<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 07:16:09 +0000</lastBuildDate>
    <item>
      <title>47250b15-12f9-461c-b1f4-aefb08fe2b74</title>
      <link>https://db.gcve.eu/sighting/47250b15-12f9-461c-b1f4-aefb08fe2b74/export</link>
      <description>{"uuid": "47250b15-12f9-461c-b1f4-aefb08fe2b74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5061", "type": "seen", "source": "https://t.me/cvedetector/4496", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5061 - Enfold - Stored Cross-Site Scripting Vulnerability in WordPress Theme\", \n  \"Content\": \"CVE ID : CVE-2024-5061 \nPublished : Aug. 30, 2024, 4:15 a.m. | 38\u00a0minutes ago \nDescription : The Enfold - Responsive Multi-Purpose Theme theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018wrapper_class\u2019 and 'class' parameters in all versions up to, and including, 6.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-30T07:17:28.000000Z"}</description>
      <content:encoded>{"uuid": "47250b15-12f9-461c-b1f4-aefb08fe2b74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5061", "type": "seen", "source": "https://t.me/cvedetector/4496", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5061 - Enfold - Stored Cross-Site Scripting Vulnerability in WordPress Theme\", \n  \"Content\": \"CVE ID : CVE-2024-5061 \nPublished : Aug. 30, 2024, 4:15 a.m. | 38\u00a0minutes ago \nDescription : The Enfold - Responsive Multi-Purpose Theme theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018wrapper_class\u2019 and 'class' parameters in all versions up to, and including, 6.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-30T07:17:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/47250b15-12f9-461c-b1f4-aefb08fe2b74/export</guid>
      <pubDate>Fri, 30 Aug 2024 07:17:28 +0000</pubDate>
    </item>
    <item>
      <title>bd996b70-4856-4806-9f2d-1f2b7f3c19c5</title>
      <link>https://db.gcve.eu/sighting/bd996b70-4856-4806-9f2d-1f2b7f3c19c5/export</link>
      <description>{"uuid": "bd996b70-4856-4806-9f2d-1f2b7f3c19c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50611", "type": "seen", "source": "https://t.me/cvedetector/9069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50611 - CycloneDX cdxgen Untrusted Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-50611 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : CycloneDX cdxgen through 10.10.7, when run against an untrusted codebase, may execute code contained within build-related files such as build.gradle.kts, a similar issue to CVE-2022-24441. cdxgen is used by, for example, OWASP dep-scan. NOTE: this has been characterized as a design limitation, rather than an implementation mistake. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:00.000000Z"}</description>
      <content:encoded>{"uuid": "bd996b70-4856-4806-9f2d-1f2b7f3c19c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50611", "type": "seen", "source": "https://t.me/cvedetector/9069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50611 - CycloneDX cdxgen Untrusted Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-50611 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : CycloneDX cdxgen through 10.10.7, when run against an untrusted codebase, may execute code contained within build-related files such as build.gradle.kts, a similar issue to CVE-2022-24441. cdxgen is used by, for example, OWASP dep-scan. NOTE: this has been characterized as a design limitation, rather than an implementation mistake. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bd996b70-4856-4806-9f2d-1f2b7f3c19c5/export</guid>
      <pubDate>Mon, 28 Oct 2024 00:16:00 +0000</pubDate>
    </item>
    <item>
      <title>53e6206c-0da2-4711-b183-22aab16d922c</title>
      <link>https://db.gcve.eu/sighting/53e6206c-0da2-4711-b183-22aab16d922c/export</link>
      <description>{"uuid": "53e6206c-0da2-4711-b183-22aab16d922c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50610", "type": "seen", "source": "https://t.me/cvedetector/9070", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50610 - GSL Siman Integer Signedness Error\", \n  \"Content\": \"CVE ID : CVE-2024-50610 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : GSL (GNU Scientific Library) through 2.8 has an integer signedness error in gsl_siman_solve_many in siman/siman.c. When params.n_tries is negative, incorrect memory allocation occurs. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:01.000000Z"}</description>
      <content:encoded>{"uuid": "53e6206c-0da2-4711-b183-22aab16d922c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50610", "type": "seen", "source": "https://t.me/cvedetector/9070", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50610 - GSL Siman Integer Signedness Error\", \n  \"Content\": \"CVE ID : CVE-2024-50610 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : GSL (GNU Scientific Library) through 2.8 has an integer signedness error in gsl_siman_solve_many in siman/siman.c. When params.n_tries is negative, incorrect memory allocation occurs. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/53e6206c-0da2-4711-b183-22aab16d922c/export</guid>
      <pubDate>Mon, 28 Oct 2024 00:16:01 +0000</pubDate>
    </item>
    <item>
      <title>64a01e38-72eb-492a-9334-092919e73f24</title>
      <link>https://db.gcve.eu/sighting/64a01e38-72eb-492a-9334-092919e73f24/export</link>
      <description>{"uuid": "64a01e38-72eb-492a-9334-092919e73f24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50612", "type": "seen", "source": "https://t.me/cvedetector/9071", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50612 - Libsndfile Ogg Vorbis Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50612 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : libsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote out-of-bounds read. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:02.000000Z"}</description>
      <content:encoded>{"uuid": "64a01e38-72eb-492a-9334-092919e73f24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50612", "type": "seen", "source": "https://t.me/cvedetector/9071", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50612 - Libsndfile Ogg Vorbis Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50612 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : libsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote out-of-bounds read. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/64a01e38-72eb-492a-9334-092919e73f24/export</guid>
      <pubDate>Mon, 28 Oct 2024 00:16:02 +0000</pubDate>
