<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 12:42:27 +0000</lastBuildDate>
    <item>
      <title>2a58a148-47a9-4377-a137-3b5c4ec489c8</title>
      <link>https://vulnerability.circl.lu/sighting/2a58a148-47a9-4377-a137-3b5c4ec489c8/export</link>
      <description>{"uuid": "2a58a148-47a9-4377-a137-3b5c4ec489c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53564", "type": "seen", "source": "https://t.me/cvedetector/11809", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53564 - An authenticated arbitrary file upload vulnerabili\", \n  \"Content\": \"CVE ID : CVE-2024-53564 \nPublished : Dec. 2, 2024, 6:15 p.m. | 58\u00a0minutes ago \nDescription : An authenticated arbitrary file upload vulnerability in the component /module_admin/upload.php of freepbx v17.0.19.17 allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T20:26:00.000000Z"}</description>
      <content:encoded>{"uuid": "2a58a148-47a9-4377-a137-3b5c4ec489c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53564", "type": "seen", "source": "https://t.me/cvedetector/11809", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53564 - An authenticated arbitrary file upload vulnerabili\", \n  \"Content\": \"CVE ID : CVE-2024-53564 \nPublished : Dec. 2, 2024, 6:15 p.m. | 58\u00a0minutes ago \nDescription : An authenticated arbitrary file upload vulnerability in the component /module_admin/upload.php of freepbx v17.0.19.17 allows attackers to execute arbitrary code via uploading a crafted file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T20:26:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2a58a148-47a9-4377-a137-3b5c4ec489c8/export</guid>
      <pubDate>Mon, 02 Dec 2024 20:26:00 +0000</pubDate>
    </item>
    <item>
      <title>3d7d597d-3ac8-4792-9614-d7ef8145bd92</title>
      <link>https://vulnerability.circl.lu/sighting/3d7d597d-3ac8-4792-9614-d7ef8145bd92/export</link>
      <description>{"uuid": "3d7d597d-3ac8-4792-9614-d7ef8145bd92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53564", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/861", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53564\n\ud83d\udd39 Description: A serious vulnerability was discovered in FreePBX 17.0.19.17. FreePBX does not verify the type of uploaded files and does not restrict user access paths, allowing attackers to remotely control the FreePBX server by uploading malicious files with malicious content and accessing the default directory where the files are uploaded. This will result in particularly serious consequences.\n\ud83d\udccf Published: 2024-12-02T00:00:00\n\ud83d\udccf Modified: 2025-01-08T23:58:28.406921Z\n\ud83d\udd17 References:\n1. https://gist.github.com/hyp164D1/490732de230edf97423f6d95b0d2f903\n2. https://gist.github.com/hyp164D1/d419bdf3e7e352088a21631d0f452a8c", "creation_timestamp": "2025-01-09T00:13:15.000000Z"}</description>
      <content:encoded>{"uuid": "3d7d597d-3ac8-4792-9614-d7ef8145bd92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53564", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/861", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53564\n\ud83d\udd39 Description: A serious vulnerability was discovered in FreePBX 17.0.19.17. FreePBX does not verify the type of uploaded files and does not restrict user access paths, allowing attackers to remotely control the FreePBX server by uploading malicious files with malicious content and accessing the default directory where the files are uploaded. This will result in particularly serious consequences.\n\ud83d\udccf Published: 2024-12-02T00:00:00\n\ud83d\udccf Modified: 2025-01-08T23:58:28.406921Z\n\ud83d\udd17 References:\n1. https://gist.github.com/hyp164D1/490732de230edf97423f6d95b0d2f903\n2. https://gist.github.com/hyp164D1/d419bdf3e7e352088a21631d0f452a8c", "creation_timestamp": "2025-01-09T00:13:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3d7d597d-3ac8-4792-9614-d7ef8145bd92/export</guid>
      <pubDate>Thu, 09 Jan 2025 00:13:15 +0000</pubDate>
    </item>
  </channel>
</rss>
