<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-17T02:57:13.335522+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d063fca0-b082-4be8-a99d-5d82f123d8ec/export</id>
    <title>d063fca0-b082-4be8-a99d-5d82f123d8ec</title>
    <updated>2026-05-17T02:57:13.868878+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d063fca0-b082-4be8-a99d-5d82f123d8ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21632", "type": "seen", "source": "https://t.me/ctinow/162097", "content": "https://ift.tt/urpbEgw\nCVE-2024-21632", "creation_timestamp": "2024-01-02T23:26:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d063fca0-b082-4be8-a99d-5d82f123d8ec/export"/>
    <published>2024-01-02T23:26:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a7f4eedf-ec71-40d7-9951-b5fda9a57738/export</id>
    <title>a7f4eedf-ec71-40d7-9951-b5fda9a57738</title>
    <updated>2026-05-17T02:57:13.868781+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a7f4eedf-ec71-40d7-9951-b5fda9a57738", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21632", "type": "seen", "source": "https://t.me/cibsecurity/74215", "content": "\u203c\ufe0fCVE-2024-21632\u203c\ufe0f\n\nomniauthmicrosoftgraph provides an Omniauth strategy for the Microsoft Graph API. Prior to versions 2.0.0, the implementation did not validate the legitimacy of the email attribute of the user nor did it givedocument an option to do so, making it susceptible to nOAuth misconfiguration in cases when the email is used as a trusted user identifier. This could lead to account takeover. Version 2.0.0 contains a fix for this issue. \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:38:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a7f4eedf-ec71-40d7-9951-b5fda9a57738/export"/>
    <published>2024-01-03T01:38:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/aa075e81-8904-4586-a3b0-f1e2c053345e/export</id>
    <title>aa075e81-8904-4586-a3b0-f1e2c053345e</title>
    <updated>2026-05-17T02:57:13.868659+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "aa075e81-8904-4586-a3b0-f1e2c053345e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21632", "type": "seen", "source": "https://t.me/ctinow/165367", "content": "https://ift.tt/fpwINxl\nCVE-2024-21632 Exploit", "creation_timestamp": "2024-01-09T21:16:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/aa075e81-8904-4586-a3b0-f1e2c053345e/export"/>
    <published>2024-01-09T21:16:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cf41e18a-aa36-4b75-beaa-3a33253bd928/export</id>
    <title>cf41e18a-aa36-4b75-beaa-3a33253bd928</title>
    <updated>2026-05-17T02:57:13.866696+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cf41e18a-aa36-4b75-beaa-3a33253bd928", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-21632", "type": "seen", "source": "https://t.me/ctinow/171784", "content": "https://ift.tt/FJQfVkb\nCVE-2024-21632 | synth omniauth-microsoft_graph up to 1.x email improper authentication (GHSA-5g66-628f-7cvj)", "creation_timestamp": "2024-01-23T09:21:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cf41e18a-aa36-4b75-beaa-3a33253bd928/export"/>
    <published>2024-01-23T09:21:29+00:00</published>
  </entry>
</feed>
