<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 03:17:18 +0000</lastBuildDate>
    <item>
      <title>1ccd5304-1d49-472a-900b-c0ef655b40fd</title>
      <link>https://vulnerability.circl.lu/sighting/1ccd5304-1d49-472a-900b-c0ef655b40fd/export</link>
      <description>{"uuid": "1ccd5304-1d49-472a-900b-c0ef655b40fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51164", "type": "seen", "source": "https://t.me/cvedetector/11094", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51164 - JEPaaS SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51164 \nPublished : Nov. 15, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : Multiple parameters have SQL injection vulnerability in JEPaaS 7.2.8 via /je/login/btnLog/insertBtnLog, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T18:17:07.000000Z"}</description>
      <content:encoded>{"uuid": "1ccd5304-1d49-472a-900b-c0ef655b40fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51164", "type": "seen", "source": "https://t.me/cvedetector/11094", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51164 - JEPaaS SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51164 \nPublished : Nov. 15, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : Multiple parameters have SQL injection vulnerability in JEPaaS 7.2.8 via /je/login/btnLog/insertBtnLog, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T18:17:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1ccd5304-1d49-472a-900b-c0ef655b40fd/export</guid>
      <pubDate>Fri, 15 Nov 2024 18:17:07 +0000</pubDate>
    </item>
    <item>
      <title>4a2a2a56-9fde-463e-b235-57db2efeb844</title>
      <link>https://vulnerability.circl.lu/sighting/4a2a2a56-9fde-463e-b235-57db2efeb844/export</link>
      <description>{"uuid": "4a2a2a56-9fde-463e-b235-57db2efeb844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51162", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113516243863731200", "content": "", "creation_timestamp": "2024-11-20T16:33:40.683750Z"}</description>
      <content:encoded>{"uuid": "4a2a2a56-9fde-463e-b235-57db2efeb844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51162", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113516243863731200", "content": "", "creation_timestamp": "2024-11-20T16:33:40.683750Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4a2a2a56-9fde-463e-b235-57db2efeb844/export</guid>
      <pubDate>Wed, 20 Nov 2024 16:33:40 +0000</pubDate>
    </item>
    <item>
      <title>38078ea0-8ed6-491a-bf11-8fae9d33101f</title>
      <link>https://vulnerability.circl.lu/sighting/38078ea0-8ed6-491a-bf11-8fae9d33101f/export</link>
      <description>{"uuid": "38078ea0-8ed6-491a-bf11-8fae9d33101f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51163", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113516291352859818", "content": "", "creation_timestamp": "2024-11-20T16:45:45.343634Z"}</description>
      <content:encoded>{"uuid": "38078ea0-8ed6-491a-bf11-8fae9d33101f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51163", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113516291352859818", "content": "", "creation_timestamp": "2024-11-20T16:45:45.343634Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/38078ea0-8ed6-491a-bf11-8fae9d33101f/export</guid>
      <pubDate>Wed, 20 Nov 2024 16:45:45 +0000</pubDate>
    </item>
    <item>
      <title>aaa51922-3c9c-4606-b8c4-940bd6299568</title>
      <link>https://vulnerability.circl.lu/sighting/aaa51922-3c9c-4606-b8c4-940bd6299568/export</link>
      <description>{"uuid": "aaa51922-3c9c-4606-b8c4-940bd6299568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51162", "type": "seen", "source": "https://t.me/cvedetector/11625", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51162 - Audimex EE Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-51162 \nPublished : Nov. 20, 2024, 5:15 p.m. | 25\u00a0minutes ago \nDescription : An issue in Audimex EE v.15.1.20 and before allows a remote attacker to escalate privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T18:45:45.000000Z"}</description>
      <content:encoded>{"uuid": "aaa51922-3c9c-4606-b8c4-940bd6299568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51162", "type": "seen", "source": "https://t.me/cvedetector/11625", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51162 - Audimex EE Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-51162 \nPublished : Nov. 20, 2024, 5:15 p.m. | 25\u00a0minutes ago \nDescription : An issue in Audimex EE v.15.1.20 and before allows a remote attacker to escalate privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T18:45:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aaa51922-3c9c-4606-b8c4-940bd6299568/export</guid>
      <pubDate>Wed, 20 Nov 2024 18:45:45 +0000</pubDate>
    </item>
    <item>
      <title>469a3ca8-7e9c-4458-9dad-a99000ff81d3</title>
      <link>https://vulnerability.circl.lu/sighting/469a3ca8-7e9c-4458-9dad-a99000ff81d3/export</link>
