<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-14T19:13:40.319742+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/7e28c3d1-1191-46e2-a504-db300b868e86/export</id>
    <title>7e28c3d1-1191-46e2-a504-db300b868e86</title>
    <updated>2026-05-14T19:13:40.558510+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7e28c3d1-1191-46e2-a504-db300b868e86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49673", "type": "seen", "source": "https://t.me/cvedetector/9285", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49673 - \"Van Abel LaTeX2HTML Cross-site Scripting\"\", \n  \"Content\": \"CVE ID : CVE-2024-49673 \nPublished : Oct. 29, 2024, 11:15 a.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Van Abel LaTeX2HTML allows Reflected XSS.This issue affects LaTeX2HTML: from n/a through 2.5.4. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T13:05:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7e28c3d1-1191-46e2-a504-db300b868e86/export"/>
    <published>2024-10-29T13:05:48+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/56cf2f64-b47e-4b6a-8953-2e334a22677f/export</id>
    <title>56cf2f64-b47e-4b6a-8953-2e334a22677f</title>
    <updated>2026-05-14T19:13:40.558428+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "56cf2f64-b47e-4b6a-8953-2e334a22677f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49678", "type": "seen", "source": "https://t.me/cvedetector/9286", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49678 - \"Jinwen js Reflected XSS\"\", \n  \"Content\": \"CVE ID : CVE-2024-49678 \nPublished : Oct. 29, 2024, 11:15 a.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jinwen js allows Reflected XSS.This issue affects js paper: from n/a through 2.5.7. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T13:05:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/56cf2f64-b47e-4b6a-8953-2e334a22677f/export"/>
    <published>2024-10-29T13:05:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b95fb0ce-1e05-49ce-bb2e-9d53dba284df/export</id>
    <title>b95fb0ce-1e05-49ce-bb2e-9d53dba284df</title>
    <updated>2026-05-14T19:13:40.558344+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b95fb0ce-1e05-49ce-bb2e-9d53dba284df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49679", "type": "seen", "source": "https://t.me/cvedetector/9287", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49679 - WPKoi Templates for Elementor Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49679 \nPublished : Oct. 29, 2024, 11:15 a.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPKoi WPKoi Templates for Elementor allows Stored XSS.This issue affects WPKoi Templates for Elementor: from n/a through 3.1.0. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T13:05:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b95fb0ce-1e05-49ce-bb2e-9d53dba284df/export"/>
    <published>2024-10-29T13:05:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fd5ef869-a750-444a-8010-6307cea53d53/export</id>
    <title>fd5ef869-a750-444a-8010-6307cea53d53</title>
    <updated>2026-05-14T19:13:40.558257+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fd5ef869-a750-444a-8010-6307cea53d53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49674", "type": "seen", "source": "https://t.me/cvedetector/9498", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49674 - Lukas Huser EKC Tournament Manager CSRF Web Shell Upload\", \n  \"Content\": \"CVE ID : CVE-2024-49674 \nPublished : Oct. 31, 2024, 10:15 a.m. | 32\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Lukas Huser EKC Tournament Manager allows Upload a Web Shell to a Web Server.This issue affects EKC Tournament Manager: from n/a through 2.2.1. \nSeverity: 9.6 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-31T11:55:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fd5ef869-a750-444a-8010-6307cea53d53/export"/>
    <published>2024-10-31T11:55:48+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7c129250-a458-4334-acac-a79c905abab0/export</id>
    <title>7c129250-a458-4334-acac-a79c905abab0</title>
    <updated>2026-05-14T19:13:40.558178+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7c129250-a458-4334-acac-a79c905abab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49671", "type": "seen", "source": "MISP/371508bd-549b-44db-871c-2fd5e0bcd09e", "content": "", "creation_timestamp": "2024-11-07T13:07:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7c129250-a458-4334-acac-a79c905abab0/export"/>
    <published>2024-11-07T13:07:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ec2366ce-9404-48fb-ad9b-0687e3e3e89c/export</id>
    <title>ec2366ce-9404-48fb-ad9b-0687e3e3e89c</title>
    <updated>2026-05-14T19:13:40.558087+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ec2366ce-9404-48fb-ad9b-0687e3e3e89c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49677", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113673652181175453", "content": "", "creation_timestamp": "2024-12-18T11:44:41.184766Z"}</content>
    <link href="https://db.gcve.eu/sighting/ec2366ce-9404-48fb-ad9b-0687e3e3e89c/export"/>
    <published>2024-12-18T11:44:41.184766+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6897e93d-ba09-47d3-add6-8bfc06997eb1/export</id>
    <title>6897e93d-ba09-47d3-add6-8bfc06997eb1</title>
    <updated>2026-05-14T19:13:40.558000+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6897e93d-ba09-47d3-add6-8bfc06997eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49677", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113673666322197224", "content": "", "creation_timestamp": "2024-12-18T11:48:16.845438Z"}</content>
    <link href="https://db.gcve.eu/sighting/6897e93d-ba09-47d3-add6-8bfc06997eb1/export"/>
    <published>2024-12-18T11:48:16.845438+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2b102c05-6f5e-4a1b-bfa4-7e32066d7595/export</id>
    <title>2b102c05-6f5e-4a1b-bfa4-7e32066d7595</title>
    <updated>2026-05-14T19:13:40.557881+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2b102c05-6f5e-4a1b-bfa4-7e32066d7595", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49677", "type": "seen", "source": "https://t.me/cvedetector/13197", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49677 - Bootstrap Buttons Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-49677 \nPublished : Dec. 18, 2024, 12:15 p.m. | 23\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Cramer Bootstrap Buttons allows Reflected XSS.This issue affects Bootstrap Buttons: from n/a through 1.2. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T13:41:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2b102c05-6f5e-4a1b-bfa4-7e32066d7595/export"/>
    <published>2024-12-18T13:41:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5f4bb06d-42e2-44df-a972-f7284a9ac6cd/export</id>
    <title>5f4bb06d-42e2-44df-a972-f7284a9ac6cd</title>
    <updated>2026-05-14T19:13:40.556961+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5f4bb06d-42e2-44df-a972-f7284a9ac6cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4967", "type": "seen", "source": "Telegram/xkQmb77V0vJApdBwPo7CkWw7WD-4tHy8iY9a4o8rtS8o6-nn", "content": "", "creation_timestamp": "2025-02-14T09:46:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5f4bb06d-42e2-44df-a972-f7284a9ac6cd/export"/>
    <published>2025-02-14T09:46:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8c1d7f0c-4269-418d-9edc-3856881f02ec/export</id>
    <title>8c1d7f0c-4269-418d-9edc-3856881f02ec</title>
    <updated>2026-05-14T19:13:40.555028+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "8c1d7f0c-4269-418d-9edc-3856881f02ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-49675", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mikoy57al72v", "content": "", "creation_timestamp": "2026-04-03T02:40:09.542232Z"}</content>
    <link href="https://db.gcve.eu/sighting/8c1d7f0c-4269-418d-9edc-3856881f02ec/export"/>
    <published>2026-04-03T02:40:09.542232+00:00</published>
  </entry>
</feed>
