<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 22:40:47 +0000</lastBuildDate>
    <item>
      <title>fb6dbb4f-748c-47c2-9418-2066a8a41bfa</title>
      <link>https://db.gcve.eu/sighting/fb6dbb4f-748c-47c2-9418-2066a8a41bfa/export</link>
      <description>{"uuid": "fb6dbb4f-748c-47c2-9418-2066a8a41bfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "seen", "source": "https://t.me/cybersecplayground/116", "content": "\ud83d\udea8 Critical Alert: CVE-2024-47051 (CVSS 9.1) \u2013 Mautic RCE &amp;amp; File Deletion Vulnerability \ud83d\udea8\n\n\ud83d\udd25 What is CVE-2024-47051?\nA critical security flaw has been discovered in Mautic (before version 5.2.3) that allows:\n\nRemote Code Execution (RCE): \nAttackers can run arbitrary commands on the server.\nArbitrary File Deletion: Attackers can delete critical files, leading to system compromise or service disruption.\n\n\ud83c\udfaf Impact &amp;amp; Risk\nWidespread Exposure: Over 200,000 organizations rely on Mautic for marketing automation.\nPublic-Facing Instances: Many exposed instances are accessible on the internet, making them high-value targets.\n\nPotential Consequences:\nFull server takeover by exploiting RCE\nDeletion of essential system files leading to denial of service (DoS)\nSensitive data leakage\n\n\ud83d\udd0d Detection &amp;amp; Exploitation\n\ud83d\udcca Hunter Exposure: 64K+ instances found on Hunter.\n\n\ud83d\udd0e Dorks:\n\nFOFA: product=\"Mautic\"\nHunter: product.name=\"Mautic\"\n\n\ud83d\udee1 Mitigation &amp;amp; Fix\n\u2705 Upgrade to Mautic 5.2.3+ immediately.\n\u2705 Restrict access to Mautic instances using firewalls and authentication.\n\u2705 Monitor logs for unusual activities or unauthorized access attempts.\n\u2705 Use Web Application Firewalls (WAFs) to detect and block exploit attempts.\n\n\ud83d\udcf0 References &amp;amp; More Info\n\ud83d\udd17 SecurityOnline Info\n\n\ud83d\udce2 Join us for more security updates! \ud83d\udc49 @cybersecplayground\n\n#Mautic #hunterhow #infosec #infosecurity #OSINT #Vulnerability #cybersecplayground \ud83d\ude80", "creation_timestamp": "2025-03-03T06:08:17.000000Z"}</description>
      <content:encoded>{"uuid": "fb6dbb4f-748c-47c2-9418-2066a8a41bfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "seen", "source": "https://t.me/cybersecplayground/116", "content": "\ud83d\udea8 Critical Alert: CVE-2024-47051 (CVSS 9.1) \u2013 Mautic RCE &amp;amp; File Deletion Vulnerability \ud83d\udea8\n\n\ud83d\udd25 What is CVE-2024-47051?\nA critical security flaw has been discovered in Mautic (before version 5.2.3) that allows:\n\nRemote Code Execution (RCE): \nAttackers can run arbitrary commands on the server.\nArbitrary File Deletion: Attackers can delete critical files, leading to system compromise or service disruption.\n\n\ud83c\udfaf Impact &amp;amp; Risk\nWidespread Exposure: Over 200,000 organizations rely on Mautic for marketing automation.\nPublic-Facing Instances: Many exposed instances are accessible on the internet, making them high-value targets.\n\nPotential Consequences:\nFull server takeover by exploiting RCE\nDeletion of essential system files leading to denial of service (DoS)\nSensitive data leakage\n\n\ud83d\udd0d Detection &amp;amp; Exploitation\n\ud83d\udcca Hunter Exposure: 64K+ instances found on Hunter.\n\n\ud83d\udd0e Dorks:\n\nFOFA: product=\"Mautic\"\nHunter: product.name=\"Mautic\"\n\n\ud83d\udee1 Mitigation &amp;amp; Fix\n\u2705 Upgrade to Mautic 5.2.3+ immediately.\n\u2705 Restrict access to Mautic instances using firewalls and authentication.\n\u2705 Monitor logs for unusual activities or unauthorized access attempts.\n\u2705 Use Web Application Firewalls (WAFs) to detect and block exploit attempts.\n\n\ud83d\udcf0 References &amp;amp; More Info\n\ud83d\udd17 SecurityOnline Info\n\n\ud83d\udce2 Join us for more security updates! \ud83d\udc49 @cybersecplayground\n\n#Mautic #hunterhow #infosec #infosecurity #OSINT #Vulnerability #cybersecplayground \ud83d\ude80", "creation_timestamp": "2025-03-03T06:08:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fb6dbb4f-748c-47c2-9418-2066a8a41bfa/export</guid>
