<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 20:33:34 +0000</lastBuildDate>
    <item>
      <title>0ccc186b-7554-4b4e-affc-00f2c7deb644</title>
      <link>https://db.gcve.eu/sighting/0ccc186b-7554-4b4e-affc-00f2c7deb644/export</link>
      <description>{"uuid": "0ccc186b-7554-4b4e-affc-00f2c7deb644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14865", "type": "seen", "source": "https://t.me/cveNotify/182", "content": "\ud83d\udea8 #CVE-2018-14865\nReport engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14865\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-04T17:59:56.000000Z"}</description>
      <content:encoded>{"uuid": "0ccc186b-7554-4b4e-affc-00f2c7deb644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14865", "type": "seen", "source": "https://t.me/cveNotify/182", "content": "\ud83d\udea8 #CVE-2018-14865\nReport engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14865\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-04T17:59:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0ccc186b-7554-4b4e-affc-00f2c7deb644/export</guid>
      <pubDate>Thu, 04 Jul 2019 17:59:56 +0000</pubDate>
    </item>
    <item>
      <title>3a431fb2-5dec-49b3-8218-8990104ce75c</title>
      <link>https://db.gcve.eu/sighting/3a431fb2-5dec-49b3-8218-8990104ce75c/export</link>
      <description>{"uuid": "3a431fb2-5dec-49b3-8218-8990104ce75c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14865", "type": "seen", "source": "https://t.me/cveNotify/238", "content": "\ud83d\udea8 #CVE-2018-14865\nReport engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14865\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-05T17:00:10.000000Z"}</description>
      <content:encoded>{"uuid": "3a431fb2-5dec-49b3-8218-8990104ce75c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14865", "type": "seen", "source": "https://t.me/cveNotify/238", "content": "\ud83d\udea8 #CVE-2018-14865\nReport engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14865\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-05T17:00:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3a431fb2-5dec-49b3-8218-8990104ce75c/export</guid>
      <pubDate>Fri, 05 Jul 2019 17:00:10 +0000</pubDate>
    </item>
  </channel>
</rss>
