<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 07:58:09 +0000</lastBuildDate>
    <item>
      <title>726bb305-a70f-4ef9-bb47-835bd0d82640</title>
      <link>https://db.gcve.eu/sighting/726bb305-a70f-4ef9-bb47-835bd0d82640/export</link>
      <description>{"uuid": "726bb305-a70f-4ef9-bb47-835bd0d82640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44195", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldpjmmsnx42m", "content": "", "creation_timestamp": "2024-12-20T04:15:22.534792Z"}</description>
      <content:encoded>{"uuid": "726bb305-a70f-4ef9-bb47-835bd0d82640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44195", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldpjmmsnx42m", "content": "", "creation_timestamp": "2024-12-20T04:15:22.534792Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/726bb305-a70f-4ef9-bb47-835bd0d82640/export</guid>
      <pubDate>Fri, 20 Dec 2024 04:15:22 +0000</pubDate>
    </item>
    <item>
      <title>95e8f954-f574-4dbe-bd04-3e960c7549fe</title>
      <link>https://db.gcve.eu/sighting/95e8f954-f574-4dbe-bd04-3e960c7549fe/export</link>
      <description>{"uuid": "95e8f954-f574-4dbe-bd04-3e960c7549fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44195", "type": "seen", "source": "https://t.me/cvedetector/13403", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44195 - \"macOS Sequoia File Path Manipulation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-44195 \nPublished : Dec. 20, 2024, 4:15 a.m. | 33\u00a0minutes ago \nDescription : A logic issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.1. An app may be able to read arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T05:52:24.000000Z"}</description>
      <content:encoded>{"uuid": "95e8f954-f574-4dbe-bd04-3e960c7549fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44195", "type": "seen", "source": "https://t.me/cvedetector/13403", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44195 - \"macOS Sequoia File Path Manipulation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-44195 \nPublished : Dec. 20, 2024, 4:15 a.m. | 33\u00a0minutes ago \nDescription : A logic issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.1. An app may be able to read arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T05:52:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/95e8f954-f574-4dbe-bd04-3e960c7549fe/export</guid>
      <pubDate>Fri, 20 Dec 2024 05:52:24 +0000</pubDate>
    </item>
    <item>
      <title>c74b3ce1-de76-49d1-9241-c6715216657f</title>
      <link>https://db.gcve.eu/sighting/c74b3ce1-de76-49d1-9241-c6715216657f/export</link>
      <description>{"uuid": "c74b3ce1-de76-49d1-9241-c6715216657f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://t.me/S_E_Reborn/5335", "content": "\u0412\u0441\u0435\u043c \u043f\u0440\u0438\u0432\u0435\u0442! \n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows, \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u0433\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0442 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432: \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441\u043b\u0435\u0436\u0435\u043d\u0438\u044f, \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0438\u0433\u0440\u0443\u0448\u043a\u0438. \u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u0432\u043e\u0435\u043c \u043e\u043d\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u0440\u0430\u0431\u043e\u0442\u0430\u044f \u043e\u0442 \u043b\u0438\u0446\u0430 NT AUTHORITY\\SYSTEM. \n\n\u041f\u0440\u0438\u0447\u0435\u043c, \u043a\u0430\u043a \u044f \u043f\u043e\u043d\u0438\u043c\u0430\u044e, \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0444\u0438\u0440\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u041f\u041e, \u0447\u0442\u043e \u0443\u0441\u043b\u043e\u0436\u043d\u044f\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0434\u0430\u0435\u0442 \u043d\u0430\u043c \u0435\u0449\u0435 \u043e\u0434\u0438\u043d \u0432\u0435\u043a\u0442\u043e\u0440 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \n\n\u0415\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0441\u0431\u043e\u0440\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u041f\u041e \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435:\n# \u0418\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 \u0438\u0437 \u0440\u0435\u0435\u0441\u0442\u0440\u0430\nGet-ChildItem \"HKLM:\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" | Get-ItemProperty | Where-Object {$_.DisplayName -ne $null} | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate\n\n# wmi\nwmic product get name,version,vendor  \n\n# Seatbelt\n.