<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 15:54:30 +0000</lastBuildDate>
    <item>
      <title>9db1ae96-355f-4e9f-903f-f520185fac7a</title>
      <link>https://vulnerability.circl.lu/sighting/9db1ae96-355f-4e9f-903f-f520185fac7a/export</link>
      <description>{"uuid": "9db1ae96-355f-4e9f-903f-f520185fac7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52525", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113488015431757561", "content": "", "creation_timestamp": "2024-11-15T16:54:49.427627Z"}</description>
      <content:encoded>{"uuid": "9db1ae96-355f-4e9f-903f-f520185fac7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52525", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113488015431757561", "content": "", "creation_timestamp": "2024-11-15T16:54:49.427627Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9db1ae96-355f-4e9f-903f-f520185fac7a/export</guid>
      <pubDate>Fri, 15 Nov 2024 16:54:49 +0000</pubDate>
    </item>
    <item>
      <title>31583fea-2d1f-475a-b07d-a2c5101fe559</title>
      <link>https://vulnerability.circl.lu/sighting/31583fea-2d1f-475a-b07d-a2c5101fe559/export</link>
      <description>{"uuid": "31583fea-2d1f-475a-b07d-a2c5101fe559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52522", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113488105450265203", "content": "", "creation_timestamp": "2024-11-15T17:17:42.797598Z"}</description>
      <content:encoded>{"uuid": "31583fea-2d1f-475a-b07d-a2c5101fe559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52522", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113488105450265203", "content": "", "creation_timestamp": "2024-11-15T17:17:42.797598Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/31583fea-2d1f-475a-b07d-a2c5101fe559/export</guid>
      <pubDate>Fri, 15 Nov 2024 17:17:42 +0000</pubDate>
    </item>
    <item>
      <title>54d8a2f6-56c0-454a-9c0c-c6ecbea0e3f7</title>
      <link>https://vulnerability.circl.lu/sighting/54d8a2f6-56c0-454a-9c0c-c6ecbea0e3f7/export</link>
      <description>{"uuid": "54d8a2f6-56c0-454a-9c0c-c6ecbea0e3f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52526", "type": "seen", "source": "https://t.me/cvedetector/11090", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52526 - LibreNMS Stored XSS in Device Page Services Descr Parameter\", \n  \"Content\": \"CVE ID : CVE-2024-52526 \nPublished : Nov. 15, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Services\" tab of the Device page allows authenticated users to inject arbitrary JavaScript through the \"descr\" parameter when adding a service to a device. This vulnerability could result in the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T18:17:04.000000Z"}</description>
      <content:encoded>{"uuid": "54d8a2f6-56c0-454a-9c0c-c6ecbea0e3f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52526", "type": "seen", "source": "https://t.me/cvedetector/11090", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52526 - LibreNMS Stored XSS in Device Page Services Descr Parameter\", \n  \"Content\": \"CVE ID : CVE-2024-52526 \nPublished : Nov. 15, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Services\" tab of the Device page allows authenticated users to inject arbitrary JavaScript through the \"descr\" parameter when adding a service to a device. This vulnerability could result in the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T18:17:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/54d8a2f6-56c0-454a-9c0c-c6ecbea0e3f7/export</guid>
      <pubDate>Fri, 15 Nov 2024 18:17:04 +0000</pubDate>
    </item>
    <item>
      <title>0c2a6c70-d477-400b-9ad4-c3ffe970c697</title>
      <link>https://vulnerability.circl.lu/sighting/0c2a6c70-d477-400b-9ad4-c3ffe970c697/export</link>
      <description>{"uuid": "0c2a6c70-d477-400b-9ad4-c3ffe970c697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52528", "type": "seen", "source": "https://t.me/cvedetector/11110", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52528 - Budget Control Gateway Token Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-52528 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Budget Control Gateway acts as an entry point for incoming requests and routes them to the appropriate microservices for Budget Control. Budget Control Gateway does not properly validate auth tokens, which allows attackers to bypass intended restrictions. This vulnerability is fixed in 1.5.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:33.000000Z"}</description>
      <content:encoded>{"uuid": "0c2a6c70-d477-400b-9ad4-c3ffe970c697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52528", "type": "seen", "source": "https://t.me/cvedetector/11110", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52528 - Budget Control Gateway Token Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-52528 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Budget Control Gateway acts as an entry point for incoming requests and routes them to the appropriate microservices for Budget Control. Budget Control Gateway does not properly validate auth tokens, which allows attackers to bypass intended restrictions. This vulnerability is fixed in 1.5.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0c2a6c70-d477-400b-9ad4-c3ffe970c697/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:33 +0000</pubDate>
    </item>
    <item>
      <title>1de65c00-8296-4325-9cad-f81946d81c2f</title>
      <link>https://vulnerability.circl.lu/sighting/1de65c00-8296-4325-9cad-f81946d81c2f/export</link>
      <description>{"uuid": "1de65c00-8296-4325-9cad-f81946d81c2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52520", "type": "seen", "source": "https://t.me/cvedetector/11112", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52520 - Nextcloud Server Open Graph Out-of-Bounds Archive Retrieval\", \n  \"Content\": \"CVE ID : CVE-2024-52520 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-graph data. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:34.000000Z"}</description>
      <content:encoded>{"uuid": "1de65c00-8296-4325-9cad-f81946d81c2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52520", "type": "seen", "source": "https://t.me/cvedetector/11112", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52520 - Nextcloud Server Open Graph Out-of-Bounds Archive Retrieval\", \n  \"Content\": \"CVE ID : CVE-2024-52520 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-graph data. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1de65c00-8296-4325-9cad-f81946d81c2f/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:34 +0000</pubDate>
    </item>
    <item>
