8-9227-a3dd54367be6</title>
      <link>https://vulnerability.circl.lu/sighting/59892c45-a97a-46b8-9227-a3dd54367be6/export</link>
      <description>{"uuid": "59892c45-a97a-46b8-9227-a3dd54367be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13744\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-04-04T04:21:22.827Z\n\ud83d\udccf Modified: 2025-04-04T04:21:22.827Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f8e1aca8-3d82-4b1a-98c8-29501a377846?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3262569/woocommerce-jetpack/trunk/includes/input-fields/class-wcj-product-input-fields-core.php", "creation_timestamp": "2025-04-04T04:35:18.000000Z"}</description>
      <content:encoded>{"uuid": "59892c45-a97a-46b8-9227-a3dd54367be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13744\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\ud83d\udccf Published: 2025-04-04T04:21:22.827Z\n\ud83d\udccf Modified: 2025-04-04T04:21:22.827Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f8e1aca8-3d82-4b1a-98c8-29501a377846?source=cve\n2. https://plugins.trac.wordpress.org/changeset/3262569/woocommerce-jetpack/trunk/includes/input-fields/class-wcj-product-input-fields-core.php", "creation_timestamp": "2025-04-04T04:35:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/59892c45-a97a-46b8-9227-a3dd54367be6/export</guid>
      <pubDate>Fri, 04 Apr 2025 04:35:18 +0000</pubDate>
    </item>
    <item>
      <title>a2562feb-cbfd-4d09-89c4-ce6c5829869d</title>
      <link>https://vulnerability.circl.lu/sighting/a2562feb-cbfd-4d09-89c4-ce6c5829869d/export</link>
      <description>{"uuid": "a2562feb-cbfd-4d09-89c4-ce6c5829869d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114278590468850131", "content": "", "creation_timestamp": "2025-04-04T07:48:27.253456Z"}</description>
      <content:encoded>{"uuid": "a2562feb-cbfd-4d09-89c4-ce6c5829869d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114278590468850131", "content": "", "creation_timestamp": "2025-04-04T07:48:27.253456Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a2562feb-cbfd-4d09-89c4-ce6c5829869d/export</guid>
      <pubDate>Fri, 04 Apr 2025 07:48:27 +0000</pubDate>
    </item>
    <item>
      <title>b08625d9-2bd0-4b13-9337-e9421572ee81</title>
      <link>https://vulnerability.circl.lu/sighting/b08625d9-2bd0-4b13-9337-e9421572ee81/export</link>
      <description>{"uuid": "b08625d9-2bd0-4b13-9337-e9421572ee81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114278590468850131", "content": "", "creation_timestamp": "2025-04-04T07:48:27.258010Z"}</description>
      <content:encoded>{"uuid": "b08625d9-2bd0-4b13-9337-e9421572ee81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114278590468850131", "content": "", "creation_timestamp": "2025-04-04T07:48:27.258010Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b08625d9-2bd0-4b13-9337-e9421572ee81/export</guid>
      <pubDate>Fri, 04 Apr 2025 07:48:27 +0000</pubDate>
    </item>
    <item>
      <title>db9c4742-c1ec-4ad9-b753-a234e66960fa</title>
      <link>https://vulnerability.circl.lu/sighting/db9c4742-c1ec-4ad9-b753-a234e66960fa/export</link>
      <description>{"uuid": "db9c4742-c1ec-4ad9-b753-a234e66960fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://t.me/cvedetector/22080", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13744 - WooCommerce Booster Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13744 \nPublished : April 4, 2025, 5:15 a.m. | 31\u00a0minutes ago \nDescription : The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T07:58:47.000000Z"}</description>
      <content:encoded>{"uuid": "db9c4742-c1ec-4ad9-b753-a234e66960fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://t.me/cvedetector/22080", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13744 - WooCommerce Booster Arbitrary File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13744 \nPublished : April 4, 2025, 5:15 a.m. | 31\u00a0minutes ago \nDescription : The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T07:58:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/db9c4742-c1ec-4ad9-b753-a234e66960fa/export</guid>
      <pubDate>Fri, 04 Apr 2025 07:58:47 +0000</pubDate>
    </item>
    <item>
      <title>34c734d0-2a5c-437e-9c31-422b797a02f5</title>
      <link>https://vulnerability.circl.lu/sighting/34c734d0-2a5c-437e-9c31-422b797a02f5/export</link>
      <description>{"uuid": "34c734d0-2a5c-437e-9c31-422b797a02f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxxaky53i2u", "content": "", "creation_timestamp": "2025-04-04T08:02:00.844645Z"}</description>
      <content:encoded>{"uuid": "34c734d0-2a5c-437e-9c31-422b797a02f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13744", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxxaky53i2u", "content": "", "creation_timestamp": "2025-04-04T08:02:00.844645Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/34c734d0-2a5c-437e-9c31-422b797a02f5/export</guid>
      <pubDate>Fri, 04 Apr 2025 08:02:00 +0000</pubDate>
    </item>
    <item>
      <title>dcf3e82b-b05b-4568-b5ae-877809a962e6</title>
      <link>https://vulnerability.circl.lu/sighting/dcf3e82b-b05b-4568-b5ae-877809a962e6/export</link>
      <description>{"uuid": "dcf3e82b-b05b-4568-b5ae-877809a962e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1374", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15806", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1374\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via\u00a0nomad templates when configuring audit log forwarding. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the  GitHub Bug Bounty program https://bounty.github.com .\n\n\ud83d\udccf Published: 2024-02-13T18:54:18.668Z\n\ud83d\udccf Modified: 2025-05-09T18:18:30.616Z\n\ud83d\udd17 References:\n1. https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15\n2. https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10\n3. https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7\n4. https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5", "creation_timestamp": "2025-05-09T18:26:17.000000Z"}</description>
      <content:encoded>{"uuid": "dcf3e82b-b05b-4568-b5ae-877809a962e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1374", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15806", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1374\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via\u00a0nomad templates when configuring audit log forwarding. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the  GitHub Bug Bounty program https://bounty.github.com .\n\n\ud83d\udccf Published: 2024-02-13T18:54:18.668Z\n\ud83d\udccf Modified: 2025-05-09T18:18:30.616Z\n\ud83d\udd17 References:\n1. https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15\n2. https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10\n3. https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7\n4. https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5", "creation_timestamp": "2025-05-09T18:26:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dcf3e82b-b05b-4568-b5ae-877809a962e6/export</guid>
      <pubDate>Fri, 09 May 2025 18:26:17 +0000</pubDate>
    </item>
    <item>
      <title>43b8c8c0-f9f0-45e8-bee8-bc3626f1574a</title>
      <link>https://vulnerability.circl.lu/sighting/43b8c8c0-f9f0-45e8-bee8-bc3626f1574a/export</link>
      <description>{"uuid": "43b8c8c0-f9f0-45e8-bee8-bc3626f1574a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:30:59.000000Z"}</description>
      <content:encoded>{"uuid": "43b8c8c0-f9f0-45e8-bee8-bc3626f1574a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13747", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:30:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/43b8c8c0-f9f0-45e8-bee8-bc3626f1574a/export</guid>
      <pubDate>Mon, 18 Aug 2025 18:30:59 +0000</pubDate>
    </item>
  </channel>
</rss>
