<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 11:38:31 +0000</lastBuildDate>
    <item>
      <title>a1fcecc2-0707-46e3-9135-50ef6124582e</title>
      <link>https://vulnerability.circl.lu/sighting/a1fcecc2-0707-46e3-9135-50ef6124582e/export</link>
      <description>{"uuid": "a1fcecc2-0707-46e3-9135-50ef6124582e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42599", "type": "seen", "source": "https://t.me/cvedetector/3953", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42599 - SeaCMS Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42599 \nPublished : Aug. 22, 2024, 8:15 p.m. | 28\u00a0minutes ago \nDescription : SeaCMS 13.0 has a remote code execution vulnerability. The reason for this vulnerability is that although admin_files.php imposes restrictions on edited files, attackers can still bypass these restrictions and write code, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-22T22:43:58.000000Z"}</description>
      <content:encoded>{"uuid": "a1fcecc2-0707-46e3-9135-50ef6124582e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42599", "type": "seen", "source": "https://t.me/cvedetector/3953", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42599 - SeaCMS Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42599 \nPublished : Aug. 22, 2024, 8:15 p.m. | 28\u00a0minutes ago \nDescription : SeaCMS 13.0 has a remote code execution vulnerability. The reason for this vulnerability is that although admin_files.php imposes restrictions on edited files, attackers can still bypass these restrictions and write code, allowing authenticated attackers to exploit the vulnerability to execute arbitrary commands and gain system privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-22T22:43:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a1fcecc2-0707-46e3-9135-50ef6124582e/export</guid>
      <pubDate>Thu, 22 Aug 2024 22:43:58 +0000</pubDate>
    </item>
  </channel>
</rss>
