<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T06:10:17.182702+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5470ba95-a381-46e9-bbdd-1a0e4e5334a9/export</id>
    <title>5470ba95-a381-46e9-bbdd-1a0e4e5334a9</title>
    <updated>2026-05-10T06:10:17.554048+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5470ba95-a381-46e9-bbdd-1a0e4e5334a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43399", "type": "seen", "source": "https://t.me/cvedetector/3516", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43399 - \"MobSF Unvalidated .a Extension File Extraction\"\", \n  \"Content\": \"CVE ID : CVE-2024-43399 \nPublished : Aug. 19, 2024, 3:15 p.m. | 26\u00a0minutes ago \nDescription : Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T17:41:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5470ba95-a381-46e9-bbdd-1a0e4e5334a9/export"/>
    <published>2024-08-19T17:41:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/11933c95-23d4-49e3-a5ae-7b2ce5678731/export</id>
    <title>11933c95-23d4-49e3-a5ae-7b2ce5678731</title>
    <updated>2026-05-10T06:10:17.553869+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "11933c95-23d4-49e3-a5ae-7b2ce5678731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43399", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/11348", "content": "\u200aCVE-2024-43399: Critical Zip Slip Vulnerability Discovered in Mobile Security Framework (MobSF)\n\nhttps://securityonline.info/cve-2024-43399-critical-zip-slip-vulnerability-discovered-in-mobile-security-framework-mobsf/", "creation_timestamp": "2024-08-26T16:57:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/11933c95-23d4-49e3-a5ae-7b2ce5678731/export"/>
    <published>2024-08-26T16:57:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/28909243-69d2-4e03-b55f-974a3dd3111a/export</id>
    <title>28909243-69d2-4e03-b55f-974a3dd3111a</title>
    <updated>2026-05-10T06:10:17.551548+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "28909243-69d2-4e03-b55f-974a3dd3111a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43399", "type": "seen", "source": "https://t.me/androidMalware/2321", "content": "Critical Zip Slip Vulnerability Discovered in Mobile Security Framework (MobSF) could allow malicious actors to execute code remotely on servers running MobSF (CVE-2024-43399)\nhttps://securityonline.info/cve-2024-43399-critical-zip-slip-vulnerability-discovered-in-mobile-security-framework-mobsf", "creation_timestamp": "2025-03-25T15:55:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/28909243-69d2-4e03-b55f-974a3dd3111a/export"/>
    <published>2025-03-25T15:55:29+00:00</published>
  </entry>
</feed>