    </item>
    <item>
      <title>92d10ee9-e7b6-4e36-832c-92e0e1bb61c0</title>
      <link>https://db.gcve.eu/sighting/92d10ee9-e7b6-4e36-832c-92e0e1bb61c0/export</link>
      <description>{"uuid": "92d10ee9-e7b6-4e36-832c-92e0e1bb61c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50613", "type": "seen", "source": "https://t.me/cvedetector/9072", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50613 - Libsndfile Assertion Denial\", \n  \"Content\": \"CVE ID : CVE-2024-50613 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : libsndfile through 1.2.2 has a reachable assertion, that may lead to application exit, in mpeg_l3_encode.c mpeg_l3_encoder_close. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:03.000000Z"}</description>
      <content:encoded>{"uuid": "92d10ee9-e7b6-4e36-832c-92e0e1bb61c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50613", "type": "seen", "source": "https://t.me/cvedetector/9072", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50613 - Libsndfile Assertion Denial\", \n  \"Content\": \"CVE ID : CVE-2024-50613 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : libsndfile through 1.2.2 has a reachable assertion, that may lead to application exit, in mpeg_l3_encode.c mpeg_l3_encoder_close. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/92d10ee9-e7b6-4e36-832c-92e0e1bb61c0/export</guid>
      <pubDate>Mon, 28 Oct 2024 00:16:03 +0000</pubDate>
    </item>
    <item>
      <title>b7316744-8984-4bda-9897-4ec9f2cbf751</title>
      <link>https://db.gcve.eu/sighting/b7316744-8984-4bda-9897-4ec9f2cbf751/export</link>
      <description>{"uuid": "b7316744-8984-4bda-9897-4ec9f2cbf751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50614", "type": "seen", "source": "https://t.me/cvedetector/9073", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50614 - TinyXML2 Unchecked Arithmetic Exception Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50614 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : TinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/16, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:03.000000Z"}</description>
      <content:encoded>{"uuid": "b7316744-8984-4bda-9897-4ec9f2cbf751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50614", "type": "seen", "source": "https://t.me/cvedetector/9073", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50614 - TinyXML2 Unchecked Arithmetic Exception Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50614 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : TinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/16, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b7316744-8984-4bda-9897-4ec9f2cbf751/export</guid>
      <pubDate>Mon, 28 Oct 2024 00:16:03 +0000</pubDate>
    </item>
    <item>
      <title>b8c3a007-4d36-43aa-9eed-654a70e4c77d</title>
      <link>https://db.gcve.eu/sighting/b8c3a007-4d36-43aa-9eed-654a70e4c77d/export</link>
      <description>{"uuid": "b8c3a007-4d36-43aa-9eed-654a70e4c77d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50615", "type": "seen", "source": "https://t.me/cvedetector/9074", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50615 - TinyXML2 Reachable Assertion Oops\", \n  \"Content\": \"CVE ID : CVE-2024-50615 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : TinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/digit, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:07.000000Z"}</description>
      <content:encoded>{"uuid": "b8c3a007-4d36-43aa-9eed-654a70e4c77d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50615", "type": "seen", "source": "https://t.me/cvedetector/9074", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50615 - TinyXML2 Reachable Assertion Oops\", \n  \"Content\": \"CVE ID : CVE-2024-50615 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : TinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/digit, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b8c3a007-4d36-43aa-9eed-654a70e4c77d/export</guid>
      <pubDate>Mon, 28 Oct 2024 00:16:07 +0000</pubDate>
    </item>
    <item>
      <title>e4f587e3-33cd-4cc8-b975-3fc8ade8d9af</title>
      <link>https://db.gcve.eu/sighting/e4f587e3-33cd-4cc8-b975-3fc8ade8d9af/export</link>
      <description>{"uuid": "e4f587e3-33cd-4cc8-b975-3fc8ade8d9af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50616", "type": "seen", "source": "https://t.me/cvedetector/9075", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50616 - Ironman PowerShell Universal Privilege Escalation Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-50616 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : Ironman PowerShell Universal 5.x before 5.0.12 allows an authenticated attacker to elevate their privileges and view job information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:08.000000Z"}</description>
      <content:encoded>{"uuid": "e4f587e3-33cd-4cc8-b975-3fc8ade8d9af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50616", "type": "seen", "source": "https://t.me/cvedetector/9075", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50616 - Ironman PowerShell Universal Privilege Escalation Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-50616 \nPublished : Oct. 27, 2024, 10:15 p.m. | 37\u00a0minutes ago \nDescription : Ironman PowerShell Universal 5.x before 5.0.12 allows an authenticated attacker to elevate their privileges and view job information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T00:16:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e4f587e3-33cd-4cc8-b975-3fc8ade8d9af/export</guid>
      <pubDate>Mon, 28 Oct 2024 00:16:08 +0000</pubDate>
    </item>
    <item>
      <title>57d76556-0280-4f18-bcd9-2a134256c86a</title>
      <link>https://db.gcve.eu/sighting/57d76556-0280-4f18-bcd9-2a134256c86a/export</link>
      <description>{"uuid": "57d76556-0280-4f18-bcd9-2a134256c86a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50612", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lxsqwejd7k2s", "content": "", "creation_timestamp": "2025-09-01T23:28:00.633240Z"}</description>
      <content:encoded>{"uuid": "57d76556-0280-4f18-bcd9-2a134256c86a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50612", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lxsqwejd7k2s", "content": "", "creation_timestamp": "2025-09-01T23:28:00.633240Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/57d76556-0280-4f18-bcd9-2a134256c86a/export</guid>
      <pubDate>Mon, 01 Sep 2025 23:28:00 +0000</pubDate>
    </item>
  </channel>
</rss>
