<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 06:26:31 +0000</lastBuildDate>
    <item>
      <title>a4358826-f67f-4bef-932e-45cffaacc59d</title>
      <link>https://db.gcve.eu/sighting/a4358826-f67f-4bef-932e-45cffaacc59d/export</link>
      <description>{"uuid": "a4358826-f67f-4bef-932e-45cffaacc59d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47781", "type": "seen", "source": "https://t.me/cvedetector/7294", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47781 - Miraheze CreateWiki XSS Vulnerability (Cross-Site Scripting)\", \n  \"Content\": \"CVE ID : CVE-2024-47781 \nPublished : Oct. 7, 2024, 10:15 p.m. | 40\u00a0minutes ago \nDescription : CreateWiki is an extension used at Miraheze for requesting &amp;amp; creating wikis. The name of requested wikis is not escaped on Special:RequestWikiQueue, so a user can insert arbitrary HTML that is displayed in the request wiki queue when requesting a wiki. If a wiki creator comes across the XSS payload, their user session can be abused to retrieve deleted wiki requests, which typically contains private information. Likewise, this can also be abused on those with the ability to suppress requests to view sensitive information. This issue has been patched with commit `693a220` and all users are advised to apply the patch. Users unable to upgrade should disable Javascript and/or prevent access to the vulnerable page (Special:RequestWikiQueue). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T01:10:03.000000Z"}</description>
      <content:encoded>{"uuid": "a4358826-f67f-4bef-932e-45cffaacc59d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47781", "type": "seen", "source": "https://t.me/cvedetector/7294", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47781 - Miraheze CreateWiki XSS Vulnerability (Cross-Site Scripting)\", \n  \"Content\": \"CVE ID : CVE-2024-47781 \nPublished : Oct. 7, 2024, 10:15 p.m. | 40\u00a0minutes ago \nDescription : CreateWiki is an extension used at Miraheze for requesting &amp;amp; creating wikis. The name of requested wikis is not escaped on Special:RequestWikiQueue, so a user can insert arbitrary HTML that is displayed in the request wiki queue when requesting a wiki. If a wiki creator comes across the XSS payload, their user session can be abused to retrieve deleted wiki requests, which typically contains private information. Likewise, this can also be abused on those with the ability to suppress requests to view sensitive information. This issue has been patched with commit `693a220` and all users are advised to apply the patch. Users unable to upgrade should disable Javascript and/or prevent access to the vulnerable page (Special:RequestWikiQueue). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T01:10:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a4358826-f67f-4bef-932e-45cffaacc59d/export</guid>
      <pubDate>Tue, 08 Oct 2024 01:10:03 +0000</pubDate>
    </item>
  </channel>
</rss>