      <description>{"uuid": "469a3ca8-7e9c-4458-9dad-a99000ff81d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51163", "type": "seen", "source": "https://t.me/cvedetector/11626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51163 - Vegam Solutions Vegam 4i Local File Inclusion Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-51163 \nPublished : Nov. 20, 2024, 5:15 p.m. | 25\u00a0minutes ago \nDescription : Local File Inclusion vulnerability in Vegam Solutions Vegam 4i v.6.3.47.0 and earlier allows a remote attacker to obtain sensitive information via the print labelling function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T18:45:49.000000Z"}</description>
      <content:encoded>{"uuid": "469a3ca8-7e9c-4458-9dad-a99000ff81d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51163", "type": "seen", "source": "https://t.me/cvedetector/11626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51163 - Vegam Solutions Vegam 4i Local File Inclusion Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-51163 \nPublished : Nov. 20, 2024, 5:15 p.m. | 25\u00a0minutes ago \nDescription : Local File Inclusion vulnerability in Vegam Solutions Vegam 4i v.6.3.47.0 and earlier allows a remote attacker to obtain sensitive information via the print labelling function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T18:45:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/469a3ca8-7e9c-4458-9dad-a99000ff81d3/export</guid>
      <pubDate>Wed, 20 Nov 2024 18:45:49 +0000</pubDate>
    </item>
    <item>
      <title>b9a5a106-8f17-4208-861a-5cf3c97813ed</title>
      <link>https://vulnerability.circl.lu/sighting/b9a5a106-8f17-4208-861a-5cf3c97813ed/export</link>
      <description>{"uuid": "b9a5a106-8f17-4208-861a-5cf3c97813ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51165", "type": "seen", "source": "https://t.me/cvedetector/12557", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51165 - Apache JEPAAS SQL Injection Flaw\", \n  \"Content\": \"CVE ID : CVE-2024-51165 \nPublished : Dec. 10, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : SQL injection vulnerability in JEPAAS7.2.8, via /je/rbac/rbac/loadLoginCount in the dateVal parameter, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T21:39:57.000000Z"}</description>
      <content:encoded>{"uuid": "b9a5a106-8f17-4208-861a-5cf3c97813ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51165", "type": "seen", "source": "https://t.me/cvedetector/12557", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51165 - Apache JEPAAS SQL Injection Flaw\", \n  \"Content\": \"CVE ID : CVE-2024-51165 \nPublished : Dec. 10, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : SQL injection vulnerability in JEPAAS7.2.8, via /je/rbac/rbac/loadLoginCount in the dateVal parameter, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T21:39:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b9a5a106-8f17-4208-861a-5cf3c97813ed/export</guid>
      <pubDate>Tue, 10 Dec 2024 21:39:57 +0000</pubDate>
    </item>
    <item>
      <title>30c1d5dd-acb2-4b24-a1b3-4daa946bd6c6</title>
      <link>https://vulnerability.circl.lu/sighting/30c1d5dd-acb2-4b24-a1b3-4daa946bd6c6/export</link>
      <description>{"uuid": "30c1d5dd-acb2-4b24-a1b3-4daa946bd6c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51163", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1046", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51163\n\ud83d\udd39 Description: A Local File Inclusion vulnerability in Vegam Solutions Vegam 4i versions 6.3.47.0 and earlier allows a remote attacker to obtain sensitive information through the print label function. Specifically, the filePathList parameter is susceptible to LFI, enabling a malicious user to include files from the web server, such as web.config or /etc/host, leading to the disclosure of sensitive information.\n\ud83d\udccf Published: 2024-11-20T00:00:00\n\ud83d\udccf Modified: 2025-01-09T19:51:55.935912Z\n\ud83d\udd17 References:\n1. https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163\n2. https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51163", "creation_timestamp": "2025-01-09T20:15:51.000000Z"}</description>
      <content:encoded>{"uuid": "30c1d5dd-acb2-4b24-a1b3-4daa946bd6c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51163", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1046", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51163\n\ud83d\udd39 Description: A Local File Inclusion vulnerability in Vegam Solutions Vegam 4i versions 6.3.47.0 and earlier allows a remote attacker to obtain sensitive information through the print label function. Specifically, the filePathList parameter is susceptible to LFI, enabling a malicious user to include files from the web server, such as web.config or /etc/host, leading to the disclosure of sensitive information.\n\ud83d\udccf Published: 2024-11-20T00:00:00\n\ud83d\udccf Modified: 2025-01-09T19:51:55.935912Z\n\ud83d\udd17 References:\n1. https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163\n2. https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51163", "creation_timestamp": "2025-01-09T20:15:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/30c1d5dd-acb2-4b24-a1b3-4daa946bd6c6/export</guid>
      <pubDate>Thu, 09 Jan 2025 20:15:51 +0000</pubDate>
    </item>
    <item>
      <title>cd5032a6-3e16-4bc7-a304-3ea285a878c0</title>
      <link>https://vulnerability.circl.lu/sighting/cd5032a6-3e16-4bc7-a304-3ea285a878c0/export</link>
