<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T22:40:47.366986+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/fb6dbb4f-748c-47c2-9418-2066a8a41bfa/export</id>
    <title>fb6dbb4f-748c-47c2-9418-2066a8a41bfa</title>
    <updated>2026-05-03T22:40:47.522818+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fb6dbb4f-748c-47c2-9418-2066a8a41bfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "seen", "source": "https://t.me/cybersecplayground/116", "content": "\ud83d\udea8 Critical Alert: CVE-2024-47051 (CVSS 9.1) \u2013 Mautic RCE &amp;amp; File Deletion Vulnerability \ud83d\udea8\n\n\ud83d\udd25 What is CVE-2024-47051?\nA critical security flaw has been discovered in Mautic (before version 5.2.3) that allows:\n\nRemote Code Execution (RCE): \nAttackers can run arbitrary commands on the server.\nArbitrary File Deletion: Attackers can delete critical files, leading to system compromise or service disruption.\n\n\ud83c\udfaf Impact &amp;amp; Risk\nWidespread Exposure: Over 200,000 organizations rely on Mautic for marketing automation.\nPublic-Facing Instances: Many exposed instances are accessible on the internet, making them high-value targets.\n\nPotential Consequences:\nFull server takeover by exploiting RCE\nDeletion of essential system files leading to denial of service (DoS)\nSensitive data leakage\n\n\ud83d\udd0d Detection &amp;amp; Exploitation\n\ud83d\udcca Hunter Exposure: 64K+ instances found on Hunter.\n\n\ud83d\udd0e Dorks:\n\nFOFA: product=\"Mautic\"\nHunter: product.name=\"Mautic\"\n\n\ud83d\udee1 Mitigation &amp;amp; Fix\n\u2705 Upgrade to Mautic 5.2.3+ immediately.\n\u2705 Restrict access to Mautic instances using firewalls and authentication.\n\u2705 Monitor logs for unusual activities or unauthorized access attempts.\n\u2705 Use Web Application Firewalls (WAFs) to detect and block exploit attempts.\n\n\ud83d\udcf0 References &amp;amp; More Info\n\ud83d\udd17 SecurityOnline Info\n\n\ud83d\udce2 Join us for more security updates! \ud83d\udc49 @cybersecplayground\n\n#Mautic #hunterhow #infosec #infosecurity #OSINT #Vulnerability #cybersecplayground \ud83d\ude80", "creation_timestamp": "2025-03-03T06:08:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fb6dbb4f-748c-47c2-9418-2066a8a41bfa/export"/>
    <published>2025-03-03T06:08:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fdcc4eb8-984e-4b76-b0cb-ad60bd9938a6/export</id>
    <title>fdcc4eb8-984e-4b76-b0cb-ad60bd9938a6</title>
    <updated>2026-05-03T22:40:47.522743+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fdcc4eb8-984e-4b76-b0cb-ad60bd9938a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47056", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqaq7z7pjnp2", "content": "", "creation_timestamp": "2025-05-28T17:32:11.010453Z"}</content>
    <link href="https://db.gcve.eu/sighting/fdcc4eb8-984e-4b76-b0cb-ad60bd9938a6/export"/>
    <published>2025-05-28T17:32:11.010453+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/629c18a3-ebb8-478e-aad9-d2f019573815/export</id>
    <title>629c18a3-ebb8-478e-aad9-d2f019573815</title>
    <updated>2026-05-03T22:40:47.522671+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "629c18a3-ebb8-478e-aad9-d2f019573815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47055", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqat6o76wyp2", "content": "", "creation_timestamp": "2025-05-28T18:24:14.070809Z"}</content>
    <link href="https://db.gcve.eu/sighting/629c18a3-ebb8-478e-aad9-d2f019573815/export"/>
    <published>2025-05-28T18:24:14.070809+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/97debc43-e112-4806-a2b5-b76851c30f3c/export</id>
    <title>97debc43-e112-4806-a2b5-b76851c30f3c</title>
    <updated>2026-05-03T22:40:47.522596+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "97debc43-e112-4806-a2b5-b76851c30f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47057", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqat6w3aezt2", "content": "", "creation_timestamp": "2025-05-28T18:24:23.768503Z"}</content>
    <link href="https://db.gcve.eu/sighting/97debc43-e112-4806-a2b5-b76851c30f3c/export"/>
    <published>2025-05-28T18:24:23.768503+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3ae5db58-9646-4358-8b03-e2235d1e9e48/export</id>
    <title>3ae5db58-9646-4358-8b03-e2235d1e9e48</title>
    <updated>2026-05-03T22:40:47.522524+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3ae5db58-9646-4358-8b03-e2235d1e9e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47055", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgabtmflb2e", "content": "", "creation_timestamp": "2025-05-30T22:01:49.831757Z"}</content>
    <link href="https://db.gcve.eu/sighting/3ae5db58-9646-4358-8b03-e2235d1e9e48/export"/>
    <published>2025-05-30T22:01:49.831757+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d8ee5618-fd3c-4180-8ac7-1de275a53a03/export</id>
    <title>d8ee5618-fd3c-4180-8ac7-1de275a53a03</title>
    <updated>2026-05-03T22:40:47.522448+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d8ee5618-fd3c-4180-8ac7-1de275a53a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47057", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgagqgdxs2r", "content": "", "creation_timestamp": "2025-05-30T22:04:34.523840Z"}</content>
    <link href="https://db.gcve.eu/sighting/d8ee5618-fd3c-4180-8ac7-1de275a53a03/export"/>
    <published>2025-05-30T22:04:34.523840+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8aef9f1e-54e6-4038-a16d-cf932827a6bb/export</id>
    <title>8aef9f1e-54e6-4038-a16d-cf932827a6bb</title>
    <updated>2026-05-03T22:40:47.522364+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8aef9f1e-54e6-4038-a16d-cf932827a6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47056", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgam4t2os2m", "content": "", "creation_timestamp": "2025-05-30T22:07:35.305227Z"}</content>
    <link href="https://db.gcve.eu/sighting/8aef9f1e-54e6-4038-a16d-cf932827a6bb/export"/>
    <published>2025-05-30T22:07:35.305227+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9644e1b6-dfb4-40fc-bed5-544cc1a36a17/export</id>
    <title>9644e1b6-dfb4-40fc-bed5-544cc1a36a17</title>
    <updated>2026-05-03T22:40:47.522269+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9644e1b6-dfb4-40fc-bed5-544cc1a36a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9644e1b6-dfb4-40fc-bed5-544cc1a36a17/export"/>
    <published>2025-08-12T13:33:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/55f76555-af65-42dd-a2a9-9d04f7967c78/export</id>
    <title>55f76555-af65-42dd-a2a9-9d04f7967c78</title>
    <updated>2026-05-03T22:40:47.522146+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "55f76555-af65-42dd-a2a9-9d04f7967c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/55f76555-af65-42dd-a2a9-9d04f7967c78/export"/>
    <published>2025-08-21T03:19:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bb78c376-316f-402b-bb43-8fd1359f44f6/export</id>
    <title>bb78c376-316f-402b-bb43-8fd1359f44f6</title>
    <updated>2026-05-03T22:40:47.518956+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bb78c376-316f-402b-bb43-8fd1359f44f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "published-proof-of-concept", "source": "Telegram/6x5JFB1mh-KsEZivZp3gjSaXJ58VhO2Ttj6R645bZY-KT8s", "content": "", "creation_timestamp": "2025-09-29T15:00:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/bb78c376-316f-402b-bb43-8fd1359f44f6/export"/>
    <published>2025-09-29T15:00:07+00:00</published>
  </entry>
</feed>
