<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:07:10 +0000</lastBuildDate>
    <item>
      <title>f2917d14-fc1e-4ab1-abc4-f05e6b75ecb0</title>
      <link>https://vulnerability.circl.lu/sighting/f2917d14-fc1e-4ab1-abc4-f05e6b75ecb0/export</link>
      <description>{"uuid": "f2917d14-fc1e-4ab1-abc4-f05e6b75ecb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52517", "type": "seen", "source": "https://t.me/cvedetector/11116", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52517 - Nextcloud Server Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52517 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After storing \"Global credentials\" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:40.000000Z"}</description>
      <content:encoded>{"uuid": "f2917d14-fc1e-4ab1-abc4-f05e6b75ecb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52517", "type": "seen", "source": "https://t.me/cvedetector/11116", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52517 - Nextcloud Server Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52517 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After storing \"Global credentials\" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f2917d14-fc1e-4ab1-abc4-f05e6b75ecb0/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:40 +0000</pubDate>
    </item>
    <item>
      <title>29ced8ef-678c-42b1-acc2-e3ed58b29a25</title>
      <link>https://vulnerability.circl.lu/sighting/29ced8ef-678c-42b1-acc2-e3ed58b29a25/export</link>
      <description>{"uuid": "29ced8ef-678c-42b1-acc2-e3ed58b29a25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52516", "type": "seen", "source": "https://t.me/cvedetector/11115", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52516 - Nextcloud Server Group-based Sharing Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52516 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. When a server is configured to only allow sharing with users that are in ones own groups, after a user was removed from a group, previously shared items were not unshared. It is recommended that the Nextcloud Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6 and Nextcloud Enterprise Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6. \nSeverity: 3.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:40.000000Z"}</description>
      <content:encoded>{"uuid": "29ced8ef-678c-42b1-acc2-e3ed58b29a25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52516", "type": "seen", "source": "https://t.me/cvedetector/11115", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52516 - Nextcloud Server Group-based Sharing Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52516 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. When a server is configured to only allow sharing with users that are in ones own groups, after a user was removed from a group, previously shared items were not unshared. It is recommended that the Nextcloud Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6 and Nextcloud Enterprise Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6. \nSeverity: 3.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/29ced8ef-678c-42b1-acc2-e3ed58b29a25/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:40 +0000</pubDate>
    </item>
    <item>
      <title>b11f7b26-7b43-4f9b-8c8d-680f34729b08</title>
      <link>https://vulnerability.circl.lu/sighting/b11f7b26-7b43-4f9b-8c8d-680f34729b08/export</link>
      <description>{"uuid": "b11f7b26-7b43-4f9b-8c8d-680f34729b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52518", "type": "seen", "source": "https://t.me/cvedetector/11117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52518 - Nextcloud Server Session Hijacking Storage Manipulation\", \n  \"Content\": \"CVE ID : CVE-2024-52518 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:41.000000Z"}</description>
      <content:encoded>{"uuid": "b11f7b26-7b43-4f9b-8c8d-680f34729b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52518", "type": "seen", "source": "https://t.me/cvedetector/11117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52518 - Nextcloud Server Session Hijacking Storage Manipulation\", \n  \"Content\": \"CVE ID : CVE-2024-52518 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b11f7b26-7b43-4f9b-8c8d-680f34729b08/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:41 +0000</pubDate>
    </item>
    <item>
      <title>6bfb2378-260a-426c-ad7d-a4306f35a57f</title>
      <link>https://vulnerability.circl.lu/sighting/6bfb2378-260a-426c-ad7d-a4306f35a57f/export</link>
      <description>{"uuid": "6bfb2378-260a-426c-ad7d-a4306f35a57f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52519", "type": "seen", "source": "https://t.me/cvedetector/11118", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52519 - Nextcloud Server OAuth2 Client Secret Decryption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52519 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. The OAuth2 client secrets were stored in a recoverable way, so that an attacker that got access to a backup of the database and the Nextcloud config file, would be able to decrypt them. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:42.000000Z"}</description>
