<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T07:46:24.434496+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/16af4288-8eca-41f6-bf31-040350101a1c/export</id>
    <title>16af4288-8eca-41f6-bf31-040350101a1c</title>
    <updated>2026-05-08T07:46:24.625278+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "16af4288-8eca-41f6-bf31-040350101a1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57627", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo3bkgw672n", "content": "", "creation_timestamp": "2025-01-14T01:16:21.481728Z"}</content>
    <link href="https://db.gcve.eu/sighting/16af4288-8eca-41f6-bf31-040350101a1c/export"/>
    <published>2025-01-14T01:16:21.481728+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/47f8756f-ab91-410b-8f04-3b7af884e24a/export</id>
    <title>47f8756f-ab91-410b-8f04-3b7af884e24a</title>
    <updated>2026-05-08T07:46:24.625211+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "47f8756f-ab91-410b-8f04-3b7af884e24a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57628", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo3bmuvib2f", "content": "", "creation_timestamp": "2025-01-14T01:16:24.143800Z"}</content>
    <link href="https://db.gcve.eu/sighting/47f8756f-ab91-410b-8f04-3b7af884e24a/export"/>
    <published>2025-01-14T01:16:24.143800+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ca90564b-5e0e-4552-87ce-69333c6cad9a/export</id>
    <title>ca90564b-5e0e-4552-87ce-69333c6cad9a</title>
    <updated>2026-05-08T07:46:24.625129+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ca90564b-5e0e-4552-87ce-69333c6cad9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57629", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo3bpbqff2b", "content": "", "creation_timestamp": "2025-01-14T01:16:26.764919Z"}</content>
    <link href="https://db.gcve.eu/sighting/ca90564b-5e0e-4552-87ce-69333c6cad9a/export"/>
    <published>2025-01-14T01:16:26.764919+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ac3b91e1-9e0b-4f53-abc1-5481c8e9556b/export</id>
    <title>ac3b91e1-9e0b-4f53-abc1-5481c8e9556b</title>
    <updated>2026-05-08T07:46:24.625054+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ac3b91e1-9e0b-4f53-abc1-5481c8e9556b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57627", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113824064269153050", "content": "", "creation_timestamp": "2025-01-14T01:16:27.393547Z"}</content>
    <link href="https://db.gcve.eu/sighting/ac3b91e1-9e0b-4f53-abc1-5481c8e9556b/export"/>
    <published>2025-01-14T01:16:27.393547+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c91f1001-cae0-40a2-99f3-ef2aeb4cf725/export</id>
    <title>c91f1001-cae0-40a2-99f3-ef2aeb4cf725</title>
    <updated>2026-05-08T07:46:24.624979+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c91f1001-cae0-40a2-99f3-ef2aeb4cf725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57628", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113824064283109040", "content": "", "creation_timestamp": "2025-01-14T01:16:27.686677Z"}</content>
    <link href="https://db.gcve.eu/sighting/c91f1001-cae0-40a2-99f3-ef2aeb4cf725/export"/>
    <published>2025-01-14T01:16:27.686677+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cff86c50-8972-491e-9600-736307e9d352/export</id>
    <title>cff86c50-8972-491e-9600-736307e9d352</title>
    <updated>2026-05-08T07:46:24.624896+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cff86c50-8972-491e-9600-736307e9d352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57629", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113824064297409647", "content": "", "creation_timestamp": "2025-01-14T01:16:27.845655Z"}</content>
    <link href="https://db.gcve.eu/sighting/cff86c50-8972-491e-9600-736307e9d352/export"/>
    <published>2025-01-14T01:16:27.845655+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f38b6d6d-f151-41ad-b585-71566c058155/export</id>
    <title>f38b6d6d-f151-41ad-b585-71566c058155</title>
    <updated>2026-05-08T07:46:24.624811+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f38b6d6d-f151-41ad-b585-71566c058155", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57623", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1582", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57623\n\ud83d\udd39 Description: An issue in the HEAP_malloc component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-14T18:50:41.075Z\n\ud83d\udd17 References:\n1. https://github.com/MonetDB/MonetDB/issues/7415", "creation_timestamp": "2025-01-14T19:10:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f38b6d6d-f151-41ad-b585-71566c058155/export"/>
    <published>2025-01-14T19:10:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8b21945f-834e-40de-9a33-84080ddbd81c/export</id>
    <title>8b21945f-834e-40de-9a33-84080ddbd81c</title>
    <updated>2026-05-08T07:46:24.624717+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8b21945f-834e-40de-9a33-84080ddbd81c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57625", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1774", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57625\n\ud83d\udd39 Description: An issue in the merge_table_prune_and_unionize component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-15T15:50:33.618Z\n\ud83d\udd17 References:\n1. https://github.com/MonetDB/MonetDB/issues/7443", "creation_timestamp": "2025-01-15T15:55:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8b21945f-834e-40de-9a33-84080ddbd81c/export"/>
    <published>2025-01-15T15:55:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bc8277af-129e-462c-b626-05fb27750f74/export</id>
    <title>bc8277af-129e-462c-b626-05fb27750f74</title>
    <updated>2026-05-08T07:46:24.624597+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bc8277af-129e-462c-b626-05fb27750f74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57626", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1777", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57626\n\ud83d\udd39 Description: An issue in the mat_join2 component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-15T15:46:35.301Z\n\ud83d\udd17 References:\n1. https://github.com/MonetDB/MonetDB/issues/7442", "creation_timestamp": "2025-01-15T15:55:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/bc8277af-129e-462c-b626-05fb27750f74/export"/>
    <published>2025-01-15T15:55:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d8d4f693-5126-4ab2-974b-48cf01a837db/export</id>
    <title>d8d4f693-5126-4ab2-974b-48cf01a837db</title>
    <updated>2026-05-08T07:46:24.623294+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d8d4f693-5126-4ab2-974b-48cf01a837db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57627", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1780", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57627\n\ud83d\udd39 Description: An issue in the gc_col component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-15T15:44:17.554Z\n\ud83d\udd17 References:\n1. https://github.com/MonetDB/MonetDB/issues/7440", "creation_timestamp": "2025-01-15T15:55:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d8d4f693-5126-4ab2-974b-48cf01a837db/export"/>
    <published>2025-01-15T15:55:09+00:00</published>
  </entry>
</feed>
