<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 13:10:09 +0000</lastBuildDate>
    <item>
      <title>61ca1981-02dd-40c4-9282-44abb88ea23c</title>
      <link>https://db.gcve.eu/sighting/61ca1981-02dd-40c4-9282-44abb88ea23c/export</link>
      <description>{"uuid": "61ca1981-02dd-40c4-9282-44abb88ea23c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48008", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113645796954137068", "content": "", "creation_timestamp": "2024-12-13T13:40:44.282624Z"}</description>
      <content:encoded>{"uuid": "61ca1981-02dd-40c4-9282-44abb88ea23c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48008", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113645796954137068", "content": "", "creation_timestamp": "2024-12-13T13:40:44.282624Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/61ca1981-02dd-40c4-9282-44abb88ea23c/export</guid>
      <pubDate>Fri, 13 Dec 2024 13:40:44 +0000</pubDate>
    </item>
    <item>
      <title>eb5290f3-454c-46a2-a54e-cc2ea6a0f4e7</title>
      <link>https://db.gcve.eu/sighting/eb5290f3-454c-46a2-a54e-cc2ea6a0f4e7/export</link>
      <description>{"uuid": "eb5290f3-454c-46a2-a54e-cc2ea6a0f4e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48007", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113645905370786684", "content": "", "creation_timestamp": "2024-12-13T14:08:18.512697Z"}</description>
      <content:encoded>{"uuid": "eb5290f3-454c-46a2-a54e-cc2ea6a0f4e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48007", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113645905370786684", "content": "", "creation_timestamp": "2024-12-13T14:08:18.512697Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/eb5290f3-454c-46a2-a54e-cc2ea6a0f4e7/export</guid>
      <pubDate>Fri, 13 Dec 2024 14:08:18 +0000</pubDate>
    </item>
    <item>
      <title>0e7fcf74-06b6-487b-a529-5d863b577c0d</title>
      <link>https://db.gcve.eu/sighting/0e7fcf74-06b6-487b-a529-5d863b577c0d/export</link>
      <description>{"uuid": "0e7fcf74-06b6-487b-a529-5d863b577c0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48007", "type": "seen", "source": "https://t.me/cvedetector/12869", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48007 - Dell RecoverPoint for Virtual Machines Hard-Coded Credentials Remote Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-48007 \nPublished : Dec. 13, 2024, 2:15 p.m. | 24\u00a0minutes ago \nDescription : Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. A Remote unauthenticated attacker could potentially exploit this vulnerability by gaining access to the source code, easily retrieving these secrets and reusing them to access the system leading to gaining access to unauthorized data. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T15:46:20.000000Z"}</description>
      <content:encoded>{"uuid": "0e7fcf74-06b6-487b-a529-5d863b577c0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48007", "type": "seen", "source": "https://t.me/cvedetector/12869", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48007 - Dell RecoverPoint for Virtual Machines Hard-Coded Credentials Remote Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-48007 \nPublished : Dec. 13, 2024, 2:15 p.m. | 24\u00a0minutes ago \nDescription : Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. A Remote unauthenticated attacker could potentially exploit this vulnerability by gaining access to the source code, easily retrieving these secrets and reusing them to access the system leading to gaining access to unauthorized data. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T15:46:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0e7fcf74-06b6-487b-a529-5d863b577c0d/export</guid>
      <pubDate>Fri, 13 Dec 2024 15:46:20 +0000</pubDate>
    </item>
    <item>
      <title>116df8c4-2f78-40c7-8a9a-c49dc7e84ffb</title>
      <link>https://db.gcve.eu/sighting/116df8c4-2f78-40c7-8a9a-c49dc7e84ffb/export</link>
      <description>{"uuid": "116df8c4-2f78-40c7-8a9a-c49dc7e84ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48008", "type": "seen", "source": "https://t.me/cvedetector/12870", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48008 - Dell RecoverPoint for Virtual Machines OS Command Injection vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48008 \nPublished : Dec. 13, 2024, 2:15 p.m. | 23\u00a0minutes ago \nDescription : Dell RecoverPoint for Virtual Machines 6.0.x contains a OS Command Injection vulnerability. An Low privileged remote attacker could potentially exploit this vulnerability leading to information disclosure ,allowing of unintended actions like reading files that may contain sensitive information \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T15:46:21.000000Z"}</description>
      <content:encoded>{"uuid": "116df8c4-2f78-40c7-8a9a-c49dc7e84ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48008", "type": "seen", "source": "https://t.me/cvedetector/12870", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-48008 - Dell RecoverPoint for Virtual Machines OS Command Injection vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-48008 \nPublished : Dec. 13, 2024, 2:15 p.m. | 23\u00a0minutes ago \nDescription : Dell RecoverPoint for Virtual Machines 6.0.x contains a OS Command Injection vulnerability. An Low privileged remote attacker could potentially exploit this vulnerability leading to information disclosure ,allowing of unintended actions like reading files that may contain sensitive information \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T15:46:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/116df8c4-2f78-40c7-8a9a-c49dc7e84ffb/export</guid>
      <pubDate>Fri, 13 Dec 2024 15:46:21 +0000</pubDate>
    </item>
    <item>
      <title>3f096f68-eff4-4c48-9802-f4cc6e1468be</title>
      <link>https://db.gcve.eu/sighting/3f096f68-eff4-4c48-9802-f4cc6e1468be/export</link>
      <description>{"uuid": "3f096f68-eff4-4c48-9802-f4cc6e1468be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4800", "type": "seen", "source": "Telegram/FV1jK0-AZGKbHAX-abkhwHTDkJEPcNArRyJsoNbYW6rF7lpL", "content": "", "creation_timestamp": "2025-02-14T10:03:11.000000Z"}</description>
      <content:encoded>{"uuid": "3f096f68-eff4-4c48-9802-f4cc6e1468be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4800", "type": "seen", "source": "Telegram/FV1jK0-AZGKbHAX-abkhwHTDkJEPcNArRyJsoNbYW6rF7lpL", "content": "", "creation_timestamp": "2025-02-14T10:03:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3f096f68-eff4-4c48-9802-f4cc6e1468be/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:03:11 +0000</pubDate>
    </item>
  </channel>
</rss>
