<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-0196 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0196/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Tue, 21 Apr 2026 22:15:16 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-0196</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0196/#post-702</link>
                        <pubDate>Tue, 22 Oct 2024 18:34:10 +0000</pubDate>
                        <description><![CDATA[Description
A vulnerability has been found in Magic-Api up to 2.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /resource/file/api/sav...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description</strong></p>
<p><span>A vulnerability has been found in Magic-Api up to 2.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /resource/file/api/save?auto=1. The manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249511.</span></p>
<p><strong>References</strong></p>
<ul>
<li><a href="https://github.com/laoquanshi/puppy/blob/main/Magic-Api%20Code%20Execution%20Vulnerability.md" target="_blank" rel="noopener">MISC:https://github.com/laoquanshi/puppy/blob/main/Magic-Api%20Code%20Execution%20Vulnerability.md</a></li>
<li><a href="https://github.com/laoquanshi/puppy/blob/main/Magic-Api%20Code%20Execution%20Vulnerability.md" target="_blank" rel="noopener">URL:https://github.com/laoquanshi/puppy/blob/main/Magic-Api%20Code%20Execution%20Vulnerability.md</a></li>
<li><a href="https://vuldb.com/?ctiid.249511" target="_blank" rel="noopener">MISC:https://vuldb.com/?ctiid.249511</a></li>
<li><a href="https://vuldb.com/?ctiid.249511" target="_blank" rel="noopener">URL:https://vuldb.com/?ctiid.249511</a></li>
<li><a href="https://vuldb.com/?id.249511" target="_blank" rel="noopener">MISC:https://vuldb.com/?id.249511</a></li>
<li><a href="https://vuldb.com/?id.249511" target="_blank" rel="noopener">URL:https://vuldb.com/?id.249511</a></li>
</ul>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>worldlovely</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0196/#post-702</guid>
                    </item>
							        </channel>
        </rss>
		