<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 00:25:31 +0000</lastBuildDate>
    <item>
      <title>0d06a8d4-46a9-4da5-b5d5-f9924225ec02</title>
      <link>https://vulnerability.circl.lu/sighting/0d06a8d4-46a9-4da5-b5d5-f9924225ec02/export</link>
      <description>{"uuid": "0d06a8d4-46a9-4da5-b5d5-f9924225ec02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40873", "type": "seen", "source": "https://t.me/cvedetector/1639", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40873 - \"Absolute Secure Access Cross-Site Scripting\"\", \n  \"Content\": \"CVE ID : CVE-2024-40873 \nPublished : July 25, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : There is a cross-site scripting vulnerability in the Secure  \nAccess administrative console of Absolute Secure Access prior to version 13.07.  \nAttackers with system administrator permissions can interfere with another  \nsystem administrator\u2019s use of the publishing UI when the administrators are  \nediting the same management object. The scope is unchanged, there is no loss of  \nconfidentiality. Impact to system availability is none, impact to system  \nintegrity is high. \nSeverity: 4.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-25T21:05:53.000000Z"}</description>
      <content:encoded>{"uuid": "0d06a8d4-46a9-4da5-b5d5-f9924225ec02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40873", "type": "seen", "source": "https://t.me/cvedetector/1639", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40873 - \"Absolute Secure Access Cross-Site Scripting\"\", \n  \"Content\": \"CVE ID : CVE-2024-40873 \nPublished : July 25, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : There is a cross-site scripting vulnerability in the Secure  \nAccess administrative console of Absolute Secure Access prior to version 13.07.  \nAttackers with system administrator permissions can interfere with another  \nsystem administrator\u2019s use of the publishing UI when the administrators are  \nediting the same management object. The scope is unchanged, there is no loss of  \nconfidentiality. Impact to system availability is none, impact to system  \nintegrity is high. \nSeverity: 4.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-25T21:05:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0d06a8d4-46a9-4da5-b5d5-f9924225ec02/export</guid>
      <pubDate>Thu, 25 Jul 2024 21:05:53 +0000</pubDate>
    </item>
  </channel>
</rss>
