<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T03:28:39.303489+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/1249fbb8-83d6-46d2-992f-2e867debe450/export</id>
    <title>1249fbb8-83d6-46d2-992f-2e867debe450</title>
    <updated>2026-05-02T03:28:39.655892+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1249fbb8-83d6-46d2-992f-2e867debe450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9903", "type": "seen", "source": "https://t.me/cvedetector/7776", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9903 - 07FlyCMS Unrestricted File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9903 \nPublished : Oct. 12, 2024, 11:15 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 1.2.0. This affects the function fileUpload of the file /admin/File/fileUpload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The affected product is known with different names like 07FLYCMS, 07FLY-CMS, and 07FlyCRM. It was not possible to reach out to the vendor before assigning a CVE due to a not working mail address. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-13T02:11:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1249fbb8-83d6-46d2-992f-2e867debe450/export"/>
    <published>2024-10-13T02:11:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/14e1853c-ed58-492c-a38c-a525543636f1/export</id>
    <title>14e1853c-ed58-492c-a38c-a525543636f1</title>
    <updated>2026-05-02T03:28:39.654734+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "14e1853c-ed58-492c-a38c-a525543636f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9903", "type": "seen", "source": "https://t.me/HackerArsenal/545", "content": "\u203c\ufe0f CVE-2024-9903 \u203c\ufe0f\n\nA vulnerability classified as critical has been found in 07FLYCMS, 07FLYCMS and 07FlyCRM up to 1.2.0. This affects the function fileUpload of the file adminFilefileUpload. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The affected product is known with different names like 07FLYCMS, 07FLYCMS, and 07FlyCRM. It was not possible to reach out to the vendor before assigning a CVE due to a not working mail address.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"National Vulnerability Database\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity_CVEs", "creation_timestamp": "2024-10-13T14:10:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/14e1853c-ed58-492c-a38c-a525543636f1/export"/>
    <published>2024-10-13T14:10:43+00:00</published>
  </entry>
</feed>
