<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 15:33:19 +0000</lastBuildDate>
    <item>
      <title>07f046fd-74a7-463a-94c8-d4360a6a4e30</title>
      <link>https://vulnerability.circl.lu/sighting/07f046fd-74a7-463a-94c8-d4360a6a4e30/export</link>
      <description>{"uuid": "07f046fd-74a7-463a-94c8-d4360a6a4e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41665", "type": "seen", "source": "https://t.me/cvedetector/1521", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41665 - Ampache Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-41665 \nPublished : July 23, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : Ampache, a web based audio/video streaming application and file manager, has a stored cross-site scripting (XSS) vulnerability in versions prior to 6.6.0. This vulnerability exists in the \"Playlists - Democratic - Configure Democratic Playlist\" feature. An attacker with Content Manager permissions can set the Name field to ``. When any administrator or user accesses the Democratic functionality, they will be affected by this stored XSS vulnerability. The attacker can exploit this vulnerability to obtain the cookies of any user or administrator who accesses the `democratic.php` file. Version 6.6.0 contains a patch for the issue. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T20:34:56.000000Z"}</description>
      <content:encoded>{"uuid": "07f046fd-74a7-463a-94c8-d4360a6a4e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41665", "type": "seen", "source": "https://t.me/cvedetector/1521", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41665 - Ampache Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-41665 \nPublished : July 23, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : Ampache, a web based audio/video streaming application and file manager, has a stored cross-site scripting (XSS) vulnerability in versions prior to 6.6.0. This vulnerability exists in the \"Playlists - Democratic - Configure Democratic Playlist\" feature. An attacker with Content Manager permissions can set the Name field to ``. When any administrator or user accesses the Democratic functionality, they will be affected by this stored XSS vulnerability. The attacker can exploit this vulnerability to obtain the cookies of any user or administrator who accesses the `democratic.php` file. Version 6.6.0 contains a patch for the issue. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T20:34:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/07f046fd-74a7-463a-94c8-d4360a6a4e30/export</guid>
      <pubDate>Tue, 23 Jul 2024 20:34:56 +0000</pubDate>
    </item>
  </channel>
</rss>
