<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 01:45:24 +0000</lastBuildDate>
    <item>
      <title>89c9f6a6-7263-4486-876c-440520bb087c</title>
      <link>https://db.gcve.eu/sighting/89c9f6a6-7263-4486-876c-440520bb087c/export</link>
      <description>{"uuid": "89c9f6a6-7263-4486-876c-440520bb087c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32484", "type": "seen", "source": "https://t.me/cvedetector/1459", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-32484 - Ankitects Anki Reflected XSS and File Read\", \n  \"Content\": \"CVE ID : CVE-2024-32484 \nPublished : July 22, 2024, 3:15 p.m. | 34\u00a0minutes ago \nDescription : An reflected XSS vulnerability exists in the handling of invalid paths in the Flask server in Ankitects Anki 24.04. A specially crafted flashcard can lead to JavaScript code execution and result in an arbitrary file read. An attacker can share a malicious flashcard to trigger this vulnerability. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T17:50:04.000000Z"}</description>
      <content:encoded>{"uuid": "89c9f6a6-7263-4486-876c-440520bb087c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32484", "type": "seen", "source": "https://t.me/cvedetector/1459", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-32484 - Ankitects Anki Reflected XSS and File Read\", \n  \"Content\": \"CVE ID : CVE-2024-32484 \nPublished : July 22, 2024, 3:15 p.m. | 34\u00a0minutes ago \nDescription : An reflected XSS vulnerability exists in the handling of invalid paths in the Flask server in Ankitects Anki 24.04. A specially crafted flashcard can lead to JavaScript code execution and result in an arbitrary file read. An attacker can share a malicious flashcard to trigger this vulnerability. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T17:50:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/89c9f6a6-7263-4486-876c-440520bb087c/export</guid>
      <pubDate>Mon, 22 Jul 2024 17:50:04 +0000</pubDate>
    </item>
    <item>
      <title>270dc9a4-4d72-4e1b-9d25-8c580ddbfbab</title>
      <link>https://db.gcve.eu/sighting/270dc9a4-4d72-4e1b-9d25-8c580ddbfbab/export</link>
      <description>{"uuid": "270dc9a4-4d72-4e1b-9d25-8c580ddbfbab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32484", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12157", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43703\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484.\n\ud83d\udccf Published: 2025-04-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-16T21:50:45.391Z\n\ud83d\udd17 References:\n1. https://github.com/ankitects/anki/pull/3925\n2. https://github.com/ankitects/anki/pull/3925/commits/24bca15fd3d9dc386916509eb2d4862d1184e709", "creation_timestamp": "2025-04-16T21:58:52.000000Z"}</description>
      <content:encoded>{"uuid": "270dc9a4-4d72-4e1b-9d25-8c580ddbfbab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32484", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12157", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43703\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484.\n\ud83d\udccf Published: 2025-04-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-16T21:50:45.391Z\n\ud83d\udd17 References:\n1. https://github.com/ankitects/anki/pull/3925\n2. https://github.com/ankitects/anki/pull/3925/commits/24bca15fd3d9dc386916509eb2d4862d1184e709", "creation_timestamp": "2025-04-16T21:58:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/270dc9a4-4d72-4e1b-9d25-8c580ddbfbab/export</guid>
      <pubDate>Wed, 16 Apr 2025 21:58:52 +0000</pubDate>
    </item>
    <item>
      <title>14771579-2809-4851-b3a4-4de06b72b624</title>
      <link>https://db.gcve.eu/sighting/14771579-2809-4851-b3a4-4de06b72b624/export</link>
      <description>{"uuid": "14771579-2809-4851-b3a4-4de06b72b624", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32484", "type": "seen", "source": "https://t.me/cvedetector/23201", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43703 - Anki Ankitects API Key Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43703 \nPublished : April 16, 2025, 10:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T02:06:37.000000Z"}</description>
      <content:encoded>{"uuid": "14771579-2809-4851-b3a4-4de06b72b624", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32484", "type": "seen", "source": "https://t.me/cvedetector/23201", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43703 - Anki Ankitects API Key Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43703 \nPublished : April 16, 2025, 10:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T02:06:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/14771579-2809-4851-b3a4-4de06b72b624/export</guid>
      <pubDate>Thu, 17 Apr 2025 02:06:37 +0000</pubDate>
    </item>
  </channel>
</rss>
