<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 17:35:12 +0000</lastBuildDate>
    <item>
      <title>d8b79a1a-71db-44fd-9b78-49a267519f87</title>
      <link>https://vulnerability.circl.lu/sighting/d8b79a1a-71db-44fd-9b78-49a267519f87/export</link>
      <description>{"uuid": "d8b79a1a-71db-44fd-9b78-49a267519f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49593", "type": "seen", "source": "https://t.me/cvedetector/8145", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49593 - \"Advanced Custom Fields Stored Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-49593 \nPublished : Oct. 17, 2024, 4:15 a.m. | 46\u00a0minutes ago \nDescription : In Advanced Custom Fields (ACF) before 6.3.9 and Secure Custom Fields before 6.3.6.3 (plugins for WordPress), using the Field Group editor to edit one of the plugin's fields can result in execution of a stored XSS payload. NOTE: if you wish to use the WP Engine alternative update mechanism for the free version of ACF, then you can follow the process shown at the advancedcustomfields.com blog URL within the References section below. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T07:26:42.000000Z"}</description>
      <content:encoded>{"uuid": "d8b79a1a-71db-44fd-9b78-49a267519f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49593", "type": "seen", "source": "https://t.me/cvedetector/8145", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49593 - \"Advanced Custom Fields Stored Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-49593 \nPublished : Oct. 17, 2024, 4:15 a.m. | 46\u00a0minutes ago \nDescription : In Advanced Custom Fields (ACF) before 6.3.9 and Secure Custom Fields before 6.3.6.3 (plugins for WordPress), using the Field Group editor to edit one of the plugin's fields can result in execution of a stored XSS payload. NOTE: if you wish to use the WP Engine alternative update mechanism for the free version of ACF, then you can follow the process shown at the advancedcustomfields.com blog URL within the References section below. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T07:26:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d8b79a1a-71db-44fd-9b78-49a267519f87/export</guid>
      <pubDate>Thu, 17 Oct 2024 07:26:42 +0000</pubDate>
    </item>
  </channel>
</rss>
