<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-16T09:16:40.033714+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/9c1e6e80-bb9e-4b25-a92a-41c16b57bb93/export</id>
    <title>9c1e6e80-bb9e-4b25-a92a-41c16b57bb93</title>
    <updated>2026-05-16T09:16:40.374515+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9c1e6e80-bb9e-4b25-a92a-41c16b57bb93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51228", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113555948825625198", "content": "", "creation_timestamp": "2024-11-27T16:51:10.375936Z"}</content>
    <link href="https://db.gcve.eu/sighting/9c1e6e80-bb9e-4b25-a92a-41c16b57bb93/export"/>
    <published>2024-11-27T16:51:10.375936+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5569e7c5-5399-4419-8e5f-f3492bc4823f/export</id>
    <title>5569e7c5-5399-4419-8e5f-f3492bc4823f</title>
    <updated>2026-05-16T09:16:40.374440+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5569e7c5-5399-4419-8e5f-f3492bc4823f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51229", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113800606128034861", "content": "", "creation_timestamp": "2025-01-09T21:50:44.570720Z"}</content>
    <link href="https://db.gcve.eu/sighting/5569e7c5-5399-4419-8e5f-f3492bc4823f/export"/>
    <published>2025-01-09T21:50:44.570720+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/84a4f29e-8d72-43a4-9511-b7dcffc15473/export</id>
    <title>84a4f29e-8d72-43a4-9511-b7dcffc15473</title>
    <updated>2026-05-16T09:16:40.374361+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "84a4f29e-8d72-43a4-9511-b7dcffc15473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51229", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1098", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51229\n\ud83d\udd39 Description: Cross Site Scripting vulnerability in LinZhaoguan pb-cms v.2.0 allows a remote attacker to execute arbitrary code via the theme management function.\n\ud83d\udccf Published: 2025-01-09T00:00:00\n\ud83d\udccf Modified: 2025-01-09T21:47:54.662723\n\ud83d\udd17 References:\n1. https://gitee.com/LinZhaoguan/pb-cms/issues/IAYHUP", "creation_timestamp": "2025-01-09T22:15:42.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/84a4f29e-8d72-43a4-9511-b7dcffc15473/export"/>
    <published>2025-01-09T22:15:42+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/741ec530-ae38-4c5a-ad47-f16821f8d755/export</id>
    <title>741ec530-ae38-4c5a-ad47-f16821f8d755</title>
    <updated>2026-05-16T09:16:40.374287+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "741ec530-ae38-4c5a-ad47-f16821f8d755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51229", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdpcwu5cj2a", "content": "", "creation_timestamp": "2025-01-09T22:15:45.758248Z"}</content>
    <link href="https://db.gcve.eu/sighting/741ec530-ae38-4c5a-ad47-f16821f8d755/export"/>
    <published>2025-01-09T22:15:45.758248+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f6d9b2bf-5e11-4e8e-abbb-c5464994572b/export</id>
    <title>f6d9b2bf-5e11-4e8e-abbb-c5464994572b</title>
    <updated>2026-05-16T09:16:40.374213+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f6d9b2bf-5e11-4e8e-abbb-c5464994572b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51229", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfdqvcrdsn2w", "content": "", "creation_timestamp": "2025-01-09T22:43:56.428807Z"}</content>
    <link href="https://db.gcve.eu/sighting/f6d9b2bf-5e11-4e8e-abbb-c5464994572b/export"/>
    <published>2025-01-09T22:43:56.428807+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/66acc1d8-77c1-4d72-8dd2-26742d47145b/export</id>
    <title>66acc1d8-77c1-4d72-8dd2-26742d47145b</title>
    <updated>2026-05-16T09:16:40.374117+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "66acc1d8-77c1-4d72-8dd2-26742d47145b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51229", "type": "seen", "source": "https://t.me/cvedetector/14941", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51229 - LinZhaoguan pb-cms Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-51229 \nPublished : Jan. 9, 2025, 10:15 p.m. | 19\u00a0minutes ago \nDescription : Cross Site Scripting vulnerability in LinZhaoguan pb-cms v.2.0 allows a remote attacker to execute arbitrary code via the theme management function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T23:38:25.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/66acc1d8-77c1-4d72-8dd2-26742d47145b/export"/>
    <published>2025-01-09T23:38:25+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/428658f9-ff03-4d5e-9b67-df710eb5e338/export</id>
    <title>428658f9-ff03-4d5e-9b67-df710eb5e338</title>
    <updated>2026-05-16T09:16:40.374038+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "428658f9-ff03-4d5e-9b67-df710eb5e338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51229", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805082092237089", "content": "", "creation_timestamp": "2025-01-10T16:49:15.859794Z"}</content>
    <link href="https://db.gcve.eu/sighting/428658f9-ff03-4d5e-9b67-df710eb5e338/export"/>
    <published>2025-01-10T16:49:15.859794+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5f9eaca8-eb1e-49d7-913c-51b13f668ab4/export</id>
    <title>5f9eaca8-eb1e-49d7-913c-51b13f668ab4</title>
    <updated>2026-05-16T09:16:40.373948+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5f9eaca8-eb1e-49d7-913c-51b13f668ab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5122", "type": "seen", "source": "Telegram/OFCtvj8vbMnbzPz4Fd8YYA0dpO3fwk4mV0avuiD_X9l6TE4s", "content": "", "creation_timestamp": "2025-02-14T09:47:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5f9eaca8-eb1e-49d7-913c-51b13f668ab4/export"/>
    <published>2025-02-14T09:47:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1d85a72a-2949-45a9-b8a1-4279574ed404/export</id>
    <title>1d85a72a-2949-45a9-b8a1-4279574ed404</title>
    <updated>2026-05-16T09:16:40.373818+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1d85a72a-2949-45a9-b8a1-4279574ed404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51228", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-51228.yaml", "content": "", "creation_timestamp": "2025-03-05T00:06:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1d85a72a-2949-45a9-b8a1-4279574ed404/export"/>
    <published>2025-03-05T00:06:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fcbb5e8a-c7d6-4638-b221-1ea65a0aed1b/export</id>
    <title>fcbb5e8a-c7d6-4638-b221-1ea65a0aed1b</title>
    <updated>2026-05-16T09:16:40.370976+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fcbb5e8a-c7d6-4638-b221-1ea65a0aed1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51228", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ljsvrftlo52w", "content": "", "creation_timestamp": "2025-03-07T21:01:57.028570Z"}</content>
    <link href="https://db.gcve.eu/sighting/fcbb5e8a-c7d6-4638-b221-1ea65a0aed1b/export"/>
    <published>2025-03-07T21:01:57.028570+00:00</published>
  </entry>
</feed>