      <pubDate>Mon, 03 Mar 2025 06:08:17 +0000</pubDate>
    </item>
    <item>
      <title>fdcc4eb8-984e-4b76-b0cb-ad60bd9938a6</title>
      <link>https://db.gcve.eu/sighting/fdcc4eb8-984e-4b76-b0cb-ad60bd9938a6/export</link>
      <description>{"uuid": "fdcc4eb8-984e-4b76-b0cb-ad60bd9938a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47056", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqaq7z7pjnp2", "content": "", "creation_timestamp": "2025-05-28T17:32:11.010453Z"}</description>
      <content:encoded>{"uuid": "fdcc4eb8-984e-4b76-b0cb-ad60bd9938a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47056", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqaq7z7pjnp2", "content": "", "creation_timestamp": "2025-05-28T17:32:11.010453Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fdcc4eb8-984e-4b76-b0cb-ad60bd9938a6/export</guid>
      <pubDate>Wed, 28 May 2025 17:32:11 +0000</pubDate>
    </item>
    <item>
      <title>629c18a3-ebb8-478e-aad9-d2f019573815</title>
      <link>https://db.gcve.eu/sighting/629c18a3-ebb8-478e-aad9-d2f019573815/export</link>
      <description>{"uuid": "629c18a3-ebb8-478e-aad9-d2f019573815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47055", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqat6o76wyp2", "content": "", "creation_timestamp": "2025-05-28T18:24:14.070809Z"}</description>
      <content:encoded>{"uuid": "629c18a3-ebb8-478e-aad9-d2f019573815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47055", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqat6o76wyp2", "content": "", "creation_timestamp": "2025-05-28T18:24:14.070809Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/629c18a3-ebb8-478e-aad9-d2f019573815/export</guid>
      <pubDate>Wed, 28 May 2025 18:24:14 +0000</pubDate>
    </item>
    <item>
      <title>97debc43-e112-4806-a2b5-b76851c30f3c</title>
      <link>https://db.gcve.eu/sighting/97debc43-e112-4806-a2b5-b76851c30f3c/export</link>
      <description>{"uuid": "97debc43-e112-4806-a2b5-b76851c30f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47057", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqat6w3aezt2", "content": "", "creation_timestamp": "2025-05-28T18:24:23.768503Z"}</description>
      <content:encoded>{"uuid": "97debc43-e112-4806-a2b5-b76851c30f3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47057", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqat6w3aezt2", "content": "", "creation_timestamp": "2025-05-28T18:24:23.768503Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/97debc43-e112-4806-a2b5-b76851c30f3c/export</guid>
      <pubDate>Wed, 28 May 2025 18:24:23 +0000</pubDate>
    </item>
    <item>
      <title>3ae5db58-9646-4358-8b03-e2235d1e9e48</title>
      <link>https://db.gcve.eu/sighting/3ae5db58-9646-4358-8b03-e2235d1e9e48/export</link>
      <description>{"uuid": "3ae5db58-9646-4358-8b03-e2235d1e9e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47055", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgabtmflb2e", "content": "", "creation_timestamp": "2025-05-30T22:01:49.831757Z"}</description>
      <content:encoded>{"uuid": "3ae5db58-9646-4358-8b03-e2235d1e9e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47055", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgabtmflb2e", "content": "", "creation_timestamp": "2025-05-30T22:01:49.831757Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3ae5db58-9646-4358-8b03-e2235d1e9e48/export</guid>
