<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 16:32:15 +0000</lastBuildDate>
    <item>
      <title>3a5a9e59-045d-4dcd-9737-7e35a220d3bf</title>
      <link>https://vulnerability.circl.lu/sighting/3a5a9e59-045d-4dcd-9737-7e35a220d3bf/export</link>
      <description>{"uuid": "3a5a9e59-045d-4dcd-9737-7e35a220d3bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36453", "type": "seen", "source": "https://t.me/cvedetector/519", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36453 - Cross-site scripting vulnerability exists in sessi\", \n  \"Content\": \"CVE ID : CVE-2024-36453 \nPublished : July 10, 2024, 7:15 a.m. | 18\u00a0minutes ago \nDescription : Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T09:39:22.000000Z"}</description>
      <content:encoded>{"uuid": "3a5a9e59-045d-4dcd-9737-7e35a220d3bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36453", "type": "seen", "source": "https://t.me/cvedetector/519", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36453 - Cross-site scripting vulnerability exists in sessi\", \n  \"Content\": \"CVE ID : CVE-2024-36453 \nPublished : July 10, 2024, 7:15 a.m. | 18\u00a0minutes ago \nDescription : Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T09:39:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3a5a9e59-045d-4dcd-9737-7e35a220d3bf/export</guid>
      <pubDate>Wed, 10 Jul 2024 09:39:22 +0000</pubDate>
    </item>
  </channel>
</rss>
