<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T11:38:12.593378+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/03e446f5-9d63-4040-a80b-226743398775/export</id>
    <title>03e446f5-9d63-4040-a80b-226743398775</title>
    <updated>2026-05-09T11:38:12.964951+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "03e446f5-9d63-4040-a80b-226743398775", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42598", "type": "seen", "source": "https://t.me/cvedetector/3667", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42598 - SeaCMS Arbitrary Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42598 \nPublished : Aug. 20, 2024, 4:15 p.m. | 33\u00a0minutes ago \nDescription : SeaCMS 13.0 has a remote code execution vulnerability. The reason for this vulnerability is that although admin_editplayer.php imposes restrictions on edited files, attackers can still bypass these restrictions and write code, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T18:48:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/03e446f5-9d63-4040-a80b-226743398775/export"/>
    <published>2024-08-20T18:48:51+00:00</published>
  </entry>
</feed>
