<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-17T06:53:38.350957+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/39fab709-5dbf-4e82-a543-c5f5f555c395/export</id>
    <title>39fab709-5dbf-4e82-a543-c5f5f555c395</title>
    <updated>2026-05-17T06:53:38.807944+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "39fab709-5dbf-4e82-a543-c5f5f555c395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5110", "type": "seen", "source": "Telegram/BGMaEjXiKuBreu6Lw_yNci6rtGNvq1ugUXmxO8I7xlZRq4JE", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/39fab709-5dbf-4e82-a543-c5f5f555c395/export"/>
    <published>2025-02-21T22:10:44+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/39335085-f603-4ad7-88f0-255d6a20502b/export</id>
    <title>39335085-f603-4ad7-88f0-255d6a20502b</title>
    <updated>2026-05-17T06:53:38.807867+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "39335085-f603-4ad7-88f0-255d6a20502b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51106", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16860", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51106\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in the component mcgs/admin/aboutus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle parameter.\n\ud83d\udccf Published: 2025-05-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-19T14:23:31.545Z\n\ud83d\udd17 References:\n1. https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-About%20Us.pdf", "creation_timestamp": "2025-05-19T14:38:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/39335085-f603-4ad7-88f0-255d6a20502b/export"/>
    <published>2025-05-19T14:38:48+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1fddc370-847b-4f34-96c3-43041217ed48/export</id>
    <title>1fddc370-847b-4f34-96c3-43041217ed48</title>
    <updated>2026-05-17T06:53:38.807791+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1fddc370-847b-4f34-96c3-43041217ed48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51101", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu5y5bto72j", "content": "", "creation_timestamp": "2025-05-23T17:32:41.777949Z"}</content>
    <link href="https://db.gcve.eu/sighting/1fddc370-847b-4f34-96c3-43041217ed48/export"/>
    <published>2025-05-23T17:32:41.777949+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8c877e43-9fc5-4929-bf44-25a2ee5ab44e/export</id>
    <title>8c877e43-9fc5-4929-bf44-25a2ee5ab44e</title>
    <updated>2026-05-17T06:53:38.807711+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8c877e43-9fc5-4929-bf44-25a2ee5ab44e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51107", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu6aqzoyh2k", "content": "", "creation_timestamp": "2025-05-23T17:37:30.879540Z"}</content>
    <link href="https://db.gcve.eu/sighting/8c877e43-9fc5-4929-bf44-25a2ee5ab44e/export"/>
    <published>2025-05-23T17:37:30.879540+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d86efec0-0f34-4401-bf1b-4c107253c28e/export</id>
    <title>d86efec0-0f34-4401-bf1b-4c107253c28e</title>
    <updated>2026-05-17T06:53:38.807625+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d86efec0-0f34-4401-bf1b-4c107253c28e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51108", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu6fnfon222", "content": "", "creation_timestamp": "2025-05-23T17:40:14.827128Z"}</content>
    <link href="https://db.gcve.eu/sighting/d86efec0-0f34-4401-bf1b-4c107253c28e/export"/>
    <published>2025-05-23T17:40:14.827128+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/67fd6e49-3423-4142-838c-f2544079a22e/export</id>
    <title>67fd6e49-3423-4142-838c-f2544079a22e</title>
    <updated>2026-05-17T06:53:38.807539+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "67fd6e49-3423-4142-838c-f2544079a22e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51103", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu7idg6xz2q", "content": "", "creation_timestamp": "2025-05-23T17:59:38.719368Z"}</content>
    <link href="https://db.gcve.eu/sighting/67fd6e49-3423-4142-838c-f2544079a22e/export"/>
    <published>2025-05-23T17:59:38.719368+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/be6edbb3-17ca-4240-90cd-47ce7dbe9a39/export</id>
    <title>be6edbb3-17ca-4240-90cd-47ce7dbe9a39</title>
    <updated>2026-05-17T06:53:38.807423+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "be6edbb3-17ca-4240-90cd-47ce7dbe9a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51102", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17456", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51102\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: PHPGURUKUL Student Management System using PHP and MySQL v1 was discovered to contain multiple SQL injection vulnerabilities at /studentrecordms/login.php via the username and password parameters.\n\ud83d\udccf Published: 2025-05-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-23T18:43:44.845Z\n\ud83d\udd17 References:\n1. https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Student%20Management%20System/SQL%20Injection%20-%20admin%20login.pdf", "creation_timestamp": "2025-05-23T19:45:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/be6edbb3-17ca-4240-90cd-47ce7dbe9a39/export"/>
    <published>2025-05-23T19:45:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d25cdf63-4f06-4592-a47f-817221411090/export</id>
    <title>d25cdf63-4f06-4592-a47f-817221411090</title>
    <updated>2026-05-17T06:53:38.806019+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d25cdf63-4f06-4592-a47f-817221411090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpum32zpis27", "content": "", "creation_timestamp": "2025-05-23T21:44:52.654895Z"}</content>
    <link href="https://db.gcve.eu/sighting/d25cdf63-4f06-4592-a47f-817221411090/export"/>
    <published>2025-05-23T21:44:52.654895+00:00</published>
  </entry>
</feed>