      <content:encoded>{"uuid": "6bfb2378-260a-426c-ad7d-a4306f35a57f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52519", "type": "seen", "source": "https://t.me/cvedetector/11118", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52519 - Nextcloud Server OAuth2 Client Secret Decryption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52519 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. The OAuth2 client secrets were stored in a recoverable way, so that an attacker that got access to a backup of the database and the Nextcloud config file, would be able to decrypt them. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6bfb2378-260a-426c-ad7d-a4306f35a57f/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:42 +0000</pubDate>
    </item>
    <item>
      <title>1169b91f-a760-4c6d-b179-34f54640dbb8</title>
      <link>https://vulnerability.circl.lu/sighting/1169b91f-a760-4c6d-b179-34f54640dbb8/export</link>
      <description>{"uuid": "1169b91f-a760-4c6d-b179-34f54640dbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52515", "type": "seen", "source": "https://t.me/cvedetector/11121", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52515 - Nextcloud Server SVG File Path Manipulation\", \n  \"Content\": \"CVE ID : CVE-2024-52515 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:47.000000Z"}</description>
      <content:encoded>{"uuid": "1169b91f-a760-4c6d-b179-34f54640dbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52515", "type": "seen", "source": "https://t.me/cvedetector/11121", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52515 - Nextcloud Server SVG File Path Manipulation\", \n  \"Content\": \"CVE ID : CVE-2024-52515 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1169b91f-a760-4c6d-b179-34f54640dbb8/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:47 +0000</pubDate>
    </item>
    <item>
      <title>e41a758a-f402-4064-bec6-8349b1c82b89</title>
      <link>https://vulnerability.circl.lu/sighting/e41a758a-f402-4064-bec6-8349b1c82b89/export</link>
      <description>{"uuid": "e41a758a-f402-4064-bec6-8349b1c82b89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52513", "type": "seen", "source": "https://t.me/cvedetector/11130", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52513 - Nextcloud Server File Download without Password Protection\", \n  \"Content\": \"CVE ID : CVE-2024-52513 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After receiving a \"Files drop\" or \"Password protected\" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:04.000000Z"}</description>
      <content:encoded>{"uuid": "e41a758a-f402-4064-bec6-8349b1c82b89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52513", "type": "seen", "source": "https://t.me/cvedetector/11130", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52513 - Nextcloud Server File Download without Password Protection\", \n  \"Content\": \"CVE ID : CVE-2024-52513 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After receiving a \"Files drop\" or \"Password protected\" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e41a758a-f402-4064-bec6-8349b1c82b89/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:58:04 +0000</pubDate>
    </item>
    <item>
      <title>59d8e41d-4480-45a0-8d6f-f6fa84eaaad0</title>
      <link>https://vulnerability.circl.lu/sighting/59d8e41d-4480-45a0-8d6f-f6fa84eaaad0/export</link>
      <description>{"uuid": "59d8e41d-4480-45a0-8d6f-f6fa84eaaad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52514", "type": "seen", "source": "https://t.me/cvedetector/11131", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52514 - Nextcloud Server Unrestricted File Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52514 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After a user received a share with some files inside being blocked by the files access control, the user would still be able to copy the intermediate folder inside Nextcloud allowing them to afterwards potentially access the blocked files depending on the user access control rules. It is recommended that the Nextcloud Server is upgraded to 27.1.9, 28.0.5 or 29.0.0 and Nextcloud Enterprise Server is upgraded to 21.0.9.18, 22.2.10.23, 23.0.12.18, 24.0.12.14, 25.0.13.9, 26.0.13.3, 27.1.9, 28.0.5 or 29.0.0. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:05.000000Z"}</description>
      <content:encoded>{"uuid": "59d8e41d-4480-45a0-8d6f-f6fa84eaaad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52514", "type": "seen", "source": "https://t.me/cvedetector/11131", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52514 - Nextcloud Server Unrestricted File Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52514 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After a user received a share with some files inside being blocked by the files access control, the user would still be able to copy the intermediate folder inside Nextcloud allowing them to afterwards potentially access the blocked files depending on the user access control rules. It is recommended that the Nextcloud Server is upgraded to 27.1.9, 28.0.5 or 29.0.0 and Nextcloud Enterprise Server is upgraded to 21.0.9.18, 22.2.10.23, 23.0.12.18, 24.0.12.14, 25.0.13.9, 26.0.13.3, 27.1.9, 28.0.5 or 29.0.0. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/59d8e41d-4480-45a0-8d6f-f6fa84eaaad0/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:58:05 +0000</pubDate>
