<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-16T07:19:23.933083+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/cb05517b-8d31-4959-99e2-69ea5437eb37/export</id>
    <title>cb05517b-8d31-4959-99e2-69ea5437eb37</title>
    <updated>2026-05-16T07:19:24.253149+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cb05517b-8d31-4959-99e2-69ea5437eb37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50512", "type": "seen", "source": "https://t.me/cvedetector/9406", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50512 - Posti Posti Shipping Sensitive Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-50512 \nPublished : Oct. 30, 2024, 8:15 a.m. | 37\u00a0minutes ago \nDescription : Generation of Error Message Containing Sensitive Information vulnerability in Posti Posti Shipping allows Retrieve Embedded Sensitive Data.This issue affects Posti Shipping: from n/a through 3.10.2. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T10:00:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cb05517b-8d31-4959-99e2-69ea5437eb37/export"/>
    <published>2024-10-30T10:00:41+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8fdfe832-ba0d-47de-9219-6c20ed78cdd8/export</id>
    <title>8fdfe832-ba0d-47de-9219-6c20ed78cdd8</title>
    <updated>2026-05-16T07:19:24.253073+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8fdfe832-ba0d-47de-9219-6c20ed78cdd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50513", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113510655127120561", "content": "", "creation_timestamp": "2024-11-19T16:52:23.453632Z"}</content>
    <link href="https://db.gcve.eu/sighting/8fdfe832-ba0d-47de-9219-6c20ed78cdd8/export"/>
    <published>2024-11-19T16:52:23.453632+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9033d3f6-c3c1-490b-b824-f7afc24af4ca/export</id>
    <title>9033d3f6-c3c1-490b-b824-f7afc24af4ca</title>
    <updated>2026-05-16T07:19:24.253000+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9033d3f6-c3c1-490b-b824-f7afc24af4ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50514", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113510655140914375", "content": "", "creation_timestamp": "2024-11-19T16:52:23.649052Z"}</content>
    <link href="https://db.gcve.eu/sighting/9033d3f6-c3c1-490b-b824-f7afc24af4ca/export"/>
    <published>2024-11-19T16:52:23.649052+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9ff4600b-2e8b-47a9-90d4-243fbfb18534/export</id>
    <title>9ff4600b-2e8b-47a9-90d4-243fbfb18534</title>
    <updated>2026-05-16T07:19:24.252918+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9ff4600b-2e8b-47a9-90d4-243fbfb18534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50515", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113510655154439782", "content": "", "creation_timestamp": "2024-11-19T16:52:23.929955Z"}</content>
    <link href="https://db.gcve.eu/sighting/9ff4600b-2e8b-47a9-90d4-243fbfb18534/export"/>
    <published>2024-11-19T16:52:23.929955+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cdb0ebea-8a03-472c-886f-e9ee1d1d876b/export</id>
    <title>cdb0ebea-8a03-472c-886f-e9ee1d1d876b</title>
    <updated>2026-05-16T07:19:24.252830+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cdb0ebea-8a03-472c-886f-e9ee1d1d876b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50516", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113510714179641574", "content": "", "creation_timestamp": "2024-11-19T17:07:24.484876Z"}</content>
    <link href="https://db.gcve.eu/sighting/cdb0ebea-8a03-472c-886f-e9ee1d1d876b/export"/>
    <published>2024-11-19T17:07:24.484876+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6f02d293-0e1e-46f9-a035-8501d72f1303/export</id>
    <title>6f02d293-0e1e-46f9-a035-8501d72f1303</title>
    <updated>2026-05-16T07:19:24.252708+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6f02d293-0e1e-46f9-a035-8501d72f1303", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50517", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113510714194112694", "content": "", "creation_timestamp": "2024-11-19T17:07:25.044031Z"}</content>
    <link href="https://db.gcve.eu/sighting/6f02d293-0e1e-46f9-a035-8501d72f1303/export"/>
    <published>2024-11-19T17:07:25.044031+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c435a883-62a7-4bbd-a6c0-e2f16580c91c/export</id>
    <title>c435a883-62a7-4bbd-a6c0-e2f16580c91c</title>
    <updated>2026-05-16T07:19:24.252492+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c435a883-62a7-4bbd-a6c0-e2f16580c91c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50518", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113510714208795924", "content": "", "creation_timestamp": "2024-11-19T17:07:25.085758Z"}</content>
    <link href="https://db.gcve.eu/sighting/c435a883-62a7-4bbd-a6c0-e2f16580c91c/export"/>
    <published>2024-11-19T17:07:25.085758+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/500ea773-b9e1-49e8-b1a9-ce2e045d2a79/export</id>
    <title>500ea773-b9e1-49e8-b1a9-ce2e045d2a79</title>
    <updated>2026-05-16T07:19:24.252268+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "500ea773-b9e1-49e8-b1a9-ce2e045d2a79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50519", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113510714222745081", "content": "", "creation_timestamp": "2024-11-19T17:07:25.270217Z"}</content>
    <link href="https://db.gcve.eu/sighting/500ea773-b9e1-49e8-b1a9-ce2e045d2a79/export"/>
    <published>2024-11-19T17:07:25.270217+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/811e92d6-2152-46f7-b0a4-6be17ecde239/export</id>
    <title>811e92d6-2152-46f7-b0a4-6be17ecde239</title>
    <updated>2026-05-16T07:19:24.251971+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "811e92d6-2152-46f7-b0a4-6be17ecde239", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50510", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113783260052432058", "content": "", "creation_timestamp": "2025-01-06T20:19:24.629968Z"}</content>
    <link href="https://db.gcve.eu/sighting/811e92d6-2152-46f7-b0a4-6be17ecde239/export"/>
    <published>2025-01-06T20:19:24.629968+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cbbb7901-5651-4216-8cff-12f66572e9e0/export</id>
    <title>cbbb7901-5651-4216-8cff-12f66572e9e0</title>
    <updated>2026-05-16T07:19:24.249455+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cbbb7901-5651-4216-8cff-12f66572e9e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5051", "type": "seen", "source": "Telegram/hsXTP6quqWssFdjmhwnXZ72csfp2fhQ8MlE33JR9Q8rByZET", "content": "", "creation_timestamp": "2025-02-14T09:46:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cbbb7901-5651-4216-8cff-12f66572e9e0/export"/>
    <published>2025-02-14T09:46:59+00:00</published>
  </entry>
</feed>