      <description>{"uuid": "cd5032a6-3e16-4bc7-a304-3ea285a878c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51162", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1050", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51162\n\ud83d\udd39 Description: An issue in Audimex EE versions 15.1.20 and earlier allowing a remote attacker to escalate privileges. Analyzing the offline client code, it was identified that it is possible for any user (with any privilege) of Audimex to dump the whole Audimex database. This gives visibility upon password hashes of any user, ongoing audit data and more.\n\ud83d\udccf Published: 2024-11-20T00:00:00\n\ud83d\udccf Modified: 2025-01-09T19:50:50.792184Z\n\ud83d\udd17 References:\n1. https://github.com/Cameleon037/CVEs/blob/main/CVE-2024-51162/README.md\n2. https://en.web-audimex.com/ee-auditmanagement\n3. https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51162", "creation_timestamp": "2025-01-09T20:16:30.000000Z"}</description>
      <content:encoded>{"uuid": "cd5032a6-3e16-4bc7-a304-3ea285a878c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51162", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1050", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51162\n\ud83d\udd39 Description: An issue in Audimex EE versions 15.1.20 and earlier allowing a remote attacker to escalate privileges. Analyzing the offline client code, it was identified that it is possible for any user (with any privilege) of Audimex to dump the whole Audimex database. This gives visibility upon password hashes of any user, ongoing audit data and more.\n\ud83d\udccf Published: 2024-11-20T00:00:00\n\ud83d\udccf Modified: 2025-01-09T19:50:50.792184Z\n\ud83d\udd17 References:\n1. https://github.com/Cameleon037/CVEs/blob/main/CVE-2024-51162/README.md\n2. https://en.web-audimex.com/ee-auditmanagement\n3. https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51162", "creation_timestamp": "2025-01-09T20:16:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cd5032a6-3e16-4bc7-a304-3ea285a878c0/export</guid>
      <pubDate>Thu, 09 Jan 2025 20:16:30 +0000</pubDate>
    </item>
    <item>
      <title>a97c3794-297d-4917-b897-136388514014</title>
      <link>https://vulnerability.circl.lu/sighting/a97c3794-297d-4917-b897-136388514014/export</link>
      <description>{"uuid": "a97c3794-297d-4917-b897-136388514014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5116", "type": "seen", "source": "Telegram/sjtaCWA3My2sn_BFcOvmpwzmQsS7JnDlJbHx3-rrVRijpqMq", "content": "", "creation_timestamp": "2025-02-14T09:46:59.000000Z"}</description>
      <content:encoded>{"uuid": "a97c3794-297d-4917-b897-136388514014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5116", "type": "seen", "source": "Telegram/sjtaCWA3My2sn_BFcOvmpwzmQsS7JnDlJbHx3-rrVRijpqMq", "content": "", "creation_timestamp": "2025-02-14T09:46:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a97c3794-297d-4917-b897-136388514014/export</guid>
      <pubDate>Fri, 14 Feb 2025 09:46:59 +0000</pubDate>
    </item>
    <item>
      <title>3f4f77be-5c19-42fa-8bd7-89967a3c5887</title>
      <link>https://vulnerability.circl.lu/sighting/3f4f77be-5c19-42fa-8bd7-89967a3c5887/export</link>
      <description>{"uuid": "3f4f77be-5c19-42fa-8bd7-89967a3c5887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51163", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7964", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51163\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Local File Inclusion vulnerability in Vegam Solutions Vegam 4i versions 6.3.47.0 and earlier allows a remote attacker to obtain sensitive information through the print label function. Specifically, the filePathList parameter is susceptible to LFI, enabling a malicious user to include files from the web server, such as web.config or /etc/host, leading to the disclosure of sensitive information.\n\ud83d\udccf Published: 2024-11-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T18:33:49.067Z\n\ud83d\udd17 References:\n1. https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163\n2. https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51163", "creation_timestamp": "2025-03-18T19:03:01.000000Z"}</description>
      <content:encoded>{"uuid": "3f4f77be-5c19-42fa-8bd7-89967a3c5887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-51163", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7964", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51163\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Local File Inclusion vulnerability in Vegam Solutions Vegam 4i versions 6.3.47.0 and earlier allows a remote attacker to obtain sensitive information through the print label function. Specifically, the filePathList parameter is susceptible to LFI, enabling a malicious user to include files from the web server, such as web.config or /etc/host, leading to the disclosure of sensitive information.\n\ud83d\udccf Published: 2024-11-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T18:33:49.067Z\n\ud83d\udd17 References:\n1. https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163\n2. https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51163", "creation_timestamp": "2025-03-18T19:03:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3f4f77be-5c19-42fa-8bd7-89967a3c5887/export</guid>
      <pubDate>Tue, 18 Mar 2025 19:03:01 +0000</pubDate>
    </item>
  </channel>
</rss>
