<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 08:14:26 +0000</lastBuildDate>
    <item>
      <title>6ae23a61-0753-40bc-9b5c-5e86dc1cd288</title>
      <link>https://vulnerability.circl.lu/sighting/6ae23a61-0753-40bc-9b5c-5e86dc1cd288/export</link>
      <description>{"uuid": "6ae23a61-0753-40bc-9b5c-5e86dc1cd288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9528", "type": "seen", "source": "https://t.me/cvedetector/7041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9528 - Fluent Forms for WordPress Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9528 \nPublished : Oct. 5, 2024, 3:15 a.m. | 37\u00a0minutes ago \nDescription : The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag &amp;amp; Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form label fields in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to edit forms (administrator by default), to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T06:15:09.000000Z"}</description>
      <content:encoded>{"uuid": "6ae23a61-0753-40bc-9b5c-5e86dc1cd288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9528", "type": "seen", "source": "https://t.me/cvedetector/7041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9528 - Fluent Forms for WordPress Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9528 \nPublished : Oct. 5, 2024, 3:15 a.m. | 37\u00a0minutes ago \nDescription : The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag &amp;amp; Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form label fields in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to edit forms (administrator by default), to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-05T06:15:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6ae23a61-0753-40bc-9b5c-5e86dc1cd288/export</guid>
      <pubDate>Sat, 05 Oct 2024 06:15:09 +0000</pubDate>
    </item>
    <item>
      <title>bed4aee4-1675-4907-abb1-e122eacf20bd</title>
      <link>https://vulnerability.circl.lu/sighting/bed4aee4-1675-4907-abb1-e122eacf20bd/export</link>
      <description>{"uuid": "bed4aee4-1675-4907-abb1-e122eacf20bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9528", "type": "seen", "source": "https://t.me/HackerArsenal/524", "content": "\u203c\ufe0f CVE-2024-9528 \u203c\ufe0f\n\nThe Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag  Drop WP Form Builder plugin for WordPress is vulnerable to Stored CrossSite Scripting via form label fields in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to edit forms administrator by default, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"National Vulnerability Database\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity_CVEs", "creation_timestamp": "2024-10-05T11:40:17.000000Z"}</description>
      <content:encoded>{"uuid": "bed4aee4-1675-4907-abb1-e122eacf20bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9528", "type": "seen", "source": "https://t.me/HackerArsenal/524", "content": "\u203c\ufe0f CVE-2024-9528 \u203c\ufe0f\n\nThe Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag  Drop WP Form Builder plugin for WordPress is vulnerable to Stored CrossSite Scripting via form label fields in all versions up to, and including, 5.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with access to edit forms administrator by default, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"National Vulnerability Database\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity_CVEs", "creation_timestamp": "2024-10-05T11:40:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bed4aee4-1675-4907-abb1-e122eacf20bd/export</guid>
      <pubDate>Sat, 05 Oct 2024 11:40:17 +0000</pubDate>
    </item>
  </channel>
</rss>
