<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:21:09 +0000</lastBuildDate>
    <item>
      <title>2aef8a88-c11d-467e-8d9f-143c3c548c06</title>
      <link>https://vulnerability.circl.lu/sighting/2aef8a88-c11d-467e-8d9f-143c3c548c06/export</link>
      <description>{"uuid": "2aef8a88-c11d-467e-8d9f-143c3c548c06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39682", "type": "seen", "source": "https://t.me/cvedetector/1129", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39682 - WordPress Cooked Plugin HTML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39682 \nPublished : July 18, 2024, 1:15 a.m. | 42\u00a0minutes ago \nDescription : Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-18T04:15:30.000000Z"}</description>
      <content:encoded>{"uuid": "2aef8a88-c11d-467e-8d9f-143c3c548c06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39682", "type": "seen", "source": "https://t.me/cvedetector/1129", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39682 - WordPress Cooked Plugin HTML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39682 \nPublished : July 18, 2024, 1:15 a.m. | 42\u00a0minutes ago \nDescription : Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-18T04:15:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2aef8a88-c11d-467e-8d9f-143c3c548c06/export</guid>
      <pubDate>Thu, 18 Jul 2024 04:15:30 +0000</pubDate>
    </item>
  </channel>
</rss>
