<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 04:47:55 +0000</lastBuildDate>
    <item>
      <title>ddea76f5-fc62-4b50-891c-0ba3e7807695</title>
      <link>https://vulnerability.circl.lu/sighting/ddea76f5-fc62-4b50-891c-0ba3e7807695/export</link>
      <description>{"uuid": "ddea76f5-fc62-4b50-891c-0ba3e7807695", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4372", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/130", "content": "CVE ID : CVE-2024-4372\nSystem : wordpress &amp;lt; 2.2.11\nType : XSS\n\nExploit :\nCreate a new slider and inset:\n\n (1212\"onmouseover='alert(1)')\n\n to \"URL View\" field\n\u0627\u0644\u0627\u0633\u063a\u0644\u0627\u0644 :\n\u0627\u0635\u0646\u0639 \u0634\u0631\u064a\u0637 \u062a\u0645\u0631\u064a\u0631 \u062c\u062f\u064a\u062f \u0648\u0627\u062f\u062e\u0644 \u0647\u0630\u0627 \u0627\u0644\u0628\u0627\u0644\u0648\u062f :\n\n (1212\"onmouseover='alert(1)')\n\n \u0627\u0644\u0649 \u062d\u0642\u0644 \"URL View\"", "creation_timestamp": "2024-05-23T09:33:34.000000Z"}</description>
      <content:encoded>{"uuid": "ddea76f5-fc62-4b50-891c-0ba3e7807695", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4372", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/130", "content": "CVE ID : CVE-2024-4372\nSystem : wordpress &amp;lt; 2.2.11\nType : XSS\n\nExploit :\nCreate a new slider and inset:\n\n (1212\"onmouseover='alert(1)')\n\n to \"URL View\" field\n\u0627\u0644\u0627\u0633\u063a\u0644\u0627\u0644 :\n\u0627\u0635\u0646\u0639 \u0634\u0631\u064a\u0637 \u062a\u0645\u0631\u064a\u0631 \u062c\u062f\u064a\u062f \u0648\u0627\u062f\u062e\u0644 \u0647\u0630\u0627 \u0627\u0644\u0628\u0627\u0644\u0648\u062f :\n\n (1212\"onmouseover='alert(1)')\n\n \u0627\u0644\u0649 \u062d\u0642\u0644 \"URL View\"", "creation_timestamp": "2024-05-23T09:33:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ddea76f5-fc62-4b50-891c-0ba3e7807695/export</guid>
      <pubDate>Thu, 23 May 2024 09:33:34 +0000</pubDate>
    </item>
    <item>
      <title>0a0a7481-1e04-4d29-a181-96aedddbbfbd</title>
      <link>https://vulnerability.circl.lu/sighting/0a0a7481-1e04-4d29-a181-96aedddbbfbd/export</link>
      <description>{"uuid": "0a0a7481-1e04-4d29-a181-96aedddbbfbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4372", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9203", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4372\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Carousel Slider WordPress plugin before 2.2.11 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks\n\ud83d\udccf Published: 2024-05-21T06:00:02.612Z\n\ud83d\udccf Modified: 2025-03-27T20:10:24.328Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/", "creation_timestamp": "2025-03-27T20:27:21.000000Z"}</description>
      <content:encoded>{"uuid": "0a0a7481-1e04-4d29-a181-96aedddbbfbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4372", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9203", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4372\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Carousel Slider WordPress plugin before 2.2.11 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks\n\ud83d\udccf Published: 2024-05-21T06:00:02.612Z\n\ud83d\udccf Modified: 2025-03-27T20:10:24.328Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/", "creation_timestamp": "2025-03-27T20:27:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0a0a7481-1e04-4d29-a181-96aedddbbfbd/export</guid>
      <pubDate>Thu, 27 Mar 2025 20:27:21 +0000</pubDate>
    </item>
    <item>
      <title>3d3db693-f43c-42fb-8a00-0ba7b8b23657</title>
      <link>https://vulnerability.circl.lu/sighting/3d3db693-f43c-42fb-8a00-0ba7b8b23657/export</link>
      <description>{"uuid": "3d3db693-f43c-42fb-8a00-0ba7b8b23657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43724", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</description>
      <content:encoded>{"uuid": "3d3db693-f43c-42fb-8a00-0ba7b8b23657", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43724", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3d3db693-f43c-42fb-8a00-0ba7b8b23657/export</guid>
      <pubDate>Tue, 16 Sep 2025 23:16:38 +0000</pubDate>
    </item>
    <item>
      <title>1d0dbd0a-e876-415f-813e-fce2858151c7</title>
      <link>https://vulnerability.circl.lu/sighting/1d0dbd0a-e876-415f-813e-fce2858151c7/export</link>
