<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 24 May 2026 19:41:18 +0000</lastBuildDate>
    <item>
      <title>57c9597a-80ba-41b0-bedb-e76f9f8917bc</title>
      <link>https://db.gcve.eu/sighting/57c9597a-80ba-41b0-bedb-e76f9f8917bc/export</link>
      <description>{"uuid": "57c9597a-80ba-41b0-bedb-e76f9f8917bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12643", "type": "seen", "source": "https://t.me/cvedetector/12970", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12643 - Chunghwa Telecom TBM-Client CSRF Absolute Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12643 \nPublished : Dec. 16, 2024, 7:15 a.m. | 34\u00a0minutes ago \nDescription : The tbm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T08:58:50.000000Z"}</description>
      <content:encoded>{"uuid": "57c9597a-80ba-41b0-bedb-e76f9f8917bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12643", "type": "seen", "source": "https://t.me/cvedetector/12970", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12643 - Chunghwa Telecom TBM-Client CSRF Absolute Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12643 \nPublished : Dec. 16, 2024, 7:15 a.m. | 34\u00a0minutes ago \nDescription : The tbm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T08:58:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/57c9597a-80ba-41b0-bedb-e76f9f8917bc/export</guid>
      <pubDate>Mon, 16 Dec 2024 08:58:50 +0000</pubDate>
    </item>
  </channel>
</rss>
