{"uuid": "8018773b-7eb0-48cf-b83e-276063d18e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53266", "type": "seen", "source": "https://t.me/cvedetector/17246", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53266 - Discourse Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-53266 \nPublished : Feb. 4, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Discourse is an open source platform for community discussion. In affected versions with some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS. This has been patched in the latest version of Discourse core. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:46.000000Z"}