<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 16 May 2026 22:46:42 +0000</lastBuildDate>
    <item>
      <title>9bdaef63-0ec6-4550-9e94-262e77358bd2</title>
      <link>https://db.gcve.eu/sighting/9bdaef63-0ec6-4550-9e94-262e77358bd2/export</link>
      <description>{"uuid": "9bdaef63-0ec6-4550-9e94-262e77358bd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46471", "type": "seen", "source": "https://t.me/cvedetector/6542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46471 - CodeAstro Membership Management System Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46471 \nPublished : Sept. 27, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : The Directory Listing in /uploads/ Folder in CodeAstro Membership Management System 1.0 exposes the structure and contents of directories, potentially revealing sensitive information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T18:24:18.000000Z"}</description>
      <content:encoded>{"uuid": "9bdaef63-0ec6-4550-9e94-262e77358bd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46471", "type": "seen", "source": "https://t.me/cvedetector/6542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46471 - CodeAstro Membership Management System Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46471 \nPublished : Sept. 27, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : The Directory Listing in /uploads/ Folder in CodeAstro Membership Management System 1.0 exposes the structure and contents of directories, potentially revealing sensitive information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T18:24:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9bdaef63-0ec6-4550-9e94-262e77358bd2/export</guid>
      <pubDate>Fri, 27 Sep 2024 18:24:18 +0000</pubDate>
    </item>
    <item>
      <title>99c72323-ac8e-47ec-b703-f8553796f915</title>
      <link>https://db.gcve.eu/sighting/99c72323-ac8e-47ec-b703-f8553796f915/export</link>
      <description>{"uuid": "99c72323-ac8e-47ec-b703-f8553796f915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46472", "type": "seen", "source": "https://t.me/cvedetector/6543", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46472 - CodeAstro Membership Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46472 \nPublished : Sept. 27, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection via the parameter 'email' in the Login Page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T18:24:22.000000Z"}</description>
      <content:encoded>{"uuid": "99c72323-ac8e-47ec-b703-f8553796f915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46472", "type": "seen", "source": "https://t.me/cvedetector/6543", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46472 - CodeAstro Membership Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46472 \nPublished : Sept. 27, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection via the parameter 'email' in the Login Page. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T18:24:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/99c72323-ac8e-47ec-b703-f8553796f915/export</guid>
      <pubDate>Fri, 27 Sep 2024 18:24:22 +0000</pubDate>
    </item>
    <item>
      <title>2568a17c-4d1d-4e6d-aeaa-7cb7be781b08</title>
      <link>https://db.gcve.eu/sighting/2568a17c-4d1d-4e6d-aeaa-7cb7be781b08/export</link>
      <description>{"uuid": "2568a17c-4d1d-4e6d-aeaa-7cb7be781b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46475", "type": "seen", "source": "https://t.me/cvedetector/6659", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46475 - Metronic Admin Dashboard Template Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-46475 \nPublished : Sept. 30, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : A reflected cross-site scripting (XSS) vulnerability on the homepage of Metronic Admin Dashboard Template v2.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-30T19:09:59.000000Z"}</description>
      <content:encoded>{"uuid": "2568a17c-4d1d-4e6d-aeaa-7cb7be781b08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46475", "type": "seen", "source": "https://t.me/cvedetector/6659", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46475 - Metronic Admin Dashboard Template Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-46475 \nPublished : Sept. 30, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : A reflected cross-site scripting (XSS) vulnerability on the homepage of Metronic Admin Dashboard Template v2.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-30T19:09:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2568a17c-4d1d-4e6d-aeaa-7cb7be781b08/export</guid>
      <pubDate>Mon, 30 Sep 2024 19:09:59 +0000</pubDate>
    </item>
    <item>
      <title>b73b6170-5e61-4145-91fd-bf09c57be010</title>
      <link>https://db.gcve.eu/sighting/b73b6170-5e61-4145-91fd-bf09c57be010/export</link>
      <description>{"uuid": "b73b6170-5e61-4145-91fd-bf09c57be010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46478", "type": "seen", "source": "https://t.me/cvedetector/8826", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46478 - \"HTMLDOC Buffer Overflow Vulnerability in parse_pre function\"\", \n  \"Content\": \"CVE ID : CVE-2024-46478 \nPublished : Oct. 24, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : HTMLDOC v1.9.18 contains a buffer overflow in parse_pre function,ps-pdf.cxx:5681. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:00:19.000000Z"}</description>
      <content:encoded>{"uuid": "b73b6170-5e61-4145-91fd-bf09c57be010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46478", "type": "seen", "source": "https://t.me/cvedetector/8826", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46478 - \"HTMLDOC Buffer Overflow Vulnerability in parse_pre function\"\", \n  \"Content\": \"CVE ID : CVE-2024-46478 \nPublished : Oct. 24, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : HTMLDOC v1.9.18 contains a buffer overflow in parse_pre function,ps-pdf.cxx:5681. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T21:00:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b73b6170-5e61-4145-91fd-bf09c57be010/export</guid>