      <title>e2c8eb56-993d-41bf-91db-df7c8b922d55</title>
      <link>https://vulnerability.circl.lu/sighting/e2c8eb56-993d-41bf-91db-df7c8b922d55/export</link>
      <description>{"uuid": "e2c8eb56-993d-41bf-91db-df7c8b922d55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52525", "type": "seen", "source": "https://t.me/cvedetector/11111", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52525 - Nextcloud Server Unencrypted Password Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-52525 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2. \nSeverity: 1.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:34.000000Z"}</description>
      <content:encoded>{"uuid": "e2c8eb56-993d-41bf-91db-df7c8b922d55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52525", "type": "seen", "source": "https://t.me/cvedetector/11111", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52525 - Nextcloud Server Unencrypted Password Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-52525 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2. \nSeverity: 1.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e2c8eb56-993d-41bf-91db-df7c8b922d55/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:34 +0000</pubDate>
    </item>
    <item>
      <title>8088cc23-99da-4881-9b38-a32ba3defe6a</title>
      <link>https://vulnerability.circl.lu/sighting/8088cc23-99da-4881-9b38-a32ba3defe6a/export</link>
      <description>{"uuid": "8088cc23-99da-4881-9b38-a32ba3defe6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52521", "type": "seen", "source": "https://t.me/cvedetector/11113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52521 - Nextcloud Server Background Job Collider Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52521 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:35.000000Z"}</description>
      <content:encoded>{"uuid": "8088cc23-99da-4881-9b38-a32ba3defe6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52521", "type": "seen", "source": "https://t.me/cvedetector/11113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52521 - Nextcloud Server Background Job Collider Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52521 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8088cc23-99da-4881-9b38-a32ba3defe6a/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:35 +0000</pubDate>
    </item>
    <item>
      <title>cbee6be8-fd85-4075-9d77-d15d733821d4</title>
      <link>https://vulnerability.circl.lu/sighting/cbee6be8-fd85-4075-9d77-d15d733821d4/export</link>
      <description>{"uuid": "cbee6be8-fd85-4075-9d77-d15d733821d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52523", "type": "seen", "source": "https://t.me/cvedetector/11114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52523 - Nextcloud Server External Storage Credentials Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-52523 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:36.000000Z"}</description>
      <content:encoded>{"uuid": "cbee6be8-fd85-4075-9d77-d15d733821d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52523", "type": "seen", "source": "https://t.me/cvedetector/11114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52523 - Nextcloud Server External Storage Credentials Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-52523 \nPublished : Nov. 15, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:07:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cbee6be8-fd85-4075-9d77-d15d733821d4/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:07:36 +0000</pubDate>
    </item>
    <item>
      <title>66bdcf94-37e9-4ee3-a441-bbec079068d0</title>
      <link>https://vulnerability.circl.lu/sighting/66bdcf94-37e9-4ee3-a441-bbec079068d0/export</link>
      <description>{"uuid": "66bdcf94-37e9-4ee3-a441-bbec079068d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52522", "type": "seen", "source": "https://t.me/cvedetector/11132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52522 - Rclone Symlink Direct Object Modification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52522 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Insecure handling of symlinks with --links and --metadata in rclone while copying to local disk allows unprivileged users to indirectly modify ownership and permissions on symlink target files when a superuser or privileged process performs a copy. This vulnerability could enable privilege escalation and unauthorized access to critical system files, compromising system integrity, confidentiality, and availability. This vulnerability is fixed in 1.68.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:06.000000Z"}</description>
      <content:encoded>{"uuid": "66bdcf94-37e9-4ee3-a441-bbec079068d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52522", "type": "seen", "source": "https://t.me/cvedetector/11132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52522 - Rclone Symlink Direct Object Modification Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52522 \nPublished : Nov. 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Insecure handling of symlinks with --links and --metadata in rclone while copying to local disk allows unprivileged users to indirectly modify ownership and permissions on symlink target files when a superuser or privileged process performs a copy. This vulnerability could enable privilege escalation and unauthorized access to critical system files, compromising system integrity, confidentiality, and availability. This vulnerability is fixed in 1.68.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T19:58:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/66bdcf94-37e9-4ee3-a441-bbec079068d0/export</guid>
      <pubDate>Fri, 15 Nov 2024 19:58:06 +0000</pubDate>
    </item>
    <item>
      <title>fcc5f2a9-465c-456d-a4e2-4ae1ffa402d6</title>
      <link>https://vulnerability.circl.lu/sighting/fcc5f2a9-465c-456d-a4e2-4ae1ffa402d6/export</link>
      <description>{"uuid": "fcc5f2a9-465c-456d-a4e2-4ae1ffa402d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52529", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113545092265515508", "content": "", "creation_timestamp": "2024-11-25T18:50:12.459846Z"}</description>
      <content:encoded>{"uuid": "fcc5f2a9-465c-456d-a4e2-4ae1ffa402d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52529", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113545092265515508", "content": "", "creation_timestamp": "2024-11-25T18:50:12.459846Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fcc5f2a9-465c-456d-a4e2-4ae1ffa402d6/export</guid>
      <pubDate>Mon, 25 Nov 2024 18:50:12 +0000</pubDate>
    </item>
  </channel>
</rss>
