<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 02:08:32 +0000</lastBuildDate>
    <item>
      <title>ac423da8-3add-43be-abf0-31a0e3e5dc19</title>
      <link>https://vulnerability.circl.lu/sighting/ac423da8-3add-43be-abf0-31a0e3e5dc19/export</link>
      <description>{"uuid": "ac423da8-3add-43be-abf0-31a0e3e5dc19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-51380", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113431751243982953", "content": "", "creation_timestamp": "2024-11-05T18:26:06.014687Z"}</description>
      <content:encoded>{"uuid": "ac423da8-3add-43be-abf0-31a0e3e5dc19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-51380", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113431751243982953", "content": "", "creation_timestamp": "2024-11-05T18:26:06.014687Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ac423da8-3add-43be-abf0-31a0e3e5dc19/export</guid>
      <pubDate>Tue, 05 Nov 2024 18:26:06 +0000</pubDate>
    </item>
    <item>
      <title>c421e6b1-8cd0-4143-9a8d-7a22bf93d08e</title>
      <link>https://vulnerability.circl.lu/sighting/c421e6b1-8cd0-4143-9a8d-7a22bf93d08e/export</link>
      <description>{"uuid": "c421e6b1-8cd0-4143-9a8d-7a22bf93d08e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51380", "type": "seen", "source": "https://t.me/cvedetector/9938", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51380 - JATOS Properties Component Stored Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51380 \nPublished : Nov. 5, 2024, 7:15 p.m. | 42\u00a0minutes ago \nDescription : Stored Cross-Site Scripting (XSS) vulnerability discovered in the Properties Component of JATOS v3.9.3. This flaw allows an attacker to inject malicious JavaScript into the properties section of a study, specifically within the UUID field. When an admin user accesses the study's properties, the injected script is executed in the admin's browser, which could lead to unauthorized actions, including account compromise and privilege escalation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T21:25:40.000000Z"}</description>
      <content:encoded>{"uuid": "c421e6b1-8cd0-4143-9a8d-7a22bf93d08e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51380", "type": "seen", "source": "https://t.me/cvedetector/9938", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51380 - JATOS Properties Component Stored Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51380 \nPublished : Nov. 5, 2024, 7:15 p.m. | 42\u00a0minutes ago \nDescription : Stored Cross-Site Scripting (XSS) vulnerability discovered in the Properties Component of JATOS v3.9.3. This flaw allows an attacker to inject malicious JavaScript into the properties section of a study, specifically within the UUID field. When an admin user accesses the study's properties, the injected script is executed in the admin's browser, which could lead to unauthorized actions, including account compromise and privilege escalation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T21:25:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c421e6b1-8cd0-4143-9a8d-7a22bf93d08e/export</guid>
      <pubDate>Tue, 05 Nov 2024 21:25:40 +0000</pubDate>
    </item>
  </channel>
</rss>