      <pubDate>Thu, 24 Oct 2024 21:00:19 +0000</pubDate>
    </item>
    <item>
      <title>9ab15817-31f5-408b-93fe-9a5880f9bfe7</title>
      <link>https://db.gcve.eu/sighting/9ab15817-31f5-408b-93fe-9a5880f9bfe7/export</link>
      <description>{"uuid": "9ab15817-31f5-408b-93fe-9a5880f9bfe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113822351287174035", "content": "", "creation_timestamp": "2025-01-13T18:00:49.417839Z"}</description>
      <content:encoded>{"uuid": "9ab15817-31f5-408b-93fe-9a5880f9bfe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113822351287174035", "content": "", "creation_timestamp": "2025-01-13T18:00:49.417839Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9ab15817-31f5-408b-93fe-9a5880f9bfe7/export</guid>
      <pubDate>Mon, 13 Jan 2025 18:00:49 +0000</pubDate>
    </item>
    <item>
      <title>3f955ef3-9cc9-4809-ba07-4bb451b9bb64</title>
      <link>https://db.gcve.eu/sighting/3f955ef3-9cc9-4809-ba07-4bb451b9bb64/export</link>
      <description>{"uuid": "3f955ef3-9cc9-4809-ba07-4bb451b9bb64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113822538846167508", "content": "", "creation_timestamp": "2025-01-13T18:48:37.544880Z"}</description>
      <content:encoded>{"uuid": "3f955ef3-9cc9-4809-ba07-4bb451b9bb64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113822538846167508", "content": "", "creation_timestamp": "2025-01-13T18:48:37.544880Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3f955ef3-9cc9-4809-ba07-4bb451b9bb64/export</guid>
      <pubDate>Mon, 13 Jan 2025 18:48:37 +0000</pubDate>
    </item>
    <item>
      <title>4f1f0768-b0e8-4b88-b02b-f95b5b51c52e</title>
      <link>https://db.gcve.eu/sighting/4f1f0768-b0e8-4b88-b02b-f95b5b51c52e/export</link>
      <description>{"uuid": "4f1f0768-b0e8-4b88-b02b-f95b5b51c52e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://t.me/cvedetector/15165", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46479 - Venki Supravizio BPM Remote File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46479 \nPublished : Jan. 13, 2025, 6:15 p.m. | 43\u00a0minutes ago \nDescription : Venki Supravizio BPM through 18.0.1 was discovered to contain an arbitrary file upload vulnerability. An authenticated attacker may upload a malicious file, leading to remote code execution. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T20:25:22.000000Z"}</description>
      <content:encoded>{"uuid": "4f1f0768-b0e8-4b88-b02b-f95b5b51c52e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://t.me/cvedetector/15165", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46479 - Venki Supravizio BPM Remote File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46479 \nPublished : Jan. 13, 2025, 6:15 p.m. | 43\u00a0minutes ago \nDescription : Venki Supravizio BPM through 18.0.1 was discovered to contain an arbitrary file upload vulnerability. An authenticated attacker may upload a malicious file, leading to remote code execution. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T20:25:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4f1f0768-b0e8-4b88-b02b-f95b5b51c52e/export</guid>
      <pubDate>Mon, 13 Jan 2025 20:25:22 +0000</pubDate>
    </item>
    <item>
      <title>47c9d866-c140-4ae5-bf67-c9b4c15db6b8</title>
      <link>https://db.gcve.eu/sighting/47c9d866-c140-4ae5-bf67-c9b4c15db6b8/export</link>
      <description>{"uuid": "47c9d866-c140-4ae5-bf67-c9b4c15db6b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfpuitub252e", "content": "", "creation_timestamp": "2025-01-14T18:20:29.799210Z"}</description>
      <content:encoded>{"uuid": "47c9d866-c140-4ae5-bf67-c9b4c15db6b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46479", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfpuitub252e", "content": "", "creation_timestamp": "2025-01-14T18:20:29.799210Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/47c9d866-c140-4ae5-bf67-c9b4c15db6b8/export</guid>
      <pubDate>Tue, 14 Jan 2025 18:20:29 +0000</pubDate>
    </item>
    <item>
      <title>5de9e974-585d-4da7-917c-28cebc65d2de</title>
      <link>https://db.gcve.eu/sighting/5de9e974-585d-4da7-917c-28cebc65d2de/export</link>
      <description>{"uuid": "5de9e974-585d-4da7-917c-28cebc65d2de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4647", "type": "seen", "source": "Telegram/iJ5TTHatIMBvDs1Ju3jKgMw7tjcdMSJqKvNOBAPCkOcdN71P", "content": "", "creation_timestamp": "2025-02-19T19:14:02.000000Z"}</description>
      <content:encoded>{"uuid": "5de9e974-585d-4da7-917c-28cebc65d2de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4647", "type": "seen", "source": "Telegram/iJ5TTHatIMBvDs1Ju3jKgMw7tjcdMSJqKvNOBAPCkOcdN71P", "content": "", "creation_timestamp": "2025-02-19T19:14:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5de9e974-585d-4da7-917c-28cebc65d2de/export</guid>
      <pubDate>Wed, 19 Feb 2025 19:14:02 +0000</pubDate>
    </item>
    <item>
      <title>bf292c7e-b7ee-4014-a174-645b348df79f</title>
      <link>https://db.gcve.eu/sighting/bf292c7e-b7ee-4014-a174-645b348df79f/export</link>
      <description>{"uuid": "bf292c7e-b7ee-4014-a174-645b348df79f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46478", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3met4f2wbfk22", "content": "", "creation_timestamp": "2026-02-14T13:20:36.619490Z"}</description>
      <content:encoded>{"uuid": "bf292c7e-b7ee-4014-a174-645b348df79f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46478", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3met4f2wbfk22", "content": "", "creation_timestamp": "2026-02-14T13:20:36.619490Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bf292c7e-b7ee-4014-a174-645b348df79f/export</guid>
      <pubDate>Sat, 14 Feb 2026 13:20:36 +0000</pubDate>
    </item>
  </channel>
</rss>
