<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 20:17:19 +0000</lastBuildDate>
    <item>
      <title>b1ae5d69-d0c7-4033-bdb4-4356ad9e25b3</title>
      <link>https://vulnerability.circl.lu/sighting/b1ae5d69-d0c7-4033-bdb4-4356ad9e25b3/export</link>
      <description>{"uuid": "b1ae5d69-d0c7-4033-bdb4-4356ad9e25b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7291", "type": "seen", "source": "https://t.me/cvedetector/2385", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7291 - JetFormBuilder WordPress Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-7291 \nPublished : Aug. 3, 2024, 7:16 a.m. | 37\u00a0minutes ago \nDescription : The JetFormBuilder plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3.4.1. This is due to improper restriction on user meta fields. This makes it possible for authenticated attackers, with administrator-level and above permissions, to register as super-admins on the sites configured as multi-sites. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-03T10:04:47.000000Z"}</description>
      <content:encoded>{"uuid": "b1ae5d69-d0c7-4033-bdb4-4356ad9e25b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7291", "type": "seen", "source": "https://t.me/cvedetector/2385", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7291 - JetFormBuilder WordPress Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-7291 \nPublished : Aug. 3, 2024, 7:16 a.m. | 37\u00a0minutes ago \nDescription : The JetFormBuilder plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3.4.1. This is due to improper restriction on user meta fields. This makes it possible for authenticated attackers, with administrator-level and above permissions, to register as super-admins on the sites configured as multi-sites. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-03T10:04:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b1ae5d69-d0c7-4033-bdb4-4356ad9e25b3/export</guid>
      <pubDate>Sat, 03 Aug 2024 10:04:47 +0000</pubDate>
    </item>
  </channel>
</rss>
