<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T17:51:44.684644+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c0e81cd8-26a7-4f14-b5e4-c94cadb657f4/export</id>
    <title>c0e81cd8-26a7-4f14-b5e4-c94cadb657f4</title>
    <updated>2026-05-04T17:51:45.047313+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c0e81cd8-26a7-4f14-b5e4-c94cadb657f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56441", "type": "seen", "source": "https://t.me/cvedetector/14624", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56441 - Bastet Race Condition Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56441 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Race condition vulnerability in the Bastet module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c0e81cd8-26a7-4f14-b5e4-c94cadb657f4/export"/>
    <published>2025-01-08T04:56:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/75dbe78f-dd14-4ccd-97fa-f212165987b3/export</id>
    <title>75dbe78f-dd14-4ccd-97fa-f212165987b3</title>
    <updated>2026-05-04T17:51:45.047261+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "75dbe78f-dd14-4ccd-97fa-f212165987b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56440", "type": "seen", "source": "https://t.me/cvedetector/14623", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56440 - FortiGate Network Access Permission Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56440 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Permission control vulnerability in the Connectivity module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/75dbe78f-dd14-4ccd-97fa-f212165987b3/export"/>
    <published>2025-01-08T04:56:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb/export</id>
    <title>5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb</title>
    <updated>2026-05-04T17:51:45.047210+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56442", "type": "seen", "source": "https://t.me/cvedetector/14625", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56442 - NFC Service Unauthorized API Use Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56442 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Vulnerability of native APIs not being implemented in the NFC service module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb/export"/>
    <published>2025-01-08T04:56:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/001d479f-1736-4a79-a15b-95be02304e80/export</id>
    <title>001d479f-1736-4a79-a15b-95be02304e80</title>
    <updated>2026-05-04T17:51:45.047156+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "001d479f-1736-4a79-a15b-95be02304e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56444", "type": "seen", "source": "https://t.me/cvedetector/14627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56444 - Adobe Creative Cloud Cross-Process Screen Stack UIExtension Confidentiality Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56444 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/001d479f-1736-4a79-a15b-95be02304e80/export"/>
    <published>2025-01-08T04:56:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/717cf36d-d56f-44ea-af40-46eaa300c639/export</id>
    <title>717cf36d-d56f-44ea-af40-46eaa300c639</title>
    <updated>2026-05-04T17:51:45.047097+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "717cf36d-d56f-44ea-af40-46eaa300c639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56443", "type": "seen", "source": "https://t.me/cvedetector/14626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56443 - Adobe Acrobat UIExtension Cross-Process Screen Stack Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56443 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/717cf36d-d56f-44ea-af40-46eaa300c639/export"/>
    <published>2025-01-08T04:56:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/52396431-26f7-4e9d-b168-531ec4fa8b04/export</id>
    <title>52396431-26f7-4e9d-b168-531ec4fa8b04</title>
    <updated>2026-05-04T17:51:45.047041+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "52396431-26f7-4e9d-b168-531ec4fa8b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56445", "type": "seen", "source": "https://t.me/cvedetector/14628", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56445 - Fortinet FortiOS authentication bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56445 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Instruction authentication bypass vulnerability in the Findnetwork module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/52396431-26f7-4e9d-b168-531ec4fa8b04/export"/>
    <published>2025-01-08T04:56:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/08577259-778c-4481-96a0-f50153b8e562/export</id>
    <title>08577259-778c-4481-96a0-f50153b8e562</title>
    <updated>2026-05-04T17:51:45.046988+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "08577259-778c-4481-96a0-f50153b8e562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4nkdzg2w", "content": "", "creation_timestamp": "2025-01-08T05:38:26.872487Z"}</content>
    <link href="https://db.gcve.eu/sighting/08577259-778c-4481-96a0-f50153b8e562/export"/>
    <published>2025-01-08T05:38:26.872487+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a42f61c0-0e3a-47a0-b9af-17c502e9307f/export</id>
    <title>a42f61c0-0e3a-47a0-b9af-17c502e9307f</title>
    <updated>2026-05-04T17:51:45.046902+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a42f61c0-0e3a-47a0-b9af-17c502e9307f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4o6sh42e", "content": "", "creation_timestamp": "2025-01-08T05:38:29.394151Z"}</content>
    <link href="https://db.gcve.eu/sighting/a42f61c0-0e3a-47a0-b9af-17c502e9307f/export"/>
    <published>2025-01-08T05:38:29.394151+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7c72976a-d8d7-481d-8954-bcd34ad67523/export</id>
    <title>7c72976a-d8d7-481d-8954-bcd34ad67523</title>
    <updated>2026-05-04T17:51:45.046819+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7c72976a-d8d7-481d-8954-bcd34ad67523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://t.me/cvedetector/14643", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56449 - Acquia Drupal Account Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-56449 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Privilege escalation vulnerability in the Account module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7c72976a-d8d7-481d-8954-bcd34ad67523/export"/>
    <published>2025-01-08T05:46:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3216dd84-ab1e-445c-aac1-8d8400d5231c/export</id>
    <title>3216dd84-ab1e-445c-aac1-8d8400d5231c</title>
    <updated>2026-05-04T17:51:45.040079+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3216dd84-ab1e-445c-aac1-8d8400d5231c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://t.me/cvedetector/14642", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56448 - Netflix Home Screen Widget Module Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56448 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Vulnerability of improper access control in the home screen widget module  \nImpact: Successful exploitation of this vulnerability may affect availability. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3216dd84-ab1e-445c-aac1-8d8400d5231c/export"/>
    <published>2025-01-08T05:46:49+00:00</published>
  </entry>
</feed>
