<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 17:32:04 +0000</lastBuildDate>
    <item>
      <title>1173dbae-e46a-4d2d-9621-34b85a5ac99e</title>
      <link>https://vulnerability.circl.lu/sighting/1173dbae-e46a-4d2d-9621-34b85a5ac99e/export</link>
      <description>{"uuid": "1173dbae-e46a-4d2d-9621-34b85a5ac99e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45604", "type": "seen", "source": "https://t.me/cvedetector/5852", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45604 - Contao File Path Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45604 \nPublished : Sept. 17, 2024, 8:15 p.m. | 41\u00a0minutes ago \nDescription : Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T23:08:39.000000Z"}</description>
      <content:encoded>{"uuid": "1173dbae-e46a-4d2d-9621-34b85a5ac99e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45604", "type": "seen", "source": "https://t.me/cvedetector/5852", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45604 - Contao File Path Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45604 \nPublished : Sept. 17, 2024, 8:15 p.m. | 41\u00a0minutes ago \nDescription : Contao is an Open Source CMS. In affected versions authenticated users in the back end can list files outside the document root in the file selector widget. Users are advised to update to Contao 4.13.49. There are no known workarounds for this vulnerability. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-17T23:08:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1173dbae-e46a-4d2d-9621-34b85a5ac99e/export</guid>
      <pubDate>Tue, 17 Sep 2024 23:08:39 +0000</pubDate>
    </item>
  </channel>
</rss>
