<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 19:01:17 +0000</lastBuildDate>
    <item>
      <title>cb1f5eaf-3df1-4fc5-a8d0-f4179dbf9bc8</title>
      <link>https://vulnerability.circl.lu/sighting/cb1f5eaf-3df1-4fc5-a8d0-f4179dbf9bc8/export</link>
      <description>{"uuid": "cb1f5eaf-3df1-4fc5-a8d0-f4179dbf9bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40541", "type": "seen", "source": "https://t.me/cvedetector/766", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40541 - my-springsecurity-plus before v2024.07.03 was disc\", \n  \"Content\": \"CVE ID : CVE-2024-40541 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept/build. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:49.000000Z"}</description>
      <content:encoded>{"uuid": "cb1f5eaf-3df1-4fc5-a8d0-f4179dbf9bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40541", "type": "seen", "source": "https://t.me/cvedetector/766", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40541 - my-springsecurity-plus before v2024.07.03 was disc\", \n  \"Content\": \"CVE ID : CVE-2024-40541 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept/build. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cb1f5eaf-3df1-4fc5-a8d0-f4179dbf9bc8/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:26:49 +0000</pubDate>
    </item>
    <item>
      <title>a1e5c4a1-1a82-4294-bd1c-a17615e73d5e</title>
      <link>https://vulnerability.circl.lu/sighting/a1e5c4a1-1a82-4294-bd1c-a17615e73d5e/export</link>
      <description>{"uuid": "a1e5c4a1-1a82-4294-bd1c-a17615e73d5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40543", "type": "seen", "source": "https://t.me/cvedetector/768", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40543 - PublicCMS v4.0.202302.e was discovered to contain\", \n  \"Content\": \"CVE ID : CVE-2024-40543 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/ueditor?action=catchimage. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:50.000000Z"}</description>
      <content:encoded>{"uuid": "a1e5c4a1-1a82-4294-bd1c-a17615e73d5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40543", "type": "seen", "source": "https://t.me/cvedetector/768", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40543 - PublicCMS v4.0.202302.e was discovered to contain\", \n  \"Content\": \"CVE ID : CVE-2024-40543 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/ueditor?action=catchimage. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a1e5c4a1-1a82-4294-bd1c-a17615e73d5e/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:26:50 +0000</pubDate>
    </item>
    <item>
      <title>47e74a6f-7b1b-4e2a-acf8-6923cf132ba2</title>
      <link>https://vulnerability.circl.lu/sighting/47e74a6f-7b1b-4e2a-acf8-6923cf132ba2/export</link>
      <description>{"uuid": "47e74a6f-7b1b-4e2a-acf8-6923cf132ba2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40549", "type": "seen", "source": "https://t.me/cvedetector/769", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40549 - An arbitrary file upload vulnerability in the comp\", \n  \"Content\": \"CVE ID : CVE-2024-40549 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the component /admin/cmsTemplate/savePlace of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:54.000000Z"}</description>
      <content:encoded>{"uuid": "47e74a6f-7b1b-4e2a-acf8-6923cf132ba2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40549", "type": "seen", "source": "https://t.me/cvedetector/769", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40549 - An arbitrary file upload vulnerability in the comp\", \n  \"Content\": \"CVE ID : CVE-2024-40549 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the component /admin/cmsTemplate/savePlace of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/47e74a6f-7b1b-4e2a-acf8-6923cf132ba2/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:26:54 +0000</pubDate>
    </item>
    <item>
      <title>b4ba9fd9-c166-4c28-8b92-5c91ec73f20d</title>
      <link>https://vulnerability.circl.lu/sighting/b4ba9fd9-c166-4c28-8b92-5c91ec73f20d/export</link>
      <description>{"uuid": "b4ba9fd9-c166-4c28-8b92-5c91ec73f20d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40548", "type": "seen", "source": "https://t.me/cvedetector/771", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40548 - An arbitrary file upload vulnerability in the comp\", \n  \"Content\": \"CVE ID : CVE-2024-40548 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the component /admin/cmsTemplate/save of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:56.000000Z"}</description>
      <content:encoded>{"uuid": "b4ba9fd9-c166-4c28-8b92-5c91ec73f20d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40548", "type": "seen", "source": "https://t.me/cvedetector/771", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40548 - An arbitrary file upload vulnerability in the comp\", \n  \"Content\": \"CVE ID : CVE-2024-40548 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the component /admin/cmsTemplate/save of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b4ba9fd9-c166-4c28-8b92-5c91ec73f20d/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:26:56 +0000</pubDate>
    </item>
    <item>
      <title>c64bbced-36cf-455d-bf22-1a4c2a0c29a0</title>
      <link>https://vulnerability.circl.lu/sighting/c64bbced-36cf-455d-bf22-1a4c2a0c29a0/export</link>
      <description>{"uuid": "c64bbced-36cf-455d-bf22-1a4c2a0c29a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40544", "type": "seen", "source": "https://t.me/cvedetector/772", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40544 - PublicCMS v4.0.202302.e was discovered to contain\", \n  \"Content\": \"CVE ID : CVE-2024-40544 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/#maintenance_sysTask/edit. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:57.000000Z"}</description>
      <content:encoded>{"uuid": "c64bbced-36cf-455d-bf22-1a4c2a0c29a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40544", "type": "seen", "source": "https://t.me/cvedetector/772", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40544 - PublicCMS v4.0.202302.e was discovered to contain\", \n  \"Content\": \"CVE ID : CVE-2024-40544 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/#maintenance_sysTask/edit. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c64bbced-36cf-455d-bf22-1a4c2a0c29a0/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:26:57 +0000</pubDate>
    </item>
    <item>
      <title>f5bdbf01-096c-4c07-b4bb-d5cc065d5808</title>
      <link>https://vulnerability.circl.lu/sighting/f5bdbf01-096c-4c07-b4bb-d5cc065d5808/export</link>
