<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T09:35:14.761736+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/726bb305-a70f-4ef9-bb47-835bd0d82640/export</id>
    <title>726bb305-a70f-4ef9-bb47-835bd0d82640</title>
    <updated>2026-05-03T09:35:15.003087+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "726bb305-a70f-4ef9-bb47-835bd0d82640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44195", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldpjmmsnx42m", "content": "", "creation_timestamp": "2024-12-20T04:15:22.534792Z"}</content>
    <link href="https://db.gcve.eu/sighting/726bb305-a70f-4ef9-bb47-835bd0d82640/export"/>
    <published>2024-12-20T04:15:22.534792+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/95e8f954-f574-4dbe-bd04-3e960c7549fe/export</id>
    <title>95e8f954-f574-4dbe-bd04-3e960c7549fe</title>
    <updated>2026-05-03T09:35:15.003027+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "95e8f954-f574-4dbe-bd04-3e960c7549fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44195", "type": "seen", "source": "https://t.me/cvedetector/13403", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44195 - \"macOS Sequoia File Path Manipulation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-44195 \nPublished : Dec. 20, 2024, 4:15 a.m. | 33\u00a0minutes ago \nDescription : A logic issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.1. An app may be able to read arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T05:52:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/95e8f954-f574-4dbe-bd04-3e960c7549fe/export"/>
    <published>2024-12-20T05:52:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c74b3ce1-de76-49d1-9241-c6715216657f/export</id>
    <title>c74b3ce1-de76-49d1-9241-c6715216657f</title>
    <updated>2026-05-03T09:35:15.002948+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c74b3ce1-de76-49d1-9241-c6715216657f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://t.me/S_E_Reborn/5335", "content": "\u0412\u0441\u0435\u043c \u043f\u0440\u0438\u0432\u0435\u0442! \n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows, \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u0433\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0442 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432: \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441\u043b\u0435\u0436\u0435\u043d\u0438\u044f, \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0438\u0433\u0440\u0443\u0448\u043a\u0438. \u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u0432\u043e\u0435\u043c \u043e\u043d\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u0440\u0430\u0431\u043e\u0442\u0430\u044f \u043e\u0442 \u043b\u0438\u0446\u0430 NT AUTHORITY\\SYSTEM. \n\n\u041f\u0440\u0438\u0447\u0435\u043c, \u043a\u0430\u043a \u044f \u043f\u043e\u043d\u0438\u043c\u0430\u044e, \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0444\u0438\u0440\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u041f\u041e, \u0447\u0442\u043e \u0443\u0441\u043b\u043e\u0436\u043d\u044f\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0434\u0430\u0435\u0442 \u043d\u0430\u043c \u0435\u0449\u0435 \u043e\u0434\u0438\u043d \u0432\u0435\u043a\u0442\u043e\u0440 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \n\n\u0415\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0441\u0431\u043e\u0440\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u041f\u041e \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435:\n# \u0418\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 \u0438\u0437 \u0440\u0435\u0435\u0441\u0442\u0440\u0430\nGet-ChildItem \"HKLM:\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" | Get-ItemProperty | Where-Object {$_.DisplayName -ne $null} | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate\n\n# wmi\nwmic product get name,version,vendor  \n\n# Seatbelt\n.\\SeatBelt.exe InstalledProducts\n\n\u0425\u043e\u0447\u0443 \u043f\u043e\u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u0441 \u0432\u0430\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c \u0441\u043f\u0438\u0441\u043e\u0447\u043a\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u043b\u0443\u0436\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u0432\u0437\u044f\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u0430\u0447\u043a\u0435. \u041e\u0434\u043d\u043e\u0437\u043d\u0430\u0447\u043d\u043e \u043d\u0443\u0436\u043d\u043e \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 Exploit-Street, \u043d\u043e \u044f \u0447\u0442\u043e-\u0442\u043e \u043d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0440\u0438\u0434\u0443\u043c\u0430\u0442\u044c \u043a\u0430\u043a. \u041c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0438\u0434\u0435\u0438?\n\nManageEngine ServiceDesk\n- https://github.com/horizon3ai/CVE-2021-44077\n\nManageEngine ADSelfService\n- https://github.com/synacktiv/CVE-2021-40539\n- CVE-2022-47966\n- CVE-XXXX-XXXX (\u0441 \u0432\u0435\u0440\u0441\u0438\u0438 ADSelfService Plus 4.2.9, 2012 \u0438 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.3 Build 6301)\n\nUserManager\n- CVE-2023-36047\n\nITunes\n- CVE-2024-44193\n\nRazer ( \u0434\u043e 3.7.1209.121307)\n- RazerEoP\n\nDatacard XPS Card Printer Driver \n- CVE-2024-34329\n\nAppGate\n- CVE-2019-19793\n\nSeagate\n- CVE-2022-40286\n\nAWS VPN Client\n- CVE-2022-25165\n\nAIDA (\u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438 \u043d\u0438\u0436\u0435 7.00.6742)\n- AIDA64DRIVER-EOP\n\nVboxSDS\n- CVE-2024-21111\n\nTeamViewer\n- CVE-2024-7479 CVE-2024-7481\n\nGamingService \u043e\u0442 XBOX\n- GamingServiceEoP\n- GamingServiceEoP5\n\nChrome Updater\n- CVE-2023-7261\n\nPlantronics Desktop Hub\n- CVE-2024-27460", "creation_timestamp": "2024-12-26T13:38:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c74b3ce1-de76-49d1-9241-c6715216657f/export"/>
