<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 06:10:16 +0000</lastBuildDate>
    <item>
      <title>5470ba95-a381-46e9-bbdd-1a0e4e5334a9</title>
      <link>https://vulnerability.circl.lu/sighting/5470ba95-a381-46e9-bbdd-1a0e4e5334a9/export</link>
      <description>{"uuid": "5470ba95-a381-46e9-bbdd-1a0e4e5334a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43399", "type": "seen", "source": "https://t.me/cvedetector/3516", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43399 - \"MobSF Unvalidated .a Extension File Extraction\"\", \n  \"Content\": \"CVE ID : CVE-2024-43399 \nPublished : Aug. 19, 2024, 3:15 p.m. | 26\u00a0minutes ago \nDescription : Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T17:41:43.000000Z"}</description>
      <content:encoded>{"uuid": "5470ba95-a381-46e9-bbdd-1a0e4e5334a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43399", "type": "seen", "source": "https://t.me/cvedetector/3516", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43399 - \"MobSF Unvalidated .a Extension File Extraction\"\", \n  \"Content\": \"CVE ID : CVE-2024-43399 \nPublished : Aug. 19, 2024, 3:15 p.m. | 26\u00a0minutes ago \nDescription : Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T17:41:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5470ba95-a381-46e9-bbdd-1a0e4e5334a9/export</guid>
      <pubDate>Mon, 19 Aug 2024 17:41:43 +0000</pubDate>
    </item>
    <item>
      <title>11933c95-23d4-49e3-a5ae-7b2ce5678731</title>
      <link>https://vulnerability.circl.lu/sighting/11933c95-23d4-49e3-a5ae-7b2ce5678731/export</link>
      <description>{"uuid": "11933c95-23d4-49e3-a5ae-7b2ce5678731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43399", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/11348", "content": "\u200aCVE-2024-43399: Critical Zip Slip Vulnerability Discovered in Mobile Security Framework (MobSF)\n\nhttps://securityonline.info/cve-2024-43399-critical-zip-slip-vulnerability-discovered-in-mobile-security-framework-mobsf/", "creation_timestamp": "2024-08-26T16:57:49.000000Z"}</description>
      <content:encoded>{"uuid": "11933c95-23d4-49e3-a5ae-7b2ce5678731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43399", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/11348", "content": "\u200aCVE-2024-43399: Critical Zip Slip Vulnerability Discovered in Mobile Security Framework (MobSF)\n\nhttps://securityonline.info/cve-2024-43399-critical-zip-slip-vulnerability-discovered-in-mobile-security-framework-mobsf/", "creation_timestamp": "2024-08-26T16:57:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/11933c95-23d4-49e3-a5ae-7b2ce5678731/export</guid>
      <pubDate>Mon, 26 Aug 2024 16:57:49 +0000</pubDate>
    </item>
    <item>
      <title>28909243-69d2-4e03-b55f-974a3dd3111a</title>
      <link>https://vulnerability.circl.lu/sighting/28909243-69d2-4e03-b55f-974a3dd3111a/export</link>
      <description>{"uuid": "28909243-69d2-4e03-b55f-974a3dd3111a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43399", "type": "seen", "source": "https://t.me/androidMalware/2321", "content": "Critical Zip Slip Vulnerability Discovered in Mobile Security Framework (MobSF) could allow malicious actors to execute code remotely on servers running MobSF (CVE-2024-43399)\nhttps://securityonline.info/cve-2024-43399-critical-zip-slip-vulnerability-discovered-in-mobile-security-framework-mobsf", "creation_timestamp": "2025-03-25T15:55:29.000000Z"}</description>
      <content:encoded>{"uuid": "28909243-69d2-4e03-b55f-974a3dd3111a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43399", "type": "seen", "source": "https://t.me/androidMalware/2321", "content": "Critical Zip Slip Vulnerability Discovered in Mobile Security Framework (MobSF) could allow malicious actors to execute code remotely on servers running MobSF (CVE-2024-43399)\nhttps://securityonline.info/cve-2024-43399-critical-zip-slip-vulnerability-discovered-in-mobile-security-framework-mobsf", "creation_timestamp": "2025-03-25T15:55:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/28909243-69d2-4e03-b55f-974a3dd3111a/export</guid>
      <pubDate>Tue, 25 Mar 2025 15:55:29 +0000</pubDate>
    </item>
  </channel>
</rss>