      <description>{"uuid": "f5bdbf01-096c-4c07-b4bb-d5cc065d5808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40547", "type": "seen", "source": "https://t.me/cvedetector/773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40547 - PublicCMS v4.0.202302.e was discovered to contain\", \n  \"Content\": \"CVE ID : CVE-2024-40547 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : PublicCMS v4.0.202302.e was discovered to contain an arbitrary file content replacement vulnerability via the component /admin/cmsTemplate/replace. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:58.000000Z"}</description>
      <content:encoded>{"uuid": "f5bdbf01-096c-4c07-b4bb-d5cc065d5808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40547", "type": "seen", "source": "https://t.me/cvedetector/773", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40547 - PublicCMS v4.0.202302.e was discovered to contain\", \n  \"Content\": \"CVE ID : CVE-2024-40547 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : PublicCMS v4.0.202302.e was discovered to contain an arbitrary file content replacement vulnerability via the component /admin/cmsTemplate/replace. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:26:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f5bdbf01-096c-4c07-b4bb-d5cc065d5808/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:26:58 +0000</pubDate>
    </item>
    <item>
      <title>c45110b0-add7-4dda-afd8-be8de1851bb9</title>
      <link>https://vulnerability.circl.lu/sighting/c45110b0-add7-4dda-afd8-be8de1851bb9/export</link>
      <description>{"uuid": "c45110b0-add7-4dda-afd8-be8de1851bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40542", "type": "seen", "source": "https://t.me/cvedetector/774", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40542 - my-springsecurity-plus before v2024.07.03 was disc\", \n  \"Content\": \"CVE ID : CVE-2024-40542 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/role?offset. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:02.000000Z"}</description>
      <content:encoded>{"uuid": "c45110b0-add7-4dda-afd8-be8de1851bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40542", "type": "seen", "source": "https://t.me/cvedetector/774", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40542 - my-springsecurity-plus before v2024.07.03 was disc\", \n  \"Content\": \"CVE ID : CVE-2024-40542 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/role?offset. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c45110b0-add7-4dda-afd8-be8de1851bb9/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:27:02 +0000</pubDate>
    </item>
    <item>
      <title>5078a719-b977-497f-9ec4-e673f7b5e71a</title>
      <link>https://vulnerability.circl.lu/sighting/5078a719-b977-497f-9ec4-e673f7b5e71a/export</link>
      <description>{"uuid": "5078a719-b977-497f-9ec4-e673f7b5e71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40546", "type": "seen", "source": "https://t.me/cvedetector/775", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40546 - An arbitrary file upload vulnerability in the comp\", \n  \"Content\": \"CVE ID : CVE-2024-40546 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the component /admin/cmsWebFile/save of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:03.000000Z"}</description>
      <content:encoded>{"uuid": "5078a719-b977-497f-9ec4-e673f7b5e71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40546", "type": "seen", "source": "https://t.me/cvedetector/775", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40546 - An arbitrary file upload vulnerability in the comp\", \n  \"Content\": \"CVE ID : CVE-2024-40546 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the component /admin/cmsWebFile/save of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5078a719-b977-497f-9ec4-e673f7b5e71a/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:27:03 +0000</pubDate>
    </item>
    <item>
      <title>df54bc7d-aac3-475d-9261-54458a5af8d9</title>
      <link>https://vulnerability.circl.lu/sighting/df54bc7d-aac3-475d-9261-54458a5af8d9/export</link>
      <description>{"uuid": "df54bc7d-aac3-475d-9261-54458a5af8d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40545", "type": "seen", "source": "https://t.me/cvedetector/777", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40545 - An arbitrary file upload vulnerability in the comp\", \n  \"Content\": \"CVE ID : CVE-2024-40545 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the component /admin/cmsWebFile/doUpload of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:05.000000Z"}</description>
      <content:encoded>{"uuid": "df54bc7d-aac3-475d-9261-54458a5af8d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40545", "type": "seen", "source": "https://t.me/cvedetector/777", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40545 - An arbitrary file upload vulnerability in the comp\", \n  \"Content\": \"CVE ID : CVE-2024-40545 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the component /admin/cmsWebFile/doUpload of PublicCMS v4.0.202302.e allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/df54bc7d-aac3-475d-9261-54458a5af8d9/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:27:05 +0000</pubDate>
    </item>
    <item>
      <title>2aa8e2d8-0a94-4314-88e8-cf83fcc640c2</title>
      <link>https://vulnerability.circl.lu/sighting/2aa8e2d8-0a94-4314-88e8-cf83fcc640c2/export</link>
      <description>{"uuid": "2aa8e2d8-0a94-4314-88e8-cf83fcc640c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40540", "type": "seen", "source": "https://t.me/cvedetector/779", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40540 - my-springsecurity-plus before v2024.07.03 was disc\", \n  \"Content\": \"CVE ID : CVE-2024-40540 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:10.000000Z"}</description>
      <content:encoded>{"uuid": "2aa8e2d8-0a94-4314-88e8-cf83fcc640c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40540", "type": "seen", "source": "https://t.me/cvedetector/779", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40540 - my-springsecurity-plus before v2024.07.03 was disc\", \n  \"Content\": \"CVE ID : CVE-2024-40540 \nPublished : July 12, 2024, 4:15 p.m. | 43\u00a0minutes ago \nDescription : my-springsecurity-plus before v2024.07.03 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /api/dept. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T19:27:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2aa8e2d8-0a94-4314-88e8-cf83fcc640c2/export</guid>
      <pubDate>Fri, 12 Jul 2024 19:27:10 +0000</pubDate>
    </item>
  </channel>
</rss>
