<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 13:09:16 +0000</lastBuildDate>
    <item>
      <title>340c6f2d-2dae-4bc6-911c-fdb04803d107</title>
      <link>https://db.gcve.eu/sighting/340c6f2d-2dae-4bc6-911c-fdb04803d107/export</link>
      <description>{"uuid": "340c6f2d-2dae-4bc6-911c-fdb04803d107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48020", "type": "seen", "source": "https://t.me/cvedetector/7727", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48020 - WP Time Capsule SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-48020 \nPublished : Oct. 11, 2024, 7:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Revmakx Backup and Staging by WP Time Capsule allows SQL Injection.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.21. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T22:04:09.000000Z"}</description>
      <content:encoded>{"uuid": "340c6f2d-2dae-4bc6-911c-fdb04803d107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48020", "type": "seen", "source": "https://t.me/cvedetector/7727", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48020 - WP Time Capsule SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-48020 \nPublished : Oct. 11, 2024, 7:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Revmakx Backup and Staging by WP Time Capsule allows SQL Injection.This issue affects Backup and Staging by WP Time Capsule: from n/a through 1.22.21. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T22:04:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/340c6f2d-2dae-4bc6-911c-fdb04803d107/export</guid>
      <pubDate>Fri, 11 Oct 2024 22:04:09 +0000</pubDate>
    </item>
    <item>
      <title>25a5f910-1178-473a-a09b-1bc82ef81113</title>
      <link>https://db.gcve.eu/sighting/25a5f910-1178-473a-a09b-1bc82ef81113/export</link>
      <description>{"uuid": "25a5f910-1178-473a-a09b-1bc82ef81113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48027", "type": "seen", "source": "https://t.me/cvedetector/8081", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48027 - Xaraartech External Bing Image Upload File Type Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48027 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in xaraartech External featured image from bing allows Upload a Web Shell to a Web Server.This issue affects External featured image from bing: from n/a through 1.0.2. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:35.000000Z"}</description>
      <content:encoded>{"uuid": "25a5f910-1178-473a-a09b-1bc82ef81113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48027", "type": "seen", "source": "https://t.me/cvedetector/8081", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48027 - Xaraartech External Bing Image Upload File Type Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48027 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Unrestricted Upload of File with Dangerous Type vulnerability in xaraartech External featured image from bing allows Upload a Web Shell to a Web Server.This issue affects External featured image from bing: from n/a through 1.0.2. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/25a5f910-1178-473a-a09b-1bc82ef81113/export</guid>
      <pubDate>Wed, 16 Oct 2024 17:13:35 +0000</pubDate>
    </item>
    <item>
      <title>97f6aee4-9c2c-46e0-8c04-f05874dff7a1</title>
      <link>https://db.gcve.eu/sighting/97f6aee4-9c2c-46e0-8c04-f05874dff7a1/export</link>
      <description>{"uuid": "97f6aee4-9c2c-46e0-8c04-f05874dff7a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48028", "type": "seen", "source": "https://t.me/cvedetector/8082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48028 - \"Boyan Raichev IP Loc8 Object Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-48028 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Boyan Raichev IP Loc8 allows Object Injection.This issue affects IP Loc8: from n/a through 1.1. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:36.000000Z"}</description>
      <content:encoded>{"uuid": "97f6aee4-9c2c-46e0-8c04-f05874dff7a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48028", "type": "seen", "source": "https://t.me/cvedetector/8082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48028 - \"Boyan Raichev IP Loc8 Object Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-48028 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Boyan Raichev IP Loc8 allows Object Injection.This issue affects IP Loc8: from n/a through 1.1. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/97f6aee4-9c2c-46e0-8c04-f05874dff7a1/export</guid>
      <pubDate>Wed, 16 Oct 2024 17:13:36 +0000</pubDate>
    </item>
    <item>
      <title>7ba3a5e3-f15c-458a-ae89-c39809382091</title>
      <link>https://db.gcve.eu/sighting/7ba3a5e3-f15c-458a-ae89-c39809382091/export</link>
