<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-23T22:02:15.870273+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/d3fc0e57-a734-44e8-aeec-68486a345390/export</id>
    <title>d3fc0e57-a734-44e8-aeec-68486a345390</title>
    <updated>2026-05-23T22:02:16.073048+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d3fc0e57-a734-44e8-aeec-68486a345390", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51845", "type": "seen", "source": "https://t.me/cvedetector/10466", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51845 - Richteam Share Buttons - SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-51845 \nPublished : Nov. 11, 2024, 6:15 a.m. | 24\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Richteam Share Buttons \u2013 Social Media allows Blind SQL Injection.This issue affects Share Buttons \u2013 Social Media: from n/a through 1.0.2. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T07:44:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d3fc0e57-a734-44e8-aeec-68486a345390/export"/>
    <published>2024-11-11T07:44:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9b667935-f7cd-4095-901a-54f766d9955b/export</id>
    <title>9b667935-f7cd-4095-901a-54f766d9955b</title>
    <updated>2026-05-23T22:02:16.072978+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9b667935-f7cd-4095-901a-54f766d9955b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51841", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113512131456839047", "content": "", "creation_timestamp": "2024-11-19T23:07:50.491919Z"}</content>
    <link href="https://db.gcve.eu/sighting/9b667935-f7cd-4095-901a-54f766d9955b/export"/>
    <published>2024-11-19T23:07:50.491919+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8a502308-cabe-4a5f-9eb5-ee04c2420b17/export</id>
    <title>8a502308-cabe-4a5f-9eb5-ee04c2420b17</title>
    <updated>2026-05-23T22:02:16.072907+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8a502308-cabe-4a5f-9eb5-ee04c2420b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51840", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113512131443687830", "content": "", "creation_timestamp": "2024-11-19T23:07:50.557852Z"}</content>
    <link href="https://db.gcve.eu/sighting/8a502308-cabe-4a5f-9eb5-ee04c2420b17/export"/>
    <published>2024-11-19T23:07:50.557852+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/62cad83d-06d0-4227-994f-b35aefcdbcc8/export</id>
    <title>62cad83d-06d0-4227-994f-b35aefcdbcc8</title>
    <updated>2026-05-23T22:02:16.072840+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "62cad83d-06d0-4227-994f-b35aefcdbcc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51842", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113512131470788958", "content": "", "creation_timestamp": "2024-11-19T23:07:51.403814Z"}</content>
    <link href="https://db.gcve.eu/sighting/62cad83d-06d0-4227-994f-b35aefcdbcc8/export"/>
    <published>2024-11-19T23:07:51.403814+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ca28bb85-16db-4767-9e14-9750c65b9c57/export</id>
    <title>ca28bb85-16db-4767-9e14-9750c65b9c57</title>
    <updated>2026-05-23T22:02:16.072770+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ca28bb85-16db-4767-9e14-9750c65b9c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51844", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113512190468838823", "content": "", "creation_timestamp": "2024-11-19T23:22:50.871923Z"}</content>
    <link href="https://db.gcve.eu/sighting/ca28bb85-16db-4767-9e14-9750c65b9c57/export"/>
    <published>2024-11-19T23:22:50.871923+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c577854e-1691-4025-92b8-da63b8ca101d/export</id>
    <title>c577854e-1691-4025-92b8-da63b8ca101d</title>
    <updated>2026-05-23T22:02:16.072699+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c577854e-1691-4025-92b8-da63b8ca101d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113512190485101966", "content": "", "creation_timestamp": "2024-11-19T23:22:51.362769Z"}</content>
    <link href="https://db.gcve.eu/sighting/c577854e-1691-4025-92b8-da63b8ca101d/export"/>
    <published>2024-11-19T23:22:51.362769+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/74c2db3a-8e24-47db-8c01-b3cc270a05f8/export</id>
    <title>74c2db3a-8e24-47db-8c01-b3cc270a05f8</title>
    <updated>2026-05-23T22:02:16.072615+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "74c2db3a-8e24-47db-8c01-b3cc270a05f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51847", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113512190500535364", "content": "", "creation_timestamp": "2024-11-19T23:22:51.560178Z"}</content>
    <link href="https://db.gcve.eu/sighting/74c2db3a-8e24-47db-8c01-b3cc270a05f8/export"/>
    <published>2024-11-19T23:22:51.560178+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/331236b9-4c33-4f4d-8a1e-ddcb1124cf50/export</id>
    <title>331236b9-4c33-4f4d-8a1e-ddcb1124cf50</title>
    <updated>2026-05-23T22:02:16.072522+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "331236b9-4c33-4f4d-8a1e-ddcb1124cf50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51848", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113512190514062415", "content": "", "creation_timestamp": "2024-11-19T23:22:52.241054Z"}</content>
    <link href="https://db.gcve.eu/sighting/331236b9-4c33-4f4d-8a1e-ddcb1124cf50/export"/>
    <published>2024-11-19T23:22:52.241054+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7c46c584-1678-48f7-9529-18fb5272013e/export</id>
    <title>7c46c584-1678-48f7-9529-18fb5272013e</title>
    <updated>2026-05-23T22:02:16.071850+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7c46c584-1678-48f7-9529-18fb5272013e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51849", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113512249516712925", "content": "", "creation_timestamp": "2024-11-19T23:37:54.388905Z"}</content>
    <link href="https://db.gcve.eu/sighting/7c46c584-1678-48f7-9529-18fb5272013e/export"/>
    <published>2024-11-19T23:37:54.388905+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e3afb687-ac6c-4764-94e5-09684b361146/export</id>
    <title>e3afb687-ac6c-4764-94e5-09684b361146</title>
    <updated>2026-05-23T22:02:16.070043+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "e3afb687-ac6c-4764-94e5-09684b361146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-5184", "type": "seen", "source": "https://gist.github.com/marouanedahmani27-coder/2e9ba16b81fd39c25f0950a1312cb138", "content": "", "creation_timestamp": "2026-05-06T19:51:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e3afb687-ac6c-4764-94e5-09684b361146/export"/>
    <published>2026-05-06T19:51:07+00:00</published>
  </entry>
</feed>
