<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-17T02:57:29.910050+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef/export</id>
    <title>e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef</title>
    <updated>2026-05-17T02:57:30.105261+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5113", "type": "seen", "source": "Telegram/OE92hMtDo0Ldfy3Zq_SV2j3A7EyX_CyNZtR1RN6FwvoL06zp", "content": "", "creation_timestamp": "2025-02-21T22:10:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef/export"/>
    <published>2025-02-21T22:10:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/28e1955f-082e-4a9d-aa9c-c8b52c2df9ca/export</id>
    <title>28e1955f-082e-4a9d-aa9c-c8b52c2df9ca</title>
    <updated>2026-05-17T02:57:30.105210+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "28e1955f-082e-4a9d-aa9c-c8b52c2df9ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078000233980303", "content": "", "creation_timestamp": "2025-02-27T21:35:43.106543Z"}</content>
    <link href="https://db.gcve.eu/sighting/28e1955f-082e-4a9d-aa9c-c8b52c2df9ca/export"/>
    <published>2025-02-27T21:35:43.106543+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/449635dc-9aad-4e7a-8f47-94cbd53b62b2/export</id>
    <title>449635dc-9aad-4e7a-8f47-94cbd53b62b2</title>
    <updated>2026-05-17T02:57:30.105161+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "449635dc-9aad-4e7a-8f47-94cbd53b62b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078000233980303", "content": "", "creation_timestamp": "2025-02-27T21:35:43.224307Z"}</content>
    <link href="https://db.gcve.eu/sighting/449635dc-9aad-4e7a-8f47-94cbd53b62b2/export"/>
    <published>2025-02-27T21:35:43.224307+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cc16800b-ea5a-4831-a280-2191e9856852/export</id>
    <title>cc16800b-ea5a-4831-a280-2191e9856852</title>
    <updated>2026-05-17T02:57:30.105096+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cc16800b-ea5a-4831-a280-2191e9856852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://t.me/cvedetector/19072", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51138 - TP-Link Vigor TR069 STUN Server Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51138 \nPublished : Feb. 27, 2025, 9:15 p.m. | 21\u00a0minutes ago \nDescription : Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T23:26:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cc16800b-ea5a-4831-a280-2191e9856852/export"/>
    <published>2025-02-27T23:26:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/35fdba15-ea27-4d94-92db-80a2220f3a61/export</id>
    <title>35fdba15-ea27-4d94-92db-80a2220f3a61</title>
    <updated>2026-05-17T02:57:30.105036+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "35fdba15-ea27-4d94-92db-80a2220f3a61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://t.me/cvedetector/19073", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51139 - Netgear Vigor Router Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51139 \nPublished : Feb. 27, 2025, 9:15 p.m. | 21\u00a0minutes ago \nDescription : Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the \"Content-Length\" header of HTTP POST requests. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T23:26:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/35fdba15-ea27-4d94-92db-80a2220f3a61/export"/>
    <published>2025-02-27T23:26:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f/export</id>
    <title>f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f</title>
    <updated>2026-05-17T02:57:30.104970+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5921", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51139\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the \"Content-Length\" header of HTTP POST requests.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T17:23:14.780Z\n\ud83d\udd17 References:\n1. http://draytek.com\n2. https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946", "creation_timestamp": "2025-02-28T17:27:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f/export"/>
    <published>2025-02-28T17:27:05+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/696de295-bf5f-4ff3-adb7-51691e38f1e4/export</id>
    <title>696de295-bf5f-4ff3-adb7-51691e38f1e4</title>
    <updated>2026-05-17T02:57:30.104915+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "696de295-bf5f-4ff3-adb7-51691e38f1e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114083241199567069", "content": "", "creation_timestamp": "2025-02-28T19:49:09.667612Z"}</content>
    <link href="https://db.gcve.eu/sighting/696de295-bf5f-4ff3-adb7-51691e38f1e4/export"/>
    <published>2025-02-28T19:49:09.667612+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cf2c7f09-0a45-4c36-8e3a-820a553dd5dd/export</id>
    <title>cf2c7f09-0a45-4c36-8e3a-820a553dd5dd</title>
    <updated>2026-05-17T02:57:30.104861+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cf2c7f09-0a45-4c36-8e3a-820a553dd5dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114084184639914320", "content": "", "creation_timestamp": "2025-02-28T23:48:37.719985Z"}</content>
    <link href="https://db.gcve.eu/sighting/cf2c7f09-0a45-4c36-8e3a-820a553dd5dd/export"/>
    <published>2025-02-28T23:48:37.719985+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ac515270-5939-4a43-884e-655d96036823/export</id>
    <title>ac515270-5939-4a43-884e-655d96036823</title>
    <updated>2026-05-17T02:57:30.104785+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ac515270-5939-4a43-884e-655d96036823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "Telegram/a-KbHMaydG4wvUw-hFKaFz8PP4CLd7hDJTIYGL0kr7XOvzZv", "content": "", "creation_timestamp": "2025-03-02T11:45:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ac515270-5939-4a43-884e-655d96036823/export"/>
    <published>2025-03-02T11:45:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4acb1328-dcd4-4a71-bc43-ca51c87706bd/export</id>
    <title>4acb1328-dcd4-4a71-bc43-ca51c87706bd</title>
    <updated>2026-05-17T02:57:30.103384+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4acb1328-dcd4-4a71-bc43-ca51c87706bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4acb1328-dcd4-4a71-bc43-ca51c87706bd/export"/>
    <published>2025-08-19T18:29:29+00:00</published>
  </entry>
</feed>
