<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 14:40:18 +0000</lastBuildDate>
    <item>
      <title>5d41fda5-ede6-43d6-a8cc-6099090e94c5</title>
      <link>https://vulnerability.circl.lu/sighting/5d41fda5-ede6-43d6-a8cc-6099090e94c5/export</link>
      <description>{"uuid": "5d41fda5-ede6-43d6-a8cc-6099090e94c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39318", "type": "seen", "source": "https://t.me/cvedetector/2152", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39318 - Ibexa XSS File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39318 \nPublished : July 31, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : The Ibexa Admin UI Bundle contains all the necessary parts to run the Ibexa DXP Back Office interface. The file upload widget is vulnerable to XSS payloads in filenames. Access permission to upload files is required. As such, in most cases only authenticated editors and administrators will have the required permission. It is not persistent, i.e. the payload is only executed during the upload. In effect, an attacker will have to trick an editor/administrator into uploading a strangely named file. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T19:20:47.000000Z"}</description>
      <content:encoded>{"uuid": "5d41fda5-ede6-43d6-a8cc-6099090e94c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39318", "type": "seen", "source": "https://t.me/cvedetector/2152", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39318 - Ibexa XSS File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39318 \nPublished : July 31, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : The Ibexa Admin UI Bundle contains all the necessary parts to run the Ibexa DXP Back Office interface. The file upload widget is vulnerable to XSS payloads in filenames. Access permission to upload files is required. As such, in most cases only authenticated editors and administrators will have the required permission. It is not persistent, i.e. the payload is only executed during the upload. In effect, an attacker will have to trick an editor/administrator into uploading a strangely named file. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T19:20:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5d41fda5-ede6-43d6-a8cc-6099090e94c5/export</guid>
      <pubDate>Wed, 31 Jul 2024 19:20:47 +0000</pubDate>
    </item>
  </channel>
</rss>
