<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T21:53:43.062311+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c/export</id>
    <title>dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c</title>
    <updated>2026-05-06T21:53:43.458785+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5646", "type": "seen", "source": "Telegram/CyShfnxDIVHOXG7Cu89TEXIMBwJip83Ry2BPq0N2ZmPm28i0", "content": "", "creation_timestamp": "2025-02-06T02:43:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c/export"/>
    <published>2025-02-06T02:43:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/caea4fe5-5255-40cc-8eba-2e08469775f9/export</id>
    <title>caea4fe5-5255-40cc-8eba-2e08469775f9</title>
    <updated>2026-05-06T21:53:43.458710+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "caea4fe5-5255-40cc-8eba-2e08469775f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958841808577146", "content": "", "creation_timestamp": "2025-02-06T20:32:09.420917Z"}</content>
    <link href="https://db.gcve.eu/sighting/caea4fe5-5255-40cc-8eba-2e08469775f9/export"/>
    <published>2025-02-06T20:32:09.420917+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ef92ba48-2f57-4a34-828f-0a774dbf439d/export</id>
    <title>ef92ba48-2f57-4a34-828f-0a774dbf439d</title>
    <updated>2026-05-06T21:53:43.458631+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ef92ba48-2f57-4a34-828f-0a774dbf439d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjyz7demr24", "content": "", "creation_timestamp": "2025-02-06T21:15:38.244213Z"}</content>
    <link href="https://db.gcve.eu/sighting/ef92ba48-2f57-4a34-828f-0a774dbf439d/export"/>
    <published>2025-02-06T21:15:38.244213+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3a6c0db9-9dac-402c-9ac3-24980ce3d5cd/export</id>
    <title>3a6c0db9-9dac-402c-9ac3-24980ce3d5cd</title>
    <updated>2026-05-06T21:53:43.458550+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3a6c0db9-9dac-402c-9ac3-24980ce3d5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhk6agwuus2g", "content": "", "creation_timestamp": "2025-02-06T22:49:15.509059Z"}</content>
    <link href="https://db.gcve.eu/sighting/3a6c0db9-9dac-402c-9ac3-24980ce3d5cd/export"/>
    <published>2025-02-06T22:49:15.509059+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe/export</id>
    <title>50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe</title>
    <updated>2026-05-06T21:53:43.458457+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://t.me/cvedetector/17444", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56467 - IBM EntireX Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56467 \nPublished : Feb. 6, 2025, 9:15 p.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned.  This information could be used in further attacks against the system. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T00:26:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe/export"/>
    <published>2025-02-07T00:26:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b0ec69cb-f7f2-4546-ab59-5fc4a4781c95/export</id>
    <title>b0ec69cb-f7f2-4546-ab59-5fc4a4781c95</title>
    <updated>2026-05-06T21:53:43.458365+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b0ec69cb-f7f2-4546-ab59-5fc4a4781c95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5pdhacsw2g", "content": "", "creation_timestamp": "2025-02-14T17:15:40.303384Z"}</content>
    <link href="https://db.gcve.eu/sighting/b0ec69cb-f7f2-4546-ab59-5fc4a4781c95/export"/>
    <published>2025-02-14T17:15:40.303384+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bf319dd2-0d6b-4fb6-a698-a466f6c580af/export</id>
    <title>bf319dd2-0d6b-4fb6-a698-a466f6c580af</title>
    <updated>2026-05-06T21:53:43.458266+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bf319dd2-0d6b-4fb6-a698-a466f6c580af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5uda4wp62m", "content": "", "creation_timestamp": "2025-02-14T18:45:08.417167Z"}</content>
    <link href="https://db.gcve.eu/sighting/bf319dd2-0d6b-4fb6-a698-a466f6c580af/export"/>
    <published>2025-02-14T18:45:08.417167+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae/export</id>
    <title>a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae</title>
    <updated>2026-05-06T21:53:43.458029+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://t.me/cvedetector/18132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56463 - IBM QRadar SIEM Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56463 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : IBM QRadar SIEM 7.5 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:57:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae/export"/>
    <published>2025-02-14T19:57:09+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/aaead5bf-3e68-4981-809e-fc7f4ae16eab/export</id>
    <title>aaead5bf-3e68-4981-809e-fc7f4ae16eab</title>
    <updated>2026-05-06T21:53:43.455779+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "aaead5bf-3e68-4981-809e-fc7f4ae16eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5079", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56467\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned.  This information could be used in further attacks against the system.\n\ud83d\udccf Published: 2025-02-06T20:30:45.432Z\n\ud83d\udccf Modified: 2025-02-22T22:13:01.190Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7182693", "creation_timestamp": "2025-02-22T23:19:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/aaead5bf-3e68-4981-809e-fc7f4ae16eab/export"/>
    <published>2025-02-22T23:19:59+00:00</published>
  </entry>
</feed>
