<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 22:35:42 +0000</lastBuildDate>
    <item>
      <title>cc02ead0-f293-4f61-bc78-d3aa48831595</title>
      <link>https://vulnerability.circl.lu/sighting/cc02ead0-f293-4f61-bc78-d3aa48831595/export</link>
      <description>{"uuid": "cc02ead0-f293-4f61-bc78-d3aa48831595", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40521", "type": "seen", "source": "https://t.me/cvedetector/764", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40521 - SeaCMS 12.9 has a remote code execution vulnerabil\", \n  \"Content\": \"CVE ID : CVE-2024-40521 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : SeaCMS 12.9 has a remote code execution vulnerability. The vulnerability is due to the fact that although admin_template.php imposes certain restrictions on the edited file, attackers can still bypass the restrictions and write code in some way, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:47.000000Z"}</description>
      <content:encoded>{"uuid": "cc02ead0-f293-4f61-bc78-d3aa48831595", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40521", "type": "seen", "source": "https://t.me/cvedetector/764", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40521 - SeaCMS 12.9 has a remote code execution vulnerabil\", \n  \"Content\": \"CVE ID : CVE-2024-40521 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : SeaCMS 12.9 has a remote code execution vulnerability. The vulnerability is due to the fact that although admin_template.php imposes certain restrictions on the edited file, attackers can still bypass the restrictions and write code in some way, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cc02ead0-f293-4f61-bc78-d3aa48831595/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:26:47 +0000</pubDate>
    </item>
    <item>
      <title>98f29d36-8258-4017-9831-699d1d1faf66</title>
      <link>https://vulnerability.circl.lu/sighting/98f29d36-8258-4017-9831-699d1d1faf66/export</link>
      <description>{"uuid": "98f29d36-8258-4017-9831-699d1d1faf66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40522", "type": "seen", "source": "https://t.me/cvedetector/778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40522 - There is a remote code execution vulnerability in\", \n  \"Content\": \"CVE ID : CVE-2024-40522 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : There is a remote code execution vulnerability in SeaCMS 12.9. The vulnerability is caused by phomebak.php writing some variable names passed in without filtering them before writing them into the php file. An authenticated attacker can exploit this vulnerability to execute arbitrary commands and obtain system permissions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:06.000000Z"}</description>
      <content:encoded>{"uuid": "98f29d36-8258-4017-9831-699d1d1faf66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40522", "type": "seen", "source": "https://t.me/cvedetector/778", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40522 - There is a remote code execution vulnerability in\", \n  \"Content\": \"CVE ID : CVE-2024-40522 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : There is a remote code execution vulnerability in SeaCMS 12.9. The vulnerability is caused by phomebak.php writing some variable names passed in without filtering them before writing them into the php file. An authenticated attacker can exploit this vulnerability to execute arbitrary commands and obtain system permissions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/98f29d36-8258-4017-9831-699d1d1faf66/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:27:06 +0000</pubDate>
    </item>
    <item>
      <title>bf0bbca4-466e-4f94-8ac2-7eb5b5e1bb3d</title>
      <link>https://vulnerability.circl.lu/sighting/bf0bbca4-466e-4f94-8ac2-7eb5b5e1bb3d/export</link>
      <description>{"uuid": "bf0bbca4-466e-4f94-8ac2-7eb5b5e1bb3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40524", "type": "seen", "source": "https://t.me/cvedetector/911", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40524 - Xmind2testcase Directory Traversal Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-40524 \nPublished : July 15, 2024, 11:15 p.m. | 44\u00a0minutes ago \nDescription : Directory Traversal vulnerability in xmind2testcase v.1.5 allows a remote attacker to execute arbitrary code via the webtool\\application.py component. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T02:03:16.000000Z"}</description>
      <content:encoded>{"uuid": "bf0bbca4-466e-4f94-8ac2-7eb5b5e1bb3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40524", "type": "seen", "source": "https://t.me/cvedetector/911", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40524 - Xmind2testcase Directory Traversal Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-40524 \nPublished : July 15, 2024, 11:15 p.m. | 44\u00a0minutes ago \nDescription : Directory Traversal vulnerability in xmind2testcase v.1.5 allows a remote attacker to execute arbitrary code via the webtool\\application.py component. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T02:03:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bf0bbca4-466e-4f94-8ac2-7eb5b5e1bb3d/export</guid>
      <pubDate>Tue, 16 Jul 2024 02:03:16 +0000</pubDate>
    </item>
    <item>
      <title>b551dbe8-83fc-4f62-b5c1-f6a119f31f00</title>
      <link>https://vulnerability.circl.lu/sighting/b551dbe8-83fc-4f62-b5c1-f6a119f31f00/export</link>
      <description>{"uuid": "b551dbe8-83fc-4f62-b5c1-f6a119f31f00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40522", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7556", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40522\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a remote code execution vulnerability in SeaCMS 12.9. The vulnerability is caused by phomebak.php writing some variable names passed in without filtering them before writing them into the php file. An authenticated attacker can exploit this vulnerability to execute arbitrary commands and obtain system permissions.\n\ud83d\udccf Published: 2024-07-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T14:24:47.052Z\n\ud83d\udd17 References:\n1. https://gitee.com/fushuling/cve/blob/master/%20SeaCMS%2012.9%20phomebak.php%20code%20injection.md", "creation_timestamp": "2025-03-14T14:45:11.000000Z"}</description>
      <content:encoded>{"uuid": "b551dbe8-83fc-4f62-b5c1-f6a119f31f00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40522", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7556", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40522\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a remote code execution vulnerability in SeaCMS 12.9. The vulnerability is caused by phomebak.php writing some variable names passed in without filtering them before writing them into the php file. An authenticated attacker can exploit this vulnerability to execute arbitrary commands and obtain system permissions.\n\ud83d\udccf Published: 2024-07-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T14:24:47.052Z\n\ud83d\udd17 References:\n1. https://gitee.com/fushuling/cve/blob/master/%20SeaCMS%2012.9%20phomebak.php%20code%20injection.md", "creation_timestamp": "2025-03-14T14:45:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b551dbe8-83fc-4f62-b5c1-f6a119f31f00/export</guid>
      <pubDate>Fri, 14 Mar 2025 14:45:11 +0000</pubDate>
    </item>
  </channel>
</rss>
