<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T03:33:51.675183+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/fbbe6c66-a291-49e1-b900-4f6b7f7d27d3/export</id>
    <title>fbbe6c66-a291-49e1-b900-4f6b7f7d27d3</title>
    <updated>2026-05-01T03:33:51.869452+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fbbe6c66-a291-49e1-b900-4f6b7f7d27d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljnrbwikfc23", "content": "", "creation_timestamp": "2025-03-05T19:58:29.131049Z"}</content>
    <link href="https://db.gcve.eu/sighting/fbbe6c66-a291-49e1-b900-4f6b7f7d27d3/export"/>
    <published>2025-03-05T19:58:29.131049+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/442d3c88-8b11-4d55-a85b-98e3024ac28f/export</id>
    <title>442d3c88-8b11-4d55-a85b-98e3024ac28f</title>
    <updated>2026-05-01T03:33:51.869385+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "442d3c88-8b11-4d55-a85b-98e3024ac28f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/aimainainnu.bsky.social/post/3ljodi4yzu22p", "content": "", "creation_timestamp": "2025-03-06T01:24:05.669001Z"}</content>
    <link href="https://db.gcve.eu/sighting/442d3c88-8b11-4d55-a85b-98e3024ac28f/export"/>
    <published>2025-03-06T01:24:05.669001+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c3a8a2e7-8f48-4114-b2c1-ecd7c4d00575/export</id>
    <title>c3a8a2e7-8f48-4114-b2c1-ecd7c4d00575</title>
    <updated>2026-05-01T03:33:51.869201+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c3a8a2e7-8f48-4114-b2c1-ecd7c4d00575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljqbppbsn22s", "content": "", "creation_timestamp": "2025-03-06T19:57:50.524986Z"}</content>
    <link href="https://db.gcve.eu/sighting/c3a8a2e7-8f48-4114-b2c1-ecd7c4d00575/export"/>
    <published>2025-03-06T19:57:50.524986+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/15ff8b7f-55ef-493d-8f52-b78fbdcf35db/export</id>
    <title>15ff8b7f-55ef-493d-8f52-b78fbdcf35db</title>
    <updated>2026-05-01T03:33:51.868987+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "15ff8b7f-55ef-493d-8f52-b78fbdcf35db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8042", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43096\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-21T23:04:42.806Z\n\ud83d\udccf Modified: 2025-03-19T13:40:29.299Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2025-01-01", "creation_timestamp": "2025-03-19T13:49:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/15ff8b7f-55ef-493d-8f52-b78fbdcf35db/export"/>
    <published>2025-03-19T13:49:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d7164d31-1628-4679-bf2d-23daeb11b2bc/export</id>
    <title>d7164d31-1628-4679-bf2d-23daeb11b2bc</title>
    <updated>2026-05-01T03:33:51.868935+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d7164d31-1628-4679-bf2d-23daeb11b2bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/nerdontour.bsky.social/post/3loli7xxdls2l", "content": "", "creation_timestamp": "2025-05-07T13:16:53.663909Z"}</content>
    <link href="https://db.gcve.eu/sighting/d7164d31-1628-4679-bf2d-23daeb11b2bc/export"/>
    <published>2025-05-07T13:16:53.663909+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/abf35831-93d4-4618-8a8a-3b423b2804f1/export</id>
    <title>abf35831-93d4-4618-8a8a-3b423b2804f1</title>
    <updated>2026-05-01T03:33:51.868879+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "abf35831-93d4-4618-8a8a-3b423b2804f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43098", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/abf35831-93d4-4618-8a8a-3b423b2804f1/export"/>
    <published>2025-08-14T10:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/606b75e5-4c0f-4c64-9c54-8f84693a92af/export</id>
    <title>606b75e5-4c0f-4c64-9c54-8f84693a92af</title>
    <updated>2026-05-01T03:33:51.868825+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "606b75e5-4c0f-4c64-9c54-8f84693a92af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/606b75e5-4c0f-4c64-9c54-8f84693a92af/export"/>
    <published>2025-08-18T18:31:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/be0975a6-b60c-404e-b02a-394235d3d4a7/export</id>
    <title>be0975a6-b60c-404e-b02a-394235d3d4a7</title>
    <updated>2026-05-01T03:33:51.868768+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "be0975a6-b60c-404e-b02a-394235d3d4a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ba03b550867df29f318d54ffcd9bb7f3", "content": "", "creation_timestamp": "2025-09-03T17:21:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/be0975a6-b60c-404e-b02a-394235d3d4a7/export"/>
    <published>2025-09-03T17:21:44+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/51649b8a-ff5c-4fe1-9475-29cd1e26ed42/export</id>
    <title>51649b8a-ff5c-4fe1-9475-29cd1e26ed42</title>
    <updated>2026-05-01T03:33:51.868683+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "51649b8a-ff5c-4fe1-9475-29cd1e26ed42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1ec72d66-1291-4be7-8894-105a053925fa", "content": "", "creation_timestamp": "2026-02-02T12:26:24.683122Z"}</content>
    <link href="https://db.gcve.eu/sighting/51649b8a-ff5c-4fe1-9475-29cd1e26ed42/export"/>
    <published>2026-02-02T12:26:24.683122+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1ca87937-8e96-4361-8677-8ff2ee450c3a/export</id>
    <title>1ca87937-8e96-4361-8677-8ff2ee450c3a</title>
    <updated>2026-05-01T03:33:51.866421+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1ca87937-8e96-4361-8677-8ff2ee450c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1ec72d66-1291-4be7-8894-105a053925fa", "content": "", "creation_timestamp": "2026-02-02T12:26:24.683122Z"}</content>
    <link href="https://db.gcve.eu/sighting/1ca87937-8e96-4361-8677-8ff2ee450c3a/export"/>
    <published>2026-02-02T12:26:24.683122+00:00</published>
  </entry>
</feed>
