<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:07:09.833211+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b9e0787f-d7d7-4122-8563-6275ded8bab0/export</id>
    <title>b9e0787f-d7d7-4122-8563-6275ded8bab0</title>
    <updated>2026-05-04T10:07:10.219141+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b9e0787f-d7d7-4122-8563-6275ded8bab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7067", "type": "seen", "source": "https://t.me/cvedetector/1560", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7067 - Kirilkirkov Ecommerce-Laravel-Bootstrap Deserialization Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7067 \nPublished : July 24, 2024, 2:15 p.m. | 15\u00a0minutes ago \nDescription : A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is a02111a674ab49f65018b31da3011b1e396f59b1. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-272348. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-24T16:38:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b9e0787f-d7d7-4122-8563-6275ded8bab0/export"/>
    <published>2024-07-24T16:38:48+00:00</published>
  </entry>
</feed>
