<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T13:10:10.126325+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/61ca1981-02dd-40c4-9282-44abb88ea23c/export</id>
    <title>61ca1981-02dd-40c4-9282-44abb88ea23c</title>
    <updated>2026-05-01T13:10:10.465044+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "61ca1981-02dd-40c4-9282-44abb88ea23c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48008", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113645796954137068", "content": "", "creation_timestamp": "2024-12-13T13:40:44.282624Z"}</content>
    <link href="https://db.gcve.eu/sighting/61ca1981-02dd-40c4-9282-44abb88ea23c/export"/>
    <published>2024-12-13T13:40:44.282624+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/eb5290f3-454c-46a2-a54e-cc2ea6a0f4e7/export</id>
    <title>eb5290f3-454c-46a2-a54e-cc2ea6a0f4e7</title>
    <updated>2026-05-01T13:10:10.464972+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "eb5290f3-454c-46a2-a54e-cc2ea6a0f4e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48007", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113645905370786684", "content": "", "creation_timestamp": "2024-12-13T14:08:18.512697Z"}</content>
    <link href="https://db.gcve.eu/sighting/eb5290f3-454c-46a2-a54e-cc2ea6a0f4e7/export"/>
    <published>2024-12-13T14:08:18.512697+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0e7fcf74-06b6-487b-a529-5d863b577c0d/export</id>
    <title>0e7fcf74-06b6-487b-a529-5d863b577c0d</title>
    <updated>2026-05-01T13:10:10.464773+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0e7fcf74-06b6-487b-a529-5d863b577c0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48007", "type": "seen", "source": "https://t.me/cvedetector/12869", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48007 - Dell RecoverPoint for Virtual Machines Hard-Coded Credentials Remote Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-48007 \nPublished : Dec. 13, 2024, 2:15 p.m. | 24\u00a0minutes ago \nDescription : Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. A Remote unauthenticated attacker could potentially exploit this vulnerability by gaining access to the source code, easily retrieving these secrets and reusing them to access the system leading to gaining access to unauthorized data. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T15:46:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0e7fcf74-06b6-487b-a529-5d863b577c0d/export"/>
    <published>2024-12-13T15:46:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/116df8c4-2f78-40c7-8a9a-c49dc7e84ffb/export</id>
    <title>116df8c4-2f78-40c7-8a9a-c49dc7e84ffb</title>
    <updated>2026-05-01T13:10:10.464500+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "116df8c4-2f78-40c7-8a9a-c49dc7e84ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48008", "type": "seen", "source": "https://t.me/cvedetector/12870", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48008 - Dell RecoverPoint for Virtual Machines OS Command Injection vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48008 \nPublished : Dec. 13, 2024, 2:15 p.m. | 23\u00a0minutes ago \nDescription : Dell RecoverPoint for Virtual Machines 6.0.x contains a OS Command Injection vulnerability. An Low privileged remote attacker could potentially exploit this vulnerability leading to information disclosure ,allowing of unintended actions like reading files that may contain sensitive information \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T15:46:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/116df8c4-2f78-40c7-8a9a-c49dc7e84ffb/export"/>
    <published>2024-12-13T15:46:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3f096f68-eff4-4c48-9802-f4cc6e1468be/export</id>
    <title>3f096f68-eff4-4c48-9802-f4cc6e1468be</title>
    <updated>2026-05-01T13:10:10.463067+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3f096f68-eff4-4c48-9802-f4cc6e1468be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4800", "type": "seen", "source": "Telegram/FV1jK0-AZGKbHAX-abkhwHTDkJEPcNArRyJsoNbYW6rF7lpL", "content": "", "creation_timestamp": "2025-02-14T10:03:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3f096f68-eff4-4c48-9802-f4cc6e1468be/export"/>
    <published>2025-02-14T10:03:11+00:00</published>
  </entry>
</feed>
