<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 13:30:34 +0000</lastBuildDate>
    <item>
      <title>e6c1c47b-ffae-49e8-9594-c68fd59e5dd4</title>
      <link>https://db.gcve.eu/sighting/e6c1c47b-ffae-49e8-9594-c68fd59e5dd4/export</link>
      <description>{"uuid": "e6c1c47b-ffae-49e8-9594-c68fd59e5dd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45789", "type": "seen", "source": "https://t.me/cvedetector/5347", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45789 - VMware aiM-Star Infinite Account Registration Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-45789 \nPublished : Sept. 11, 2024, 12:15 p.m. | 38\u00a0minutes ago \nDescription : This vulnerability exists in Reedos aiM-Star version 2.0.1 due to improper validation of the \u2018mode\u2019 parameter in the API endpoint used during the registration process. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body on the vulnerable application.  \n  \nSuccessful exploitation of this vulnerability could allow the attacker to bypass certain constraints in the registration process leading to creation of multiple accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-11T15:20:25.000000Z"}</description>
      <content:encoded>{"uuid": "e6c1c47b-ffae-49e8-9594-c68fd59e5dd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45789", "type": "seen", "source": "https://t.me/cvedetector/5347", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45789 - VMware aiM-Star Infinite Account Registration Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-45789 \nPublished : Sept. 11, 2024, 12:15 p.m. | 38\u00a0minutes ago \nDescription : This vulnerability exists in Reedos aiM-Star version 2.0.1 due to improper validation of the \u2018mode\u2019 parameter in the API endpoint used during the registration process. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body on the vulnerable application.  \n  \nSuccessful exploitation of this vulnerability could allow the attacker to bypass certain constraints in the registration process leading to creation of multiple accounts. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-11T15:20:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e6c1c47b-ffae-49e8-9594-c68fd59e5dd4/export</guid>
      <pubDate>Wed, 11 Sep 2024 15:20:25 +0000</pubDate>
    </item>
  </channel>
</rss>