\\SeatBelt.exe InstalledProducts\n\n\u0425\u043e\u0447\u0443 \u043f\u043e\u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u0441 \u0432\u0430\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c \u0441\u043f\u0438\u0441\u043e\u0447\u043a\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u043b\u0443\u0436\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u0432\u0437\u044f\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u0430\u0447\u043a\u0435. \u041e\u0434\u043d\u043e\u0437\u043d\u0430\u0447\u043d\u043e \u043d\u0443\u0436\u043d\u043e \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 Exploit-Street, \u043d\u043e \u044f \u0447\u0442\u043e-\u0442\u043e \u043d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0440\u0438\u0434\u0443\u043c\u0430\u0442\u044c \u043a\u0430\u043a. \u041c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0438\u0434\u0435\u0438?\n\nManageEngine ServiceDesk\n- https://github.com/horizon3ai/CVE-2021-44077\n\nManageEngine ADSelfService\n- https://github.com/synacktiv/CVE-2021-40539\n- CVE-2022-47966\n- CVE-XXXX-XXXX (\u0441 \u0432\u0435\u0440\u0441\u0438\u0438 ADSelfService Plus 4.2.9, 2012 \u0438 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.3 Build 6301)\n\nUserManager\n- CVE-2023-36047\n\nITunes\n- CVE-2024-44193\n\nRazer ( \u0434\u043e 3.7.1209.121307)\n- RazerEoP\n\nDatacard XPS Card Printer Driver \n- CVE-2024-34329\n\nAppGate\n- CVE-2019-19793\n\nSeagate\n- CVE-2022-40286\n\nAWS VPN Client\n- CVE-2022-25165\n\nAIDA (\u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438 \u043d\u0438\u0436\u0435 7.00.6742)\n- AIDA64DRIVER-EOP\n\nVboxSDS\n- CVE-2024-21111\n\nTeamViewer\n- CVE-2024-7479 CVE-2024-7481\n\nGamingService \u043e\u0442 XBOX\n- GamingServiceEoP\n- GamingServiceEoP5\n\nChrome Updater\n- CVE-2023-7261\n\nPlantronics Desktop Hub\n- CVE-2024-27460", "creation_timestamp": "2024-12-26T13:38:29.000000Z"}</description>
      <content:encoded>{"uuid": "c74b3ce1-de76-49d1-9241-c6715216657f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://t.me/S_E_Reborn/5335", "content": "\u0412\u0441\u0435\u043c \u043f\u0440\u0438\u0432\u0435\u0442! \n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows, \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u0433\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0442 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432: \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441\u043b\u0435\u0436\u0435\u043d\u0438\u044f, \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0438\u0433\u0440\u0443\u0448\u043a\u0438. \u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u0432\u043e\u0435\u043c \u043e\u043d\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u0440\u0430\u0431\u043e\u0442\u0430\u044f \u043e\u0442 \u043b\u0438\u0446\u0430 NT AUTHORITY\\SYSTEM. \n\n\u041f\u0440\u0438\u0447\u0435\u043c, \u043a\u0430\u043a \u044f \u043f\u043e\u043d\u0438\u043c\u0430\u044e, \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0444\u0438\u0440\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u041f\u041e, \u0447\u0442\u043e \u0443\u0441\u043b\u043e\u0436\u043d\u044f\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0434\u0430\u0435\u0442 \u043d\u0430\u043c \u0435\u0449\u0435 \u043e\u0434\u0438\u043d \u0432\u0435\u043a\u0442\u043e\u0440 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \n\n\u0415\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0441\u0431\u043e\u0440\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u041f\u041e \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435:\n# \u0418\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 \u0438\u0437 \u0440\u0435\u0435\u0441\u0442\u0440\u0430\nGet-ChildItem \"HKLM:\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" | Get-ItemProperty | Where-Object {$_.DisplayName -ne $null} | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate\n\n# wmi\nwmic product get name,version,vendor  \n\n# Seatbelt\n.