<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 11:12:56 +0000</lastBuildDate>
    <item>
      <title>7ce594d7-b8ef-4699-a5b7-ef98b74904fa</title>
      <link>https://vulnerability.circl.lu/sighting/7ce594d7-b8ef-4699-a5b7-ef98b74904fa/export</link>
      <description>{"uuid": "7ce594d7-b8ef-4699-a5b7-ef98b74904fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39699", "type": "seen", "source": "https://t.me/cvedetector/190", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39699 - Directus is a real-time API and App dashboard for\", \n  \"Content\": \"CVE ID : CVE-2024-39699 \nPublished : July 8, 2024, 4:15 p.m. | 23\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. There was already a reported SSRF vulnerability via file import. It was fixed by resolving all DNS names and checking if the requested IP is an internal IP address. However it is possible to bypass this security measure and execute a SSRF using redirects. Directus allows redirects when importing file from the URL and does not check the result URL. Thus, it is possible to execute a request to an internal IP, for example to 127.0.0.1. However, it is blind SSRF, because Directus also uses response interception technique to get the information about the connect from the socket directly and it does not show a response if the IP address is internal. This vulnerability is fixed in 10.9.3. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T18:40:33.000000Z"}</description>
      <content:encoded>{"uuid": "7ce594d7-b8ef-4699-a5b7-ef98b74904fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39699", "type": "seen", "source": "https://t.me/cvedetector/190", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39699 - Directus is a real-time API and App dashboard for\", \n  \"Content\": \"CVE ID : CVE-2024-39699 \nPublished : July 8, 2024, 4:15 p.m. | 23\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. There was already a reported SSRF vulnerability via file import. It was fixed by resolving all DNS names and checking if the requested IP is an internal IP address. However it is possible to bypass this security measure and execute a SSRF using redirects. Directus allows redirects when importing file from the URL and does not check the result URL. Thus, it is possible to execute a request to an internal IP, for example to 127.0.0.1. However, it is blind SSRF, because Directus also uses response interception technique to get the information about the connect from the socket directly and it does not show a response if the IP address is internal. This vulnerability is fixed in 10.9.3. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T18:40:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7ce594d7-b8ef-4699-a5b7-ef98b74904fa/export</guid>
      <pubDate>Mon, 08 Jul 2024 18:40:33 +0000</pubDate>
    </item>
  </channel>
</rss>