      <pubDate>Fri, 30 May 2025 22:01:49 +0000</pubDate>
    </item>
    <item>
      <title>d8ee5618-fd3c-4180-8ac7-1de275a53a03</title>
      <link>https://db.gcve.eu/sighting/d8ee5618-fd3c-4180-8ac7-1de275a53a03/export</link>
      <description>{"uuid": "d8ee5618-fd3c-4180-8ac7-1de275a53a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47057", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgagqgdxs2r", "content": "", "creation_timestamp": "2025-05-30T22:04:34.523840Z"}</description>
      <content:encoded>{"uuid": "d8ee5618-fd3c-4180-8ac7-1de275a53a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47057", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgagqgdxs2r", "content": "", "creation_timestamp": "2025-05-30T22:04:34.523840Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d8ee5618-fd3c-4180-8ac7-1de275a53a03/export</guid>
      <pubDate>Fri, 30 May 2025 22:04:34 +0000</pubDate>
    </item>
    <item>
      <title>8aef9f1e-54e6-4038-a16d-cf932827a6bb</title>
      <link>https://db.gcve.eu/sighting/8aef9f1e-54e6-4038-a16d-cf932827a6bb/export</link>
      <description>{"uuid": "8aef9f1e-54e6-4038-a16d-cf932827a6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47056", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgam4t2os2m", "content": "", "creation_timestamp": "2025-05-30T22:07:35.305227Z"}</description>
      <content:encoded>{"uuid": "8aef9f1e-54e6-4038-a16d-cf932827a6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47056", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqgam4t2os2m", "content": "", "creation_timestamp": "2025-05-30T22:07:35.305227Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8aef9f1e-54e6-4038-a16d-cf932827a6bb/export</guid>
      <pubDate>Fri, 30 May 2025 22:07:35 +0000</pubDate>
    </item>
    <item>
      <title>9644e1b6-dfb4-40fc-bed5-544cc1a36a17</title>
      <link>https://db.gcve.eu/sighting/9644e1b6-dfb4-40fc-bed5-544cc1a36a17/export</link>
      <description>{"uuid": "9644e1b6-dfb4-40fc-bed5-544cc1a36a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}</description>
      <content:encoded>{"uuid": "9644e1b6-dfb4-40fc-bed5-544cc1a36a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9644e1b6-dfb4-40fc-bed5-544cc1a36a17/export</guid>
      <pubDate>Tue, 12 Aug 2025 13:33:28 +0000</pubDate>
    </item>
    <item>
      <title>55f76555-af65-42dd-a2a9-9d04f7967c78</title>
      <link>https://db.gcve.eu/sighting/55f76555-af65-42dd-a2a9-9d04f7967c78/export</link>
      <description>{"uuid": "55f76555-af65-42dd-a2a9-9d04f7967c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:27.000000Z"}</description>
      <content:encoded>{"uuid": "55f76555-af65-42dd-a2a9-9d04f7967c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/55f76555-af65-42dd-a2a9-9d04f7967c78/export</guid>
      <pubDate>Thu, 21 Aug 2025 03:19:27 +0000</pubDate>
    </item>
    <item>
      <title>bb78c376-316f-402b-bb43-8fd1359f44f6</title>
      <link>https://db.gcve.eu/sighting/bb78c376-316f-402b-bb43-8fd1359f44f6/export</link>
      <description>{"uuid": "bb78c376-316f-402b-bb43-8fd1359f44f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "published-proof-of-concept", "source": "Telegram/6x5JFB1mh-KsEZivZp3gjSaXJ58VhO2Ttj6R645bZY-KT8s", "content": "", "creation_timestamp": "2025-09-29T15:00:07.000000Z"}</description>
      <content:encoded>{"uuid": "bb78c376-316f-402b-bb43-8fd1359f44f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47051", "type": "published-proof-of-concept", "source": "Telegram/6x5JFB1mh-KsEZivZp3gjSaXJ58VhO2Ttj6R645bZY-KT8s", "content": "", "creation_timestamp": "2025-09-29T15:00:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bb78c376-316f-402b-bb43-8fd1359f44f6/export</guid>
      <pubDate>Mon, 29 Sep 2025 15:00:07 +0000</pubDate>
    </item>
  </channel>
</rss>
