<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:26:49.385572+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a1e92551-fda5-44cb-98a3-04812445c54e/export</id>
    <title>a1e92551-fda5-44cb-98a3-04812445c54e</title>
    <updated>2026-05-06T11:26:49.708210+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a1e92551-fda5-44cb-98a3-04812445c54e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-6949", "type": "seen", "source": "https://t.me/cvedetector/1340", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6949 - Gargaj wuhu Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-6949 \nPublished : July 21, 2024, 10:15 a.m. | 16\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in Gargaj wuhu up to 3faad49bfcc3895e9ff76a591d05c8941273d120. Affected by this vulnerability is an unknown functionality of the file /pages.php?edit=News. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-272071. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-21T12:32:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a1e92551-fda5-44cb-98a3-04812445c54e/export"/>
    <published>2024-07-21T12:32:44+00:00</published>
  </entry>
</feed>