      <description>{"uuid": "7ba3a5e3-f15c-458a-ae89-c39809382091", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48029", "type": "seen", "source": "https://t.me/cvedetector/8083", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48029 - Hung Trang Si SB Random Posts Widget PHP Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48029 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : : Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hung Trang Si SB Random Posts Widget allows PHP Local File Inclusion.This issue affects SB Random Posts Widget: from n/a through 1.0. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:37.000000Z"}</description>
      <content:encoded>{"uuid": "7ba3a5e3-f15c-458a-ae89-c39809382091", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48029", "type": "seen", "source": "https://t.me/cvedetector/8083", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48029 - Hung Trang Si SB Random Posts Widget PHP Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48029 \nPublished : Oct. 16, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : : Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hung Trang Si SB Random Posts Widget allows PHP Local File Inclusion.This issue affects SB Random Posts Widget: from n/a through 1.0. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T17:13:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7ba3a5e3-f15c-458a-ae89-c39809382091/export</guid>
      <pubDate>Wed, 16 Oct 2024 17:13:37 +0000</pubDate>
    </item>
    <item>
      <title>ebe08854-9839-470f-96b3-c09e3f76e86c</title>
      <link>https://db.gcve.eu/sighting/ebe08854-9839-470f-96b3-c09e3f76e86c/export</link>
      <description>{"uuid": "ebe08854-9839-470f-96b3-c09e3f76e86c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48024", "type": "seen", "source": "https://t.me/cvedetector/8166", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48024 - Fahad Mahmood Keep Backup Daily Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48024 \nPublished : Oct. 17, 2024, 12:15 p.m. | 40\u00a0minutes ago \nDescription : : Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Fahad Mahmood Keep Backup Daily allows Retrieve Embedded Sensitive Data.This issue affects Keep Backup Daily: from n/a through 2.0.7. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T14:58:09.000000Z"}</description>
      <content:encoded>{"uuid": "ebe08854-9839-470f-96b3-c09e3f76e86c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48024", "type": "seen", "source": "https://t.me/cvedetector/8166", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48024 - Fahad Mahmood Keep Backup Daily Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48024 \nPublished : Oct. 17, 2024, 12:15 p.m. | 40\u00a0minutes ago \nDescription : : Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Fahad Mahmood Keep Backup Daily allows Retrieve Embedded Sensitive Data.This issue affects Keep Backup Daily: from n/a through 2.0.7. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T14:58:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ebe08854-9839-470f-96b3-c09e3f76e86c/export</guid>
      <pubDate>Thu, 17 Oct 2024 14:58:09 +0000</pubDate>
    </item>
    <item>
      <title>3041eaeb-6786-42be-840a-9c9f0d1bba57</title>
      <link>https://db.gcve.eu/sighting/3041eaeb-6786-42be-840a-9c9f0d1bba57/export</link>
      <description>{"uuid": "3041eaeb-6786-42be-840a-9c9f0d1bba57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48025", "type": "seen", "source": "https://t.me/cvedetector/8174", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48025 - DOGROW.NET Simple Baseball Scoreboard Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-48025 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in DOGROW.NET Simple Baseball Scoreboard allows Stored XSS.This issue affects Simple Baseball Scoreboard: from n/a through 1.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:24.000000Z"}</description>
      <content:encoded>{"uuid": "3041eaeb-6786-42be-840a-9c9f0d1bba57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48025", "type": "seen", "source": "https://t.me/cvedetector/8174", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48025 - DOGROW.NET Simple Baseball Scoreboard Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-48025 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in DOGROW.NET Simple Baseball Scoreboard allows Stored XSS.This issue affects Simple Baseball Scoreboard: from n/a through 1.3. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3041eaeb-6786-42be-840a-9c9f0d1bba57/export</guid>
      <pubDate>Thu, 17 Oct 2024 15:48:24 +0000</pubDate>
    </item>
    <item>
      <title>c683228d-7046-4d1e-8d40-632229c5d744</title>
      <link>https://db.gcve.eu/sighting/c683228d-7046-4d1e-8d40-632229c5d744/export</link>
      <description>{"uuid": "c683228d-7046-4d1e-8d40-632229c5d744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48021", "type": "seen", "source": "https://t.me/cvedetector/8179", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48021 - Contact Form 7 \u2013 PayPal &amp;amp; Stripe Add-on Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-48021 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Scott Paterson Contact Form 7 \u2013 PayPal &amp;amp; Stripe Add-on allows Reflected XSS.This issue affects Contact Form 7 \u2013 PayPal &amp;amp; Stripe Add-on: from n/a through 2.3. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:31.000000Z"}</description>
