<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-18T20:57:28.220466+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/863bcb76-8e36-437f-bf8e-32cdc85e0f29/export</id>
    <title>863bcb76-8e36-437f-bf8e-32cdc85e0f29</title>
    <updated>2026-05-18T20:57:28.619190+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "863bcb76-8e36-437f-bf8e-32cdc85e0f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0284", "type": "seen", "source": "https://t.me/ctinow/164130", "content": "https://ift.tt/HVysaji\nCVE-2024-0284", "creation_timestamp": "2024-01-07T18:22:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/863bcb76-8e36-437f-bf8e-32cdc85e0f29/export"/>
    <published>2024-01-07T18:22:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/731a78e1-d977-440f-96f4-5d5045aab9c7/export</id>
    <title>731a78e1-d977-440f-96f4-5d5045aab9c7</title>
    <updated>2026-05-18T20:57:28.619054+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "731a78e1-d977-440f-96f4-5d5045aab9c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0284", "type": "seen", "source": "https://t.me/arpsyndicate/2751", "content": "#ExploitObserverAlert\n\nCVE-2024-0284\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2024-0284. A vulnerability was found in Kashipara Food Management System up to 1.0. It has been rated as problematic. This issue affects some unknown processing of the file party_submit.php. The manipulation of the argument party_address leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249839.\n\nNVD-IS: 2.7\nNVD-ES: 2.8", "creation_timestamp": "2024-01-09T13:56:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/731a78e1-d977-440f-96f4-5d5045aab9c7/export"/>
    <published>2024-01-09T13:56:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/40afd2f8-f512-4b2c-a2e3-70da7250063c/export</id>
    <title>40afd2f8-f512-4b2c-a2e3-70da7250063c</title>
    <updated>2026-05-18T20:57:28.617292+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "40afd2f8-f512-4b2c-a2e3-70da7250063c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0284", "type": "seen", "source": "https://t.me/ctinow/173175", "content": "https://ift.tt/Eumo4KS\nCVE-2024-0284 | Kashipara Food Management System up to 1.0 party_submit.php party_address cross site scripting", "creation_timestamp": "2024-01-24T23:51:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/40afd2f8-f512-4b2c-a2e3-70da7250063c/export"/>
    <published>2024-01-24T23:51:39+00:00</published>
  </entry>
</feed>