\\SeatBelt.exe InstalledProducts\n\n\u0425\u043e\u0447\u0443 \u043f\u043e\u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u0441 \u0432\u0430\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c \u0441\u043f\u0438\u0441\u043e\u0447\u043a\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u043b\u0443\u0436\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u0432\u0437\u044f\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u0430\u0447\u043a\u0435. \u041e\u0434\u043d\u043e\u0437\u043d\u0430\u0447\u043d\u043e \u043d\u0443\u0436\u043d\u043e \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 Exploit-Street, \u043d\u043e \u044f \u0447\u0442\u043e-\u0442\u043e \u043d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0440\u0438\u0434\u0443\u043c\u0430\u0442\u044c \u043a\u0430\u043a. \u041c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0438\u0434\u0435\u0438?\n\nManageEngine ServiceDesk\n- https://github.com/horizon3ai/CVE-2021-44077\n\nManageEngine ADSelfService\n- https://github.com/synacktiv/CVE-2021-40539\n- CVE-2022-47966\n- CVE-XXXX-XXXX (\u0441 \u0432\u0435\u0440\u0441\u0438\u0438 ADSelfService Plus 4.2.9, 2012 \u0438 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.3 Build 6301)\n\nUserManager\n- CVE-2023-36047\n\nITunes\n- CVE-2024-44193\n\nRazer ( \u0434\u043e 3.7.1209.121307)\n- RazerEoP\n\nDatacard XPS Card Printer Driver \n- CVE-2024-34329\n\nAppGate\n- CVE-2019-19793\n\nSeagate\n- CVE-2022-40286\n\nAWS VPN Client\n- CVE-2022-25165\n\nAIDA (\u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438 \u043d\u0438\u0436\u0435 7.00.6742)\n- AIDA64DRIVER-EOP\n\nVboxSDS\n- CVE-2024-21111\n\nTeamViewer\n- CVE-2024-7479 CVE-2024-7481\n\nGamingService \u043e\u0442 XBOX\n- GamingServiceEoP\n- GamingServiceEoP5\n\nChrome Updater\n- CVE-2023-7261\n\nPlantronics Desktop Hub\n- CVE-2024-27460", "creation_timestamp": "2024-12-26T13:38:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c74b3ce1-de76-49d1-9241-c6715216657f/export</guid>
      <pubDate>Thu, 26 Dec 2024 13:38:29 +0000</pubDate>
    </item>
    <item>
      <title>6ff71451-0e3a-474b-a013-5485a927878d</title>
      <link>https://db.gcve.eu/sighting/6ff71451-0e3a-474b-a013-5485a927878d/export</link>
      <description>{"uuid": "6ff71451-0e3a-474b-a013-5485a927878d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44192", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44192\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash.\n\ud83d\udccf Published: 2025-03-10T19:11:09.176Z\n\ud83d\udccf Modified: 2025-03-10T19:11:09.176Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121238\n2. https://support.apple.com/en-us/121248\n3. https://support.apple.com/en-us/121249\n4. https://support.apple.com/en-us/121250\n5. https://support.apple.com/en-us/121240\n6. https://support.apple.com/en-us/121241", "creation_timestamp": "2025-03-10T19:38:27.000000Z"}</description>
      <content:encoded>{"uuid": "6ff71451-0e3a-474b-a013-5485a927878d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44192", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44192\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash.\n\ud83d\udccf Published: 2025-03-10T19:11:09.176Z\n\ud83d\udccf Modified: 2025-03-10T19:11:09.176Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121238\n2. https://support.apple.com/en-us/121248\n3. https://support.apple.com/en-us/121249\n4. https://support.apple.com/en-us/121250\n5. https://support.apple.com/en-us/121240\n6. https://support.apple.com/en-us/121241", "creation_timestamp": "2025-03-10T19:38:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6ff71451-0e3a-474b-a013-5485a927878d/export</guid>
      <pubDate>Mon, 10 Mar 2025 19:38:27 +0000</pubDate>
    </item>
    <item>
      <title>c00fec96-9974-4add-b9f3-a9afd281dde6</title>
      <link>https://db.gcve.eu/sighting/c00fec96-9974-4add-b9f3-a9afd281dde6/export</link>
      <description>{"uuid": "c00fec96-9974-4add-b9f3-a9afd281dde6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8310", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44199\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause unexpected system termination or read kernel memory.\n\ud83d\udccf Published: 2025-03-20T23:53:44.753Z\n\ud83d\udccf Modified: 2025-03-20T23:53:44.753Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/120911", "creation_timestamp": "2025-03-21T00:23:15.000000Z"}</description>
      <content:encoded>{"uuid": "c00fec96-9974-4add-b9f3-a9afd281dde6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8310", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44199\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause unexpected system termination or read kernel memory.\n\ud83d\udccf Published: 2025-03-20T23:53:44.753Z\n\ud83d\udccf Modified: 2025-03-20T23:53:44.753Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/120911", "creation_timestamp": "2025-03-21T00:23:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c00fec96-9974-4add-b9f3-a9afd281dde6/export</guid>
