<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 05:50:29 +0000</lastBuildDate>
    <item>
      <title>25323914-9154-4330-982a-dfcce6e48252</title>
      <link>https://db.gcve.eu/sighting/25323914-9154-4330-982a-dfcce6e48252/export</link>
      <description>{"uuid": "25323914-9154-4330-982a-dfcce6e48252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47766", "type": "seen", "source": "https://t.me/cvedetector/7852", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47766 - \"Tuleap Unrestricted Cross-Tracker Search Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-47766 \nPublished : Oct. 14, 2024, 6:15 p.m. | 30\u00a0minutes ago \nDescription : Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, administrators of a project can access the content of trackers with permissions restrictions of project they are members of but not admin via the cross tracker search widget. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-14T20:51:51.000000Z"}</description>
      <content:encoded>{"uuid": "25323914-9154-4330-982a-dfcce6e48252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47766", "type": "seen", "source": "https://t.me/cvedetector/7852", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47766 - \"Tuleap Unrestricted Cross-Tracker Search Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-47766 \nPublished : Oct. 14, 2024, 6:15 p.m. | 30\u00a0minutes ago \nDescription : Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, administrators of a project can access the content of trackers with permissions restrictions of project they are members of but not admin via the cross tracker search widget. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-14T20:51:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/25323914-9154-4330-982a-dfcce6e48252/export</guid>
      <pubDate>Mon, 14 Oct 2024 20:51:51 +0000</pubDate>
    </item>
  </channel>
</rss>
