<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 10:37:55 +0000</lastBuildDate>
    <item>
      <title>38d8a8fa-f55a-4c86-a8a0-66901a3072a9</title>
      <link>https://vulnerability.circl.lu/sighting/38d8a8fa-f55a-4c86-a8a0-66901a3072a9/export</link>
      <description>{"uuid": "38d8a8fa-f55a-4c86-a8a0-66901a3072a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52299", "type": "seen", "source": "https://t.me/cvedetector/10841", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52299 - XWiki macro-pdfviewer Authenticated Arbitrary File Read\", \n  \"Content\": \"CVE ID : CVE-2024-52299 \nPublished : Nov. 13, 2024, 4:15 p.m. | 39\u00a0minutes ago \nDescription : macro-pdfviewer is a PDF Viewer Macro for XWiki using Mozilla pdf.js. Any user with view right on XWiki.PDFViewerService can access any attachment stored in the wiki as the \"key\" that is passed to prevent this is computed incorrectly, calling skip on the digest stream doesn't update the digest. This is fixed in 2.5.6. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T18:04:05.000000Z"}</description>
      <content:encoded>{"uuid": "38d8a8fa-f55a-4c86-a8a0-66901a3072a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52299", "type": "seen", "source": "https://t.me/cvedetector/10841", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52299 - XWiki macro-pdfviewer Authenticated Arbitrary File Read\", \n  \"Content\": \"CVE ID : CVE-2024-52299 \nPublished : Nov. 13, 2024, 4:15 p.m. | 39\u00a0minutes ago \nDescription : macro-pdfviewer is a PDF Viewer Macro for XWiki using Mozilla pdf.js. Any user with view right on XWiki.PDFViewerService can access any attachment stored in the wiki as the \"key\" that is passed to prevent this is computed incorrectly, calling skip on the digest stream doesn't update the digest. This is fixed in 2.5.6. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T18:04:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/38d8a8fa-f55a-4c86-a8a0-66901a3072a9/export</guid>
      <pubDate>Wed, 13 Nov 2024 18:04:05 +0000</pubDate>
    </item>
  </channel>
</rss>