    <published>2024-12-26T13:38:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6ff71451-0e3a-474b-a013-5485a927878d/export</id>
    <title>6ff71451-0e3a-474b-a013-5485a927878d</title>
    <updated>2026-05-03T09:35:15.002887+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6ff71451-0e3a-474b-a013-5485a927878d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44192", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44192\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash.\n\ud83d\udccf Published: 2025-03-10T19:11:09.176Z\n\ud83d\udccf Modified: 2025-03-10T19:11:09.176Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121238\n2. https://support.apple.com/en-us/121248\n3. https://support.apple.com/en-us/121249\n4. https://support.apple.com/en-us/121250\n5. https://support.apple.com/en-us/121240\n6. https://support.apple.com/en-us/121241", "creation_timestamp": "2025-03-10T19:38:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6ff71451-0e3a-474b-a013-5485a927878d/export"/>
    <published>2025-03-10T19:38:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c00fec96-9974-4add-b9f3-a9afd281dde6/export</id>
    <title>c00fec96-9974-4add-b9f3-a9afd281dde6</title>
    <updated>2026-05-03T09:35:15.002828+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c00fec96-9974-4add-b9f3-a9afd281dde6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8310", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44199\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause unexpected system termination or read kernel memory.\n\ud83d\udccf Published: 2025-03-20T23:53:44.753Z\n\ud83d\udccf Modified: 2025-03-20T23:53:44.753Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/120911", "creation_timestamp": "2025-03-21T00:23:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c00fec96-9974-4add-b9f3-a9afd281dde6/export"/>
    <published>2025-03-21T00:23:15+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb/export</id>
    <title>ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb</title>
    <updated>2026-05-03T09:35:15.002775+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkuand4kiz2x", "content": "", "creation_timestamp": "2025-03-21T03:14:22.300439Z"}</content>
    <link href="https://db.gcve.eu/sighting/ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb/export"/>
    <published>2025-03-21T03:14:22.300439+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/438a390d-c1cc-455a-a4bc-eb729cd5cc17/export</id>
    <title>438a390d-c1cc-455a-a4bc-eb729cd5cc17</title>
    <updated>2026-05-03T09:35:15.002708+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "438a390d-c1cc-455a-a4bc-eb729cd5cc17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://t.me/cvedetector/20785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44199 - Apple macOS out-of-bounds read vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44199 \nPublished : March 21, 2025, 12:15 a.m. | 2\u00a0hours, 16\u00a0minutes ago \nDescription : An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause unexpected system termination or read kernel memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T04:16:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/438a390d-c1cc-455a-a4bc-eb729cd5cc17/export"/>
    <published>2025-03-21T04:16:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5e69b963-c8b7-4482-84c1-6eb6ba672e25/export</id>
    <title>5e69b963-c8b7-4482-84c1-6eb6ba672e25</title>
    <updated>2026-05-03T09:35:15.002626+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5e69b963-c8b7-4482-84c1-6eb6ba672e25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44197", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5e69b963-c8b7-4482-84c1-6eb6ba672e25/export"/>
    <published>2025-10-01T18:11:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f4d92273-326f-401c-9434-d3b0bbce1c43/export</id>
    <title>f4d92273-326f-401c-9434-d3b0bbce1c43</title>
    <updated>2026-05-03T09:35:15.001809+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f4d92273-326f-401c-9434-d3b0bbce1c43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44197", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f4d92273-326f-401c-9434-d3b0bbce1c43/export"/>
    <published>2025-10-08T21:59:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5fe96c62-9ee3-497b-ae24-87a203b5616e/export</id>
    <title>5fe96c62-9ee3-497b-ae24-87a203b5616e</title>
    <updated>2026-05-03T09:35:14.997076+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "5fe96c62-9ee3-497b-ae24-87a203b5616e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miltud3din2f", "content": "", "creation_timestamp": "2026-04-03T13:40:09.436657Z"}</content>
    <link href="https://db.gcve.eu/sighting/5fe96c62-9ee3-497b-ae24-87a203b5616e/export"/>
    <published>2026-04-03T13:40:09.436657+00:00</published>
  </entry>
</feed>
