<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T18:14:11.971505+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/f84f68a4-5b4d-4add-bb8b-8fd1d59cedd4/export</id>
    <title>f84f68a4-5b4d-4add-bb8b-8fd1d59cedd4</title>
    <updated>2026-05-02T18:14:12.175737+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f84f68a4-5b4d-4add-bb8b-8fd1d59cedd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51642", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511304672842505", "content": "", "creation_timestamp": "2024-11-19T19:37:34.719121Z"}</content>
    <link href="https://db.gcve.eu/sighting/f84f68a4-5b4d-4add-bb8b-8fd1d59cedd4/export"/>
    <published>2024-11-19T19:37:34.719121+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/44cda02d-61fc-495c-b2dd-964b36226883/export</id>
    <title>44cda02d-61fc-495c-b2dd-964b36226883</title>
    <updated>2026-05-02T18:14:12.175687+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "44cda02d-61fc-495c-b2dd-964b36226883", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51643", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511304686920845", "content": "", "creation_timestamp": "2024-11-19T19:37:35.102241Z"}</content>
    <link href="https://db.gcve.eu/sighting/44cda02d-61fc-495c-b2dd-964b36226883/export"/>
    <published>2024-11-19T19:37:35.102241+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dc3905d4-e20f-405e-bd14-f46f4e243a78/export</id>
    <title>dc3905d4-e20f-405e-bd14-f46f4e243a78</title>
    <updated>2026-05-02T18:14:12.175637+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dc3905d4-e20f-405e-bd14-f46f4e243a78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51644", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511304702108340", "content": "", "creation_timestamp": "2024-11-19T19:37:35.211674Z"}</content>
    <link href="https://db.gcve.eu/sighting/dc3905d4-e20f-405e-bd14-f46f4e243a78/export"/>
    <published>2024-11-19T19:37:35.211674+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/568cc54a-0c32-4d81-bd5c-a11d3586327c/export</id>
    <title>568cc54a-0c32-4d81-bd5c-a11d3586327c</title>
    <updated>2026-05-02T18:14:12.175585+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "568cc54a-0c32-4d81-bd5c-a11d3586327c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51645", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511304715282669", "content": "", "creation_timestamp": "2024-11-19T19:37:35.727833Z"}</content>
    <link href="https://db.gcve.eu/sighting/568cc54a-0c32-4d81-bd5c-a11d3586327c/export"/>
    <published>2024-11-19T19:37:35.727833+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/25026ae7-3014-4dfe-bc94-1671008c6886/export</id>
    <title>25026ae7-3014-4dfe-bc94-1671008c6886</title>
    <updated>2026-05-02T18:14:12.175536+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "25026ae7-3014-4dfe-bc94-1671008c6886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51648", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511363717929996", "content": "", "creation_timestamp": "2024-11-19T19:52:35.627523Z"}</content>
    <link href="https://db.gcve.eu/sighting/25026ae7-3014-4dfe-bc94-1671008c6886/export"/>
    <published>2024-11-19T19:52:35.627523+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2585668f-e5e5-4abc-aafb-022038e516cd/export</id>
    <title>2585668f-e5e5-4abc-aafb-022038e516cd</title>
    <updated>2026-05-02T18:14:12.175483+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2585668f-e5e5-4abc-aafb-022038e516cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51649", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113511363769771924", "content": "", "creation_timestamp": "2024-11-19T19:52:36.358336Z"}</content>
    <link href="https://db.gcve.eu/sighting/2585668f-e5e5-4abc-aafb-022038e516cd/export"/>
    <published>2024-11-19T19:52:36.358336+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c2f364f2-a621-4b49-89f8-ea8e4009d511/export</id>
    <title>c2f364f2-a621-4b49-89f8-ea8e4009d511</title>
    <updated>2026-05-02T18:14:12.175430+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c2f364f2-a621-4b49-89f8-ea8e4009d511", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51646", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113673652217086692", "content": "", "creation_timestamp": "2024-12-18T11:44:41.608927Z"}</content>
    <link href="https://db.gcve.eu/sighting/c2f364f2-a621-4b49-89f8-ea8e4009d511/export"/>
    <published>2024-12-18T11:44:41.608927+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/de74636a-ac3b-4485-a2e6-b1b4f33fa88c/export</id>
    <title>de74636a-ac3b-4485-a2e6-b1b4f33fa88c</title>
    <updated>2026-05-02T18:14:12.175373+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "de74636a-ac3b-4485-a2e6-b1b4f33fa88c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51646", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113673666336880749", "content": "", "creation_timestamp": "2024-12-18T11:48:17.140358Z"}</content>
    <link href="https://db.gcve.eu/sighting/de74636a-ac3b-4485-a2e6-b1b4f33fa88c/export"/>
    <published>2024-12-18T11:48:17.140358+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fa047b49-1bde-4b65-a1e2-425314a5dc9b/export</id>
    <title>fa047b49-1bde-4b65-a1e2-425314a5dc9b</title>
    <updated>2026-05-02T18:14:12.175285+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fa047b49-1bde-4b65-a1e2-425314a5dc9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51646", "type": "seen", "source": "https://t.me/cvedetector/13190", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51646 - Saoshyant Element XSS.VALUES\", \n  \"Content\": \"CVE ID : CVE-2024-51646 \nPublished : Dec. 18, 2024, 12:15 p.m. | 23\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saoshyant Saoshyant Element allows Reflected XSS.This issue affects Saoshyant Element: from n/a through 1.2. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T13:41:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fa047b49-1bde-4b65-a1e2-425314a5dc9b/export"/>
    <published>2024-12-18T13:41:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/499700e9-bad7-4829-8379-1e440949141b/export</id>
    <title>499700e9-bad7-4829-8379-1e440949141b</title>
    <updated>2026-05-02T18:14:12.174118+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "499700e9-bad7-4829-8379-1e440949141b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5164", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhultsegt522", "content": "", "creation_timestamp": "2025-02-11T02:19:15.506252Z"}</content>
    <link href="https://db.gcve.eu/sighting/499700e9-bad7-4829-8379-1e440949141b/export"/>
    <published>2025-02-11T02:19:15.506252+00:00</published>
  </entry>
</feed>
