<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T10:54:14.464254+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/7d5888b9-67b5-4113-a86f-5ce93a7485e6/export</id>
    <title>7d5888b9-67b5-4113-a86f-5ce93a7485e6</title>
    <updated>2026-05-01T10:54:14.759206+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7d5888b9-67b5-4113-a86f-5ce93a7485e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55193", "type": "seen", "source": "https://t.me/cvedetector/16235", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55193 - OpenImageIO Integer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55193 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : OpenImageIO v3.1.0.0dev was discovered to contain a segmentation violation via the component /OpenImageIO/string_view.h. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7d5888b9-67b5-4113-a86f-5ce93a7485e6/export"/>
    <published>2025-01-24T00:10:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1038ff97-9c52-4e19-9e41-a5136a66655c/export</id>
    <title>1038ff97-9c52-4e19-9e41-a5136a66655c</title>
    <updated>2026-05-01T10:54:14.759146+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1038ff97-9c52-4e19-9e41-a5136a66655c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55194", "type": "seen", "source": "https://t.me/cvedetector/16236", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55194 - OpenImageIO Heap Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-55194 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1038ff97-9c52-4e19-9e41-a5136a66655c/export"/>
    <published>2025-01-24T00:10:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b0226760-778b-4f51-9ce0-5d8f1734b175/export</id>
    <title>b0226760-778b-4f51-9ce0-5d8f1734b175</title>
    <updated>2026-05-01T10:54:14.759086+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b0226760-778b-4f51-9ce0-5d8f1734b175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55195", "type": "seen", "source": "https://t.me/cvedetector/16237", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55195 - OpenImageIO Image Buffer Allocation Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-55195 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : An allocation-size-too-big bug in the component /imagebuf.cpp of OpenImageIO v3.1.0.0dev may cause a Denial of Service (DoS) when the program to requests to allocate too much space. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b0226760-778b-4f51-9ce0-5d8f1734b175/export"/>
    <published>2025-01-24T00:10:15+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ff92b826-35c6-4b45-a8d8-8e145db97fc2/export</id>
    <title>ff92b826-35c6-4b45-a8d8-8e145db97fc2</title>
    <updated>2026-05-01T10:54:14.759028+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ff92b826-35c6-4b45-a8d8-8e145db97fc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55192", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3390", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55192\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*).\n\ud83d\udccf Published: 2025-01-24T00:31:46Z\n\ud83d\udccf Modified: 2025-01-29T18:31:21Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-55192\n2. https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550", "creation_timestamp": "2025-01-29T19:11:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ff92b826-35c6-4b45-a8d8-8e145db97fc2/export"/>
    <published>2025-01-29T19:11:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d460f4ef-b867-43c5-a7e5-bdfea3e7b25b/export</id>
    <title>d460f4ef-b867-43c5-a7e5-bdfea3e7b25b</title>
    <updated>2026-05-01T10:54:14.758974+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d460f4ef-b867-43c5-a7e5-bdfea3e7b25b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5519", "type": "seen", "source": "Telegram/H_TAUmBeJHpvDW0jqDIEnAl8Db0G-ySC0oJGUhSj5xvbg9XP", "content": "", "creation_timestamp": "2025-02-14T10:01:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d460f4ef-b867-43c5-a7e5-bdfea3e7b25b/export"/>
    <published>2025-02-14T10:01:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c2df2aea-9fb1-4b43-a396-292c833c12c6/export</id>
    <title>c2df2aea-9fb1-4b43-a396-292c833c12c6</title>
    <updated>2026-05-01T10:54:14.758913+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c2df2aea-9fb1-4b43-a396-292c833c12c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55199", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7025", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55199\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Stored Cross Site Scripting (XSS) vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to store JavaScript code inside a PDF file through the file upload feature. When the file is rendered, the injected code is executed on the user's browser.\n\ud83d\udccf Published: 2025-03-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-10T17:10:53.517Z\n\ud83d\udd17 References:\n1. https://portswigger.net/web-security/cross-site-scripting/stored\n2. https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55199", "creation_timestamp": "2025-03-10T17:38:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c2df2aea-9fb1-4b43-a396-292c833c12c6/export"/>
    <published>2025-03-10T17:38:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d2d71fdf-6f37-4b85-9111-65f651d5dd6b/export</id>
    <title>d2d71fdf-6f37-4b85-9111-65f651d5dd6b</title>
    <updated>2026-05-01T10:54:14.758853+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d2d71fdf-6f37-4b85-9111-65f651d5dd6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55199", "type": "seen", "source": "https://t.me/cvedetector/19976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55199 - Celk Sistemas Celk Saude Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-55199 \nPublished : March 10, 2025, 6:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : A Stored Cross Site Scripting (XSS) vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to store JavaScript code inside a PDF file through the file upload feature. When the file is rendered, the injected code is executed on the user's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T20:43:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d2d71fdf-6f37-4b85-9111-65f651d5dd6b/export"/>
    <published>2025-03-10T20:43:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/849b0969-44ad-4b5a-ac2e-799c0e146c65/export</id>
    <title>849b0969-44ad-4b5a-ac2e-799c0e146c65</title>
    <updated>2026-05-01T10:54:14.758781+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "849b0969-44ad-4b5a-ac2e-799c0e146c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55198", "type": "seen", "source": "https://t.me/cvedetector/20219", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55198 - Celk Sistemas Celk Saude User Enumeration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55198 \nPublished : March 13, 2025, 3:15 p.m. | 41\u00a0minutes ago \nDescription : User Enumeration via Discrepancies in Error Messages in the Celk Sistemas Celk Saude v.3.1.252.1 password recovery functionality which allows a remote attacker to enumerate users through discrepancies in the responses. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T17:17:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/849b0969-44ad-4b5a-ac2e-799c0e146c65/export"/>
    <published>2025-03-13T17:17:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e3ac246f-56f8-455f-8b80-fa305b85eaea/export</id>
    <title>e3ac246f-56f8-455f-8b80-fa305b85eaea</title>
    <updated>2026-05-01T10:54:14.758703+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e3ac246f-56f8-455f-8b80-fa305b85eaea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e3ac246f-56f8-455f-8b80-fa305b85eaea/export"/>
    <published>2025-09-15T13:28:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/eac84de1-65f3-4818-9098-a6f4bdcd80de/export</id>
    <title>eac84de1-65f3-4818-9098-a6f4bdcd80de</title>
    <updated>2026-05-01T10:54:14.755672+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "eac84de1-65f3-4818-9098-a6f4bdcd80de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/eac84de1-65f3-4818-9098-a6f4bdcd80de/export"/>
    <published>2025-09-16T03:45:01+00:00</published>
  </entry>
</feed>
