<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 11:15:26 +0000</lastBuildDate>
    <item>
      <title>4af094ad-be8c-46ad-9384-03b9f66184a0</title>
      <link>https://vulnerability.circl.lu/sighting/4af094ad-be8c-46ad-9384-03b9f66184a0/export</link>
      <description>{"uuid": "4af094ad-be8c-46ad-9384-03b9f66184a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45259", "type": "seen", "source": "https://t.me/cvedetector/8846", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45259 - GL-iNet HTTP Request Filenames Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45259 \nPublished : Oct. 24, 2024, 8:15 p.m. | 15\u00a0minutes ago \nDescription : An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T22:41:04.000000Z"}</description>
      <content:encoded>{"uuid": "4af094ad-be8c-46ad-9384-03b9f66184a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45259", "type": "seen", "source": "https://t.me/cvedetector/8846", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45259 - GL-iNet HTTP Request Filenames Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45259 \nPublished : Oct. 24, 2024, 8:15 p.m. | 15\u00a0minutes ago \nDescription : An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T22:41:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4af094ad-be8c-46ad-9384-03b9f66184a0/export</guid>
      <pubDate>Thu, 24 Oct 2024 22:41:04 +0000</pubDate>
    </item>
  </channel>
</rss>
