<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:25:40 +0000</lastBuildDate>
    <item>
      <title>d783054f-7796-47a4-bfca-3bd9c9ad25bd</title>
      <link>https://vulnerability.circl.lu/sighting/d783054f-7796-47a4-bfca-3bd9c9ad25bd/export</link>
      <description>{"uuid": "d783054f-7796-47a4-bfca-3bd9c9ad25bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50355", "type": "seen", "source": "https://t.me/cvedetector/11105", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50355 - LibreNMS Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-50355 \nPublished : Nov. 15, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources. This vulnerability is fixed in 24.10.0. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T18:17:25.000000Z"}</description>
      <content:encoded>{"uuid": "d783054f-7796-47a4-bfca-3bd9c9ad25bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50355", "type": "seen", "source": "https://t.me/cvedetector/11105", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50355 - LibreNMS Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-50355 \nPublished : Nov. 15, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources. This vulnerability is fixed in 24.10.0. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T18:17:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d783054f-7796-47a4-bfca-3bd9c9ad25bd/export</guid>
      <pubDate>Fri, 15 Nov 2024 18:17:25 +0000</pubDate>
    </item>
  </channel>
</rss>
