<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-16T12:59:22.871847+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/5659e3de-d50b-4e85-b41b-ce6496586483/export</id>
    <title>5659e3de-d50b-4e85-b41b-ce6496586483</title>
    <updated>2026-05-16T12:59:23.229842+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5659e3de-d50b-4e85-b41b-ce6496586483", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51209", "type": "seen", "source": "https://t.me/cvedetector/11616", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51209 - Anuj Kumar's Client Management System XSS\", \n  \"Content\": \"CVE ID : CVE-2024-51209 \nPublished : Nov. 20, 2024, 3:15 p.m. | 43\u00a0minutes ago \nDescription : Cross-Site Scripting (XSS) vulnerabilities in Anuj Kumar's Client Management System Version 1.2 allow local attackers to inject arbitrary web script or HTML via the search input field parameter to admin search invoice page and client search invoice page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T17:05:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5659e3de-d50b-4e85-b41b-ce6496586483/export"/>
    <published>2024-11-20T17:05:29+00:00</published>
  </entry>
</feed>
