<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T03:04:42.193674+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/8b374c2a-fb5d-4b9d-929d-a462108bc150/export</id>
    <title>8b374c2a-fb5d-4b9d-929d-a462108bc150</title>
    <updated>2026-05-01T03:04:42.564015+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8b374c2a-fb5d-4b9d-929d-a462108bc150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12450", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10424", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12450\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: In infiniflow/ragflow versions 0.12.0, the `web_crawl` function in `document_app.py` contains multiple vulnerabilities. The function does not filter URL parameters, allowing attackers to exploit Full Read SSRF by accessing internal network addresses and viewing their content through the generated PDF files. Additionally, the lack of restrictions on the file protocol enables Arbitrary File Read, allowing attackers to read server files. Furthermore, the use of an outdated Chromium headless version with --no-sandbox mode enabled makes the application susceptible to Remote Code Execution (RCE) via known Chromium v8 vulnerabilities. These issues are resolved in version 0.14.0.\n\ud83d\udccf Published: 2025-03-20T10:11:05.133Z\n\ud83d\udccf Modified: 2025-04-04T08:45:39.429Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/da06360c-87c3-4ba9-be67-29f6eff9d44a\n2. https://github.com/infiniflow/ragflow/commit/3faae0b2c2f8a26233ee1442ba04874b3406f6e9", "creation_timestamp": "2025-04-04T09:35:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8b374c2a-fb5d-4b9d-929d-a462108bc150/export"/>
    <published>2025-04-04T09:35:55+00:00</published>
  </entry>
</feed>
