<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 10:43:10 +0000</lastBuildDate>
    <item>
      <title>c860cd5f-6015-4f0d-ad22-90d84d1d56fb</title>
      <link>https://vulnerability.circl.lu/sighting/c860cd5f-6015-4f0d-ad22-90d84d1d56fb/export</link>
      <description>{"uuid": "c860cd5f-6015-4f0d-ad22-90d84d1d56fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45401", "type": "seen", "source": "https://t.me/cvedetector/4936", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45401 - Stripe-cli Plugin Package Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45401 \nPublished : Sept. 5, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : stripe-cli is a command-line tool for the payment processor Stripe. A vulnerability exists in stripe-cli starting in version 1.11.1 and prior to version 1.21.3 where a plugin package containing a manifest with a malformed plugin shortname installed using the --archive-url or --archive-path flags can overwrite arbitrary files. The update in version 1.21.3 addresses the path traversal vulnerability by removing the ability to install plugins from an archive URL or path. There has been no evidence of exploitation of this vulnerability. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-05T21:23:17.000000Z"}</description>
      <content:encoded>{"uuid": "c860cd5f-6015-4f0d-ad22-90d84d1d56fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45401", "type": "seen", "source": "https://t.me/cvedetector/4936", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45401 - Stripe-cli Plugin Package Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45401 \nPublished : Sept. 5, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : stripe-cli is a command-line tool for the payment processor Stripe. A vulnerability exists in stripe-cli starting in version 1.11.1 and prior to version 1.21.3 where a plugin package containing a manifest with a malformed plugin shortname installed using the --archive-url or --archive-path flags can overwrite arbitrary files. The update in version 1.21.3 addresses the path traversal vulnerability by removing the ability to install plugins from an archive URL or path. There has been no evidence of exploitation of this vulnerability. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-05T21:23:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c860cd5f-6015-4f0d-ad22-90d84d1d56fb/export</guid>
      <pubDate>Thu, 05 Sep 2024 21:23:17 +0000</pubDate>
    </item>
  </channel>
</rss>
