<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 04:07:21 +0000</lastBuildDate>
    <item>
      <title>003112a9-0f63-4a9e-af5f-768a632bcb68</title>
      <link>https://vulnerability.circl.lu/sighting/003112a9-0f63-4a9e-af5f-768a632bcb68/export</link>
      <description>{"uuid": "003112a9-0f63-4a9e-af5f-768a632bcb68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38503", "type": "seen", "source": "https://t.me/cvedetector/1409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38503 - Syncope Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38503 \nPublished : July 22, 2024, 10:15 a.m. | 31\u00a0minutes ago \nDescription : When editing a user, group or any object in the Syncope Console, HTML tags could be added to any text field and could lead to potential exploits.  \nThe same vulnerability was found in the Syncope Enduser, when editing \u201cPersonal Information\u201d or \u201cUser Requests\u201d.  \n  \nUsers are recommended to upgrade to version 3.0.8, which fixes this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T12:48:01.000000Z"}</description>
      <content:encoded>{"uuid": "003112a9-0f63-4a9e-af5f-768a632bcb68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38503", "type": "seen", "source": "https://t.me/cvedetector/1409", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38503 - Syncope Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38503 \nPublished : July 22, 2024, 10:15 a.m. | 31\u00a0minutes ago \nDescription : When editing a user, group or any object in the Syncope Console, HTML tags could be added to any text field and could lead to potential exploits.  \nThe same vulnerability was found in the Syncope Enduser, when editing \u201cPersonal Information\u201d or \u201cUser Requests\u201d.  \n  \nUsers are recommended to upgrade to version 3.0.8, which fixes this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T12:48:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/003112a9-0f63-4a9e-af5f-768a632bcb68/export</guid>
      <pubDate>Mon, 22 Jul 2024 12:48:01 +0000</pubDate>
    </item>
  </channel>
</rss>
