<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 13:13:10 +0000</lastBuildDate>
    <item>
      <title>1813c454-a42c-4bf8-a057-c8b9a423c5f8</title>
      <link>https://db.gcve.eu/sighting/1813c454-a42c-4bf8-a057-c8b9a423c5f8/export</link>
      <description>{"uuid": "1813c454-a42c-4bf8-a057-c8b9a423c5f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8706", "type": "seen", "source": "https://t.me/cvedetector/5416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8706 - JFinalCMS Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8706 \nPublished : Sept. 12, 2024, 12:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability was found in JFinalCMS up to 20240903. It has been classified as problematic. This affects the function update of the file /admin/template/update of the component com.cms.util.TemplateUtils. The manipulation of the argument fileName leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T03:04:23.000000Z"}</description>
      <content:encoded>{"uuid": "1813c454-a42c-4bf8-a057-c8b9a423c5f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8706", "type": "seen", "source": "https://t.me/cvedetector/5416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8706 - JFinalCMS Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8706 \nPublished : Sept. 12, 2024, 12:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability was found in JFinalCMS up to 20240903. It has been classified as problematic. This affects the function update of the file /admin/template/update of the component com.cms.util.TemplateUtils. The manipulation of the argument fileName leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T03:04:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1813c454-a42c-4bf8-a057-c8b9a423c5f8/export</guid>
      <pubDate>Thu, 12 Sep 2024 03:04:23 +0000</pubDate>
    </item>
  </channel>
</rss>