      <content:encoded>{"uuid": "c683228d-7046-4d1e-8d40-632229c5d744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48021", "type": "seen", "source": "https://t.me/cvedetector/8179", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48021 - Contact Form 7 \u2013 PayPal &amp;amp; Stripe Add-on Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-48021 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Scott Paterson Contact Form 7 \u2013 PayPal &amp;amp; Stripe Add-on allows Reflected XSS.This issue affects Contact Form 7 \u2013 PayPal &amp;amp; Stripe Add-on: from n/a through 2.3. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c683228d-7046-4d1e-8d40-632229c5d744/export</guid>
      <pubDate>Thu, 17 Oct 2024 15:48:31 +0000</pubDate>
    </item>
    <item>
      <title>65594eef-5140-4f36-9677-0aead2379726</title>
      <link>https://db.gcve.eu/sighting/65594eef-5140-4f36-9677-0aead2379726/export</link>
      <description>{"uuid": "65594eef-5140-4f36-9677-0aead2379726", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48022", "type": "seen", "source": "https://t.me/cvedetector/8180", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48022 - Elementor Shortcode XSS\", \n  \"Content\": \"CVE ID : CVE-2024-48022 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SysBasics Shortcode For Elementor Templates allows Stored XSS.This issue affects Shortcode For Elementor Templates: from n/a through 1.0.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:34.000000Z"}</description>
      <content:encoded>{"uuid": "65594eef-5140-4f36-9677-0aead2379726", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48022", "type": "seen", "source": "https://t.me/cvedetector/8180", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48022 - Elementor Shortcode XSS\", \n  \"Content\": \"CVE ID : CVE-2024-48022 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SysBasics Shortcode For Elementor Templates allows Stored XSS.This issue affects Shortcode For Elementor Templates: from n/a through 1.0.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/65594eef-5140-4f36-9677-0aead2379726/export</guid>
      <pubDate>Thu, 17 Oct 2024 15:48:34 +0000</pubDate>
    </item>
    <item>
      <title>bf94edf4-c253-4e92-9c1c-66b9c3cadf89</title>
      <link>https://db.gcve.eu/sighting/bf94edf4-c253-4e92-9c1c-66b9c3cadf89/export</link>
      <description>{"uuid": "bf94edf4-c253-4e92-9c1c-66b9c3cadf89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48023", "type": "seen", "source": "https://t.me/cvedetector/8181", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48023 - RestaurantConnect, Inc Restaurant Reservations Widget Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-48023 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RestaurantConnect, Inc Restaurant Reservations Widget allows Reflected XSS.This issue affects Restaurant Reservations Widget: from n/a through 1.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:35.000000Z"}</description>
      <content:encoded>{"uuid": "bf94edf4-c253-4e92-9c1c-66b9c3cadf89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48023", "type": "seen", "source": "https://t.me/cvedetector/8181", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48023 - RestaurantConnect, Inc Restaurant Reservations Widget Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-48023 \nPublished : Oct. 17, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in RestaurantConnect, Inc Restaurant Reservations Widget allows Reflected XSS.This issue affects Restaurant Reservations Widget: from n/a through 1.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-17T15:48:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bf94edf4-c253-4e92-9c1c-66b9c3cadf89/export</guid>
      <pubDate>Thu, 17 Oct 2024 15:48:35 +0000</pubDate>
    </item>
    <item>
      <title>a1dfea14-551c-4afa-9318-92aa90e78243</title>
      <link>https://db.gcve.eu/sighting/a1dfea14-551c-4afa-9318-92aa90e78243/export</link>
      <description>{"uuid": "a1dfea14-551c-4afa-9318-92aa90e78243", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4802", "type": "seen", "source": "Telegram/JVyQDfB9Es1oTegjIecCF1rKIQlsvsUde_usdaRPJqK8qLr5", "content": "", "creation_timestamp": "2025-02-14T10:03:11.000000Z"}</description>
      <content:encoded>{"uuid": "a1dfea14-551c-4afa-9318-92aa90e78243", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4802", "type": "seen", "source": "Telegram/JVyQDfB9Es1oTegjIecCF1rKIQlsvsUde_usdaRPJqK8qLr5", "content": "", "creation_timestamp": "2025-02-14T10:03:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a1dfea14-551c-4afa-9318-92aa90e78243/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:03:11 +0000</pubDate>
    </item>
  </channel>
</rss>