      <pubDate>Fri, 21 Mar 2025 00:23:15 +0000</pubDate>
    </item>
    <item>
      <title>ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb</title>
      <link>https://db.gcve.eu/sighting/ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb/export</link>
      <description>{"uuid": "ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkuand4kiz2x", "content": "", "creation_timestamp": "2025-03-21T03:14:22.300439Z"}</description>
      <content:encoded>{"uuid": "ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkuand4kiz2x", "content": "", "creation_timestamp": "2025-03-21T03:14:22.300439Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ba6f9f53-47ac-46c3-b44c-5d7f49abc2cb/export</guid>
      <pubDate>Fri, 21 Mar 2025 03:14:22 +0000</pubDate>
    </item>
    <item>
      <title>438a390d-c1cc-455a-a4bc-eb729cd5cc17</title>
      <link>https://db.gcve.eu/sighting/438a390d-c1cc-455a-a4bc-eb729cd5cc17/export</link>
      <description>{"uuid": "438a390d-c1cc-455a-a4bc-eb729cd5cc17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://t.me/cvedetector/20785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44199 - Apple macOS out-of-bounds read vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44199 \nPublished : March 21, 2025, 12:15 a.m. | 2\u00a0hours, 16\u00a0minutes ago \nDescription : An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause unexpected system termination or read kernel memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T04:16:34.000000Z"}</description>
      <content:encoded>{"uuid": "438a390d-c1cc-455a-a4bc-eb729cd5cc17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44199", "type": "seen", "source": "https://t.me/cvedetector/20785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44199 - Apple macOS out-of-bounds read vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44199 \nPublished : March 21, 2025, 12:15 a.m. | 2\u00a0hours, 16\u00a0minutes ago \nDescription : An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause unexpected system termination or read kernel memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T04:16:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/438a390d-c1cc-455a-a4bc-eb729cd5cc17/export</guid>
      <pubDate>Fri, 21 Mar 2025 04:16:34 +0000</pubDate>
    </item>
    <item>
      <title>5e69b963-c8b7-4482-84c1-6eb6ba672e25</title>
      <link>https://db.gcve.eu/sighting/5e69b963-c8b7-4482-84c1-6eb6ba672e25/export</link>
      <description>{"uuid": "5e69b963-c8b7-4482-84c1-6eb6ba672e25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44197", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:57.000000Z"}</description>
      <content:encoded>{"uuid": "5e69b963-c8b7-4482-84c1-6eb6ba672e25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44197", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5e69b963-c8b7-4482-84c1-6eb6ba672e25/export</guid>
      <pubDate>Wed, 01 Oct 2025 18:11:57 +0000</pubDate>
    </item>
    <item>
      <title>f4d92273-326f-401c-9434-d3b0bbce1c43</title>
      <link>https://db.gcve.eu/sighting/f4d92273-326f-401c-9434-d3b0bbce1c43/export</link>
      <description>{"uuid": "f4d92273-326f-401c-9434-d3b0bbce1c43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44197", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:28.000000Z"}</description>
      <content:encoded>{"uuid": "f4d92273-326f-401c-9434-d3b0bbce1c43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44197", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f4d92273-326f-401c-9434-d3b0bbce1c43/export</guid>
      <pubDate>Wed, 08 Oct 2025 21:59:28 +0000</pubDate>
    </item>
    <item>
      <title>5fe96c62-9ee3-497b-ae24-87a203b5616e</title>
      <link>https://db.gcve.eu/sighting/5fe96c62-9ee3-497b-ae24-87a203b5616e/export</link>
      <description>{"uuid": "5fe96c62-9ee3-497b-ae24-87a203b5616e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miltud3din2f", "content": "", "creation_timestamp": "2026-04-03T13:40:09.436657Z"}</description>
      <content:encoded>{"uuid": "5fe96c62-9ee3-497b-ae24-87a203b5616e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miltud3din2f", "content": "", "creation_timestamp": "2026-04-03T13:40:09.436657Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5fe96c62-9ee3-497b-ae24-87a203b5616e/export</guid>
      <pubDate>Fri, 03 Apr 2026 13:40:09 +0000</pubDate>
    </item>
  </channel>
</rss>
