<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-16T22:46:43.166539+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/9bdaef63-0ec6-4550-9e94-262e77358bd2/export</id>
    <title>9bdaef63-0ec6-4550-9e94-262e77358bd2</title>
    <updated>2026-05-16T22:46:43.536228+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9bdaef63-0ec6-4550-9e94-262e77358bd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46471", "type": "seen", "source": "https://t.me/cvedetector/6542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46471 - CodeAstro Membership Management System Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46471 \nPublished : Sept. 27, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : The Directory Listing in /uploads/ Folder in CodeAstro Membership Management System 1.0 exposes the structure and contents of directories, potentially revealing sensitive information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T18:24:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9bdaef63-0ec6-4550-9e94-262e77358bd2/export"/>
    <published>2024-09-27T18:24:18+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/99c72323-ac8e-47ec-b703-f8553796f915/export</id>
    <title>99c72323-ac8e-47ec-b703-f8553796f915</title>
    <updated>2026-05-16T22:46:43.536097+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "99c72323-ac8e-47ec-b703-f8553796f915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46472", "type": "seen", "source": "https://t.me/cvedetector/6543", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46472 - CodeAstro Membership Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46472 \nPublished : Sept. 27, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection via the parameter 'email' in the Login Page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T18:24:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/99c72323-ac8e-47ec-b703-f8553796f915/export"/>
    <published>2024-09-27T18:24:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2568a17c-4d1d-4e6d-aeaa-7cb7be781b08/export</id>
    <title>2568a17c-4d1d-4e6d-aeaa-7cb7be781b08</title>
    <updated>2026-05-16T22:46:43.535972+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2568a17c-4d1d-4e6d-aeaa-7cb7be781b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46475", "type": "seen", "source": "https://t.me/cvedetector/6659", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46475 - Metronic Admin Dashboard Template Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-46475 \nPublished : Sept. 30, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : A reflected cross-site scripting (XSS) vulnerability on the homepage of Metronic Admin Dashboard Template v2.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-30T19:09:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2568a17c-4d1d-4e6d-aeaa-7cb7be781b08/export"/>
    <published>2024-09-30T19:09:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b73b6170-5e61-4145-91fd-bf09c57be010/export</id>
    <title>b73b6170-5e61-4145-91fd-bf09c57be010</title>
    <updated>2026-05-16T22:46:43.535847+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b73b6170-5e61-4145-91fd-bf09c57be010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46478", "type": "seen", "source": "https://t.me/cvedetector/8826", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46478 - \"HTMLDOC Buffer Overflow Vulnerability in parse_pre function\"\", \n  \"Content\": \"CVE ID : CVE-2024-46478 \nPublished : Oct. 24, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : HTMLDOC v1.9.18 contains a buffer overflow in parse_pre function,ps-pdf.cxx:5681. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:00:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b73b6170-5e61-4145-91fd-bf09c57be010/export"/>
    <published>2024-10-24T21:00:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9ab15817-31f5-408b-93fe-9a5880f9bfe7/export</id>
    <title>9ab15817-31f5-408b-93fe-9a5880f9bfe7</title>
    <updated>2026-05-16T22:46:43.535729+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9ab15817-31f5-408b-93fe-9a5880f9bfe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113822351287174035", "content": "", "creation_timestamp": "2025-01-13T18:00:49.417839Z"}</content>
    <link href="https://db.gcve.eu/sighting/9ab15817-31f5-408b-93fe-9a5880f9bfe7/export"/>
    <published>2025-01-13T18:00:49.417839+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3f955ef3-9cc9-4809-ba07-4bb451b9bb64/export</id>
    <title>3f955ef3-9cc9-4809-ba07-4bb451b9bb64</title>
    <updated>2026-05-16T22:46:43.535610+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3f955ef3-9cc9-4809-ba07-4bb451b9bb64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113822538846167508", "content": "", "creation_timestamp": "2025-01-13T18:48:37.544880Z"}</content>
    <link href="https://db.gcve.eu/sighting/3f955ef3-9cc9-4809-ba07-4bb451b9bb64/export"/>
    <published>2025-01-13T18:48:37.544880+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4f1f0768-b0e8-4b88-b02b-f95b5b51c52e/export</id>
    <title>4f1f0768-b0e8-4b88-b02b-f95b5b51c52e</title>
    <updated>2026-05-16T22:46:43.535470+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4f1f0768-b0e8-4b88-b02b-f95b5b51c52e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://t.me/cvedetector/15165", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46479 - Venki Supravizio BPM Remote File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46479 \nPublished : Jan. 13, 2025, 6:15 p.m. | 43\u00a0minutes ago \nDescription : Venki Supravizio BPM through 18.0.1 was discovered to contain an arbitrary file upload vulnerability. An authenticated attacker may upload a malicious file, leading to remote code execution. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T20:25:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4f1f0768-b0e8-4b88-b02b-f95b5b51c52e/export"/>
    <published>2025-01-13T20:25:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/47c9d866-c140-4ae5-bf67-c9b4c15db6b8/export</id>
    <title>47c9d866-c140-4ae5-bf67-c9b4c15db6b8</title>
    <updated>2026-05-16T22:46:43.535337+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "47c9d866-c140-4ae5-bf67-c9b4c15db6b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfpuitub252e", "content": "", "creation_timestamp": "2025-01-14T18:20:29.799210Z"}</content>
    <link href="https://db.gcve.eu/sighting/47c9d866-c140-4ae5-bf67-c9b4c15db6b8/export"/>
    <published>2025-01-14T18:20:29.799210+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5de9e974-585d-4da7-917c-28cebc65d2de/export</id>
    <title>5de9e974-585d-4da7-917c-28cebc65d2de</title>
    <updated>2026-05-16T22:46:43.535133+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5de9e974-585d-4da7-917c-28cebc65d2de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4647", "type": "seen", "source": "Telegram/iJ5TTHatIMBvDs1Ju3jKgMw7tjcdMSJqKvNOBAPCkOcdN71P", "content": "", "creation_timestamp": "2025-02-19T19:14:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5de9e974-585d-4da7-917c-28cebc65d2de/export"/>
    <published>2025-02-19T19:14:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bf292c7e-b7ee-4014-a174-645b348df79f/export</id>
    <title>bf292c7e-b7ee-4014-a174-645b348df79f</title>
    <updated>2026-05-16T22:46:43.533290+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bf292c7e-b7ee-4014-a174-645b348df79f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46478", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3met4f2wbfk22", "content": "", "creation_timestamp": "2026-02-14T13:20:36.619490Z"}</content>
    <link href="https://db.gcve.eu/sighting/bf292c7e-b7ee-4014-a174-645b348df79f/export"/>
    <published>2026-02-14T13:20:36.619490+00:00</published>
  </entry>
</feed>
