<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 18:14:11 +0000</lastBuildDate>
    <item>
      <title>c4c8be71-83ef-4b84-a8c7-282e5f364cdd</title>
      <link>https://vulnerability.circl.lu/sighting/c4c8be71-83ef-4b84-a8c7-282e5f364cdd/export</link>
      <description>{"uuid": "c4c8be71-83ef-4b84-a8c7-282e5f364cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7129", "type": "seen", "source": "https://t.me/cvedetector/5539", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7129 - \"Simply Schedule Appointments WordPress Plugin Twig Template Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-7129 \nPublished : Sept. 13, 2024, 6:15 a.m. | 29\u00a0minutes ago \nDescription : The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin WordPress plugin before 1.6.7.43 does not escape template syntax provided via user input, leading to Twig Template Injection which further exploited can result to remote code Execution by high privilege such as admins \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T08:45:33.000000Z"}</description>
      <content:encoded>{"uuid": "c4c8be71-83ef-4b84-a8c7-282e5f364cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7129", "type": "seen", "source": "https://t.me/cvedetector/5539", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7129 - \"Simply Schedule Appointments WordPress Plugin Twig Template Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-7129 \nPublished : Sept. 13, 2024, 6:15 a.m. | 29\u00a0minutes ago \nDescription : The Appointment Booking Calendar \u2014 Simply Schedule Appointments Booking Plugin WordPress plugin before 1.6.7.43 does not escape template syntax provided via user input, leading to Twig Template Injection which further exploited can result to remote code Execution by high privilege such as admins \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T08:45:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c4c8be71-83ef-4b84-a8c7-282e5f364cdd/export</guid>
      <pubDate>Fri, 13 Sep 2024 08:45:33 +0000</pubDate>
    </item>
  </channel>
</rss>