    </item>
    <item>
      <title>73a6d222-858a-4bde-af6e-907eac46976e</title>
      <link>https://vulnerability.circl.lu/sighting/73a6d222-858a-4bde-af6e-907eac46976e/export</link>
      <description>{"uuid": "73a6d222-858a-4bde-af6e-907eac46976e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52510", "type": "seen", "source": "https://t.me/cvedetector/11135", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52510 - Nextcloud Desktop Client Signature Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-52510 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. The Desktop client did not stop with an error but allowed by-passing the signature validation, if a manipulated server sends an empty initial signature. It is recommended that the Nextcloud Desktop client is upgraded to 3.14.2 or later. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:11.000000Z"}</description>
      <content:encoded>{"uuid": "73a6d222-858a-4bde-af6e-907eac46976e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52510", "type": "seen", "source": "https://t.me/cvedetector/11135", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52510 - Nextcloud Desktop Client Signature Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-52510 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. The Desktop client did not stop with an error but allowed by-passing the signature validation, if a manipulated server sends an empty initial signature. It is recommended that the Nextcloud Desktop client is upgraded to 3.14.2 or later. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/73a6d222-858a-4bde-af6e-907eac46976e/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:58:11 +0000</pubDate>
    </item>
    <item>
      <title>3abd8af1-7e04-43af-a7f1-67939908e26f</title>
      <link>https://vulnerability.circl.lu/sighting/3abd8af1-7e04-43af-a7f1-67939908e26f/export</link>
      <description>{"uuid": "3abd8af1-7e04-43af-a7f1-67939908e26f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52511", "type": "seen", "source": "https://t.me/cvedetector/11136", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52511 - Nextcloud Tables Table Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52511 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Nextcloud Tables allows users to to create tables with individual columns. By directly specifying the ID of a table or view, a malicious user could blindly insert new rows into tables they have no access to. It is recommended that the Nextcloud Tables is upgraded to 0.8.0. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:12.000000Z"}</description>
      <content:encoded>{"uuid": "3abd8af1-7e04-43af-a7f1-67939908e26f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52511", "type": "seen", "source": "https://t.me/cvedetector/11136", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52511 - Nextcloud Tables Table Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52511 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Nextcloud Tables allows users to to create tables with individual columns. By directly specifying the ID of a table or view, a malicious user could blindly insert new rows into tables they have no access to. It is recommended that the Nextcloud Tables is upgraded to 0.8.0. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3abd8af1-7e04-43af-a7f1-67939908e26f/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:58:12 +0000</pubDate>
    </item>
    <item>
      <title>e92e6948-5ec6-4a19-a628-4627524bffdb</title>
      <link>https://vulnerability.circl.lu/sighting/e92e6948-5ec6-4a19-a628-4627524bffdb/export</link>
      <description>{"uuid": "e92e6948-5ec6-4a19-a628-4627524bffdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52512", "type": "seen", "source": "https://t.me/cvedetector/11137", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52512 - Nextcloud User OIDC OpenID Connect Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52512 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : user_oidc app is an OpenID Connect user backend for Nextcloud. A malicious user could send a malformed login link that would redirect the user to a provided URL after successfully authenticating. It is recommended that the Nextcloud User OIDC app is upgraded to 6.1.0. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:13.000000Z"}</description>
      <content:encoded>{"uuid": "e92e6948-5ec6-4a19-a628-4627524bffdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52512", "type": "seen", "source": "https://t.me/cvedetector/11137", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52512 - Nextcloud User OIDC OpenID Connect Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52512 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : user_oidc app is an OpenID Connect user backend for Nextcloud. A malicious user could send a malformed login link that would redirect the user to a provided URL after successfully authenticating. It is recommended that the Nextcloud User OIDC app is upgraded to 6.1.0. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e92e6948-5ec6-4a19-a628-4627524bffdb/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:58:13 +0000</pubDate>
    </item>
  </channel>
</rss>