      <description>{"uuid": "1d0dbd0a-e876-415f-813e-fce2858151c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43723", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</description>
      <content:encoded>{"uuid": "1d0dbd0a-e876-415f-813e-fce2858151c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43723", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1d0dbd0a-e876-415f-813e-fce2858151c7/export</guid>
      <pubDate>Tue, 16 Sep 2025 23:16:38 +0000</pubDate>
    </item>
    <item>
      <title>7e6edcd0-8b0e-4e0b-afc9-d4951b83d4b6</title>
      <link>https://vulnerability.circl.lu/sighting/7e6edcd0-8b0e-4e0b-afc9-d4951b83d4b6/export</link>
      <description>{"uuid": "7e6edcd0-8b0e-4e0b-afc9-d4951b83d4b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43721", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</description>
      <content:encoded>{"uuid": "7e6edcd0-8b0e-4e0b-afc9-d4951b83d4b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43721", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7e6edcd0-8b0e-4e0b-afc9-d4951b83d4b6/export</guid>
      <pubDate>Tue, 16 Sep 2025 23:16:38 +0000</pubDate>
    </item>
    <item>
      <title>41136f34-4891-4df1-8b16-92e52c845500</title>
      <link>https://vulnerability.circl.lu/sighting/41136f34-4891-4df1-8b16-92e52c845500/export</link>
      <description>{"uuid": "41136f34-4891-4df1-8b16-92e52c845500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43722", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</description>
      <content:encoded>{"uuid": "41136f34-4891-4df1-8b16-92e52c845500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43722", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/41136f34-4891-4df1-8b16-92e52c845500/export</guid>
      <pubDate>Tue, 16 Sep 2025 23:16:38 +0000</pubDate>
    </item>
    <item>
      <title>27b6f3e3-d9dc-4018-914e-a6f5ad9384db</title>
      <link>https://vulnerability.circl.lu/sighting/27b6f3e3-d9dc-4018-914e-a6f5ad9384db/export</link>
      <description>{"uuid": "27b6f3e3-d9dc-4018-914e-a6f5ad9384db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43721", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:32.000000Z"}</description>
      <content:encoded>{"uuid": "27b6f3e3-d9dc-4018-914e-a6f5ad9384db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43721", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/27b6f3e3-d9dc-4018-914e-a6f5ad9384db/export</guid>
      <pubDate>Thu, 18 Sep 2025 16:44:32 +0000</pubDate>
    </item>
    <item>
      <title>f09ed43a-e6c5-4a70-9641-ed92c645d6db</title>
      <link>https://vulnerability.circl.lu/sighting/f09ed43a-e6c5-4a70-9641-ed92c645d6db/export</link>
      <description>{"uuid": "f09ed43a-e6c5-4a70-9641-ed92c645d6db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43722", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:32.000000Z"}</description>
      <content:encoded>{"uuid": "f09ed43a-e6c5-4a70-9641-ed92c645d6db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43722", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f09ed43a-e6c5-4a70-9641-ed92c645d6db/export</guid>
      <pubDate>Thu, 18 Sep 2025 16:44:32 +0000</pubDate>
    </item>
    <item>
      <title>a6524a8f-92c2-416f-8356-bc70c1b5eabc</title>
      <link>https://vulnerability.circl.lu/sighting/a6524a8f-92c2-416f-8356-bc70c1b5eabc/export</link>
      <description>{"uuid": "a6524a8f-92c2-416f-8356-bc70c1b5eabc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43724", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:33.000000Z"}</description>
      <content:encoded>{"uuid": "a6524a8f-92c2-416f-8356-bc70c1b5eabc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43724", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a6524a8f-92c2-416f-8356-bc70c1b5eabc/export</guid>
      <pubDate>Thu, 18 Sep 2025 16:44:33 +0000</pubDate>
    </item>
    <item>
      <title>a0272e65-cc38-4edb-974a-d50496429501</title>
      <link>https://vulnerability.circl.lu/sighting/a0272e65-cc38-4edb-974a-d50496429501/export</link>
      <description>{"uuid": "a0272e65-cc38-4edb-974a-d50496429501", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43723", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:33.000000Z"}</description>
      <content:encoded>{"uuid": "a0272e65-cc38-4edb-974a-d50496429501", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43723", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a0272e65-cc38-4edb-974a-d50496429501/export</guid>
      <pubDate>Thu, 18 Sep 2025 16:44:33 +0000</pubDate>
    </item>
  </channel>
</rss>
