<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 21:35:36 +0000</lastBuildDate>
    <item>
      <title>67c1055a-4546-465d-82ff-bcb08be9b7de</title>
      <link>https://vulnerability.circl.lu/sighting/67c1055a-4546-465d-82ff-bcb08be9b7de/export</link>
      <description>{"uuid": "67c1055a-4546-465d-82ff-bcb08be9b7de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45045", "type": "seen", "source": "https://t.me/cvedetector/4431", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45045 - Collabora Online Mobile JavaScript Endpoint Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45045 \nPublished : Aug. 29, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : Collabora Online is a collaborative online office suite based on LibreOffice technology. In the mobile (Android/iOS) device variants of Collabora Online it was possible to inject JavaScript via url encoded values in links contained in documents. Since the Android JavaScript interface allows access to internal functions, the likelihood that the app could be compromised via this vulnerability is considered high. Non-mobile variants are not affected. Mobile variants should update to the latest version provided by the platform appstore. There are no known workarounds for this vulnerability. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-29T20:24:26.000000Z"}</description>
      <content:encoded>{"uuid": "67c1055a-4546-465d-82ff-bcb08be9b7de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45045", "type": "seen", "source": "https://t.me/cvedetector/4431", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45045 - Collabora Online Mobile JavaScript Endpoint Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45045 \nPublished : Aug. 29, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : Collabora Online is a collaborative online office suite based on LibreOffice technology. In the mobile (Android/iOS) device variants of Collabora Online it was possible to inject JavaScript via url encoded values in links contained in documents. Since the Android JavaScript interface allows access to internal functions, the likelihood that the app could be compromised via this vulnerability is considered high. Non-mobile variants are not affected. Mobile variants should update to the latest version provided by the platform appstore. There are no known workarounds for this vulnerability. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-29T20:24:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/67c1055a-4546-465d-82ff-bcb08be9b7de/export</guid>
      <pubDate>Thu, 29 Aug 2024 20:24:26 +0000</pubDate>
    </item>
  </channel>
</rss>
