<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 15:30:21 +0000</lastBuildDate>
    <item>
      <title>1169b91f-a760-4c6d-b179-34f54640dbb8</title>
      <link>https://vulnerability.circl.lu/sighting/1169b91f-a760-4c6d-b179-34f54640dbb8/export</link>
      <description>{"uuid": "1169b91f-a760-4c6d-b179-34f54640dbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52515", "type": "seen", "source": "https://t.me/cvedetector/11121", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52515 - Nextcloud Server SVG File Path Manipulation\", \n  \"Content\": \"CVE ID : CVE-2024-52515 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:47.000000Z"}</description>
      <content:encoded>{"uuid": "1169b91f-a760-4c6d-b179-34f54640dbb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52515", "type": "seen", "source": "https://t.me/cvedetector/11121", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52515 - Nextcloud Server SVG File Path Manipulation\", \n  \"Content\": \"CVE ID : CVE-2024-52515 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1169b91f-a760-4c6d-b179-34f54640dbb8/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:47 +0000</pubDate>
    </item>
  </channel>
</rss>
