<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 13:13:22 +0000</lastBuildDate>
    <item>
      <title>4afd608d-ab61-4c0b-aff9-fc7a6e3a9a5e</title>
      <link>https://db.gcve.eu/sighting/4afd608d-ab61-4c0b-aff9-fc7a6e3a9a5e/export</link>
      <description>{"uuid": "4afd608d-ab61-4c0b-aff9-fc7a6e3a9a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8694", "type": "seen", "source": "https://t.me/cvedetector/5411", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8694 - JFinalCMS Remote File Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8694 \nPublished : Sept. 11, 2024, 9:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in JFinalCMS up to 20240903. This affects the function update of the file /admin/template/update of the component com.cms.controller.admin.TemplateController. The manipulation of the argument fileName leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-11T23:43:49.000000Z"}</description>
      <content:encoded>{"uuid": "4afd608d-ab61-4c0b-aff9-fc7a6e3a9a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8694", "type": "seen", "source": "https://t.me/cvedetector/5411", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8694 - JFinalCMS Remote File Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8694 \nPublished : Sept. 11, 2024, 9:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in JFinalCMS up to 20240903. This affects the function update of the file /admin/template/update of the component com.cms.controller.admin.TemplateController. The manipulation of the argument fileName leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-11T23:43:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4afd608d-ab61-4c0b-aff9-fc7a6e3a9a5e/export</guid>
      <pubDate>Wed, 11 Sep 2024 23:43:49 +0000</pubDate>
    </item>
  </channel>
</rss>
