<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 16 May 2026 12:59:29 +0000</lastBuildDate>
    <item>
      <title>9e5077d7-d46d-4d34-a24f-bbecc4fb20bb</title>
      <link>https://db.gcve.eu/sighting/9e5077d7-d46d-4d34-a24f-bbecc4fb20bb/export</link>
      <description>{"uuid": "9e5077d7-d46d-4d34-a24f-bbecc4fb20bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50989", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113464913774418226", "content": "", "creation_timestamp": "2024-11-11T14:59:45.707273Z"}</description>
      <content:encoded>{"uuid": "9e5077d7-d46d-4d34-a24f-bbecc4fb20bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50989", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113464913774418226", "content": "", "creation_timestamp": "2024-11-11T14:59:45.707273Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9e5077d7-d46d-4d34-a24f-bbecc4fb20bb/export</guid>
      <pubDate>Mon, 11 Nov 2024 14:59:45 +0000</pubDate>
    </item>
    <item>
      <title>c666aa8a-11bc-4b77-9615-ddfb61f8de66</title>
      <link>https://db.gcve.eu/sighting/c666aa8a-11bc-4b77-9615-ddfb61f8de66/export</link>
      <description>{"uuid": "c666aa8a-11bc-4b77-9615-ddfb61f8de66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50989", "type": "seen", "source": "https://t.me/cvedetector/10504", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50989 - PHPGurukul Online Marriage Registration System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-50989 \nPublished : Nov. 11, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : A SQL injection vulnerability in /omrs/admin/search.php in PHPGurukul Online Marriage Registration System v1.0 allows an attacker to execute arbitrary SQL commands via the \"searchdata \" parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T16:56:27.000000Z"}</description>
      <content:encoded>{"uuid": "c666aa8a-11bc-4b77-9615-ddfb61f8de66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50989", "type": "seen", "source": "https://t.me/cvedetector/10504", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50989 - PHPGurukul Online Marriage Registration System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-50989 \nPublished : Nov. 11, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : A SQL injection vulnerability in /omrs/admin/search.php in PHPGurukul Online Marriage Registration System v1.0 allows an attacker to execute arbitrary SQL commands via the \"searchdata \" parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T16:56:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c666aa8a-11bc-4b77-9615-ddfb61f8de66/export</guid>
      <pubDate>Mon, 11 Nov 2024 16:56:27 +0000</pubDate>
    </item>
    <item>
      <title>b49a82ee-dc21-42a5-823d-caee5dcc6648</title>
      <link>https://db.gcve.eu/sighting/b49a82ee-dc21-42a5-823d-caee5dcc6648/export</link>
      <description>{"uuid": "b49a82ee-dc21-42a5-823d-caee5dcc6648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50986", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/6954", "content": "\ud83d\udea8CVE-2024-50986: DLL Hijacking Exploit for Clementine\n\nhttps://darkwebinformer.com/cve-20224-50986-dll-hijacking-exploit-for-clementine/", "creation_timestamp": "2024-11-13T19:01:51.000000Z"}</description>
      <content:encoded>{"uuid": "b49a82ee-dc21-42a5-823d-caee5dcc6648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50986", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/6954", "content": "\ud83d\udea8CVE-2024-50986: DLL Hijacking Exploit for Clementine\n\nhttps://darkwebinformer.com/cve-20224-50986-dll-hijacking-exploit-for-clementine/", "creation_timestamp": "2024-11-13T19:01:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b49a82ee-dc21-42a5-823d-caee5dcc6648/export</guid>
      <pubDate>Wed, 13 Nov 2024 19:01:51 +0000</pubDate>
    </item>
    <item>
      <title>f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84</title>
      <link>https://db.gcve.eu/sighting/f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84/export</link>
      <description>{"uuid": "f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50986", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113487607732298095", "content": "", "creation_timestamp": "2024-11-15T15:11:08.179102Z"}</description>
      <content:encoded>{"uuid": "f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50986", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113487607732298095", "content": "", "creation_timestamp": "2024-11-15T15:11:08.179102Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f97fc3ea-e1e3-4eaa-ac77-5bbdee471f84/export</guid>
      <pubDate>Fri, 15 Nov 2024 15:11:08 +0000</pubDate>
    </item>
    <item>
      <title>2012335d-bf92-444a-9943-32dda8adf323</title>
      <link>https://db.gcve.eu/sighting/2012335d-bf92-444a-9943-32dda8adf323/export</link>
      <description>{"uuid": "2012335d-bf92-444a-9943-32dda8adf323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50986", "type": "seen", "source": "https://t.me/cvedetector/11082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50986 - Clementine DLL Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50986 \nPublished : Nov. 15, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T16:36:42.000000Z"}</description>
      <content:encoded>{"uuid": "2012335d-bf92-444a-9943-32dda8adf323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50986", "type": "seen", "source": "https://t.me/cvedetector/11082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50986 - Clementine DLL Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50986 \nPublished : Nov. 15, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T16:36:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2012335d-bf92-444a-9943-32dda8adf323/export</guid>
      <pubDate>Fri, 15 Nov 2024 16:36:42 +0000</pubDate>
    </item>
    <item>
      <title>63bb255c-84eb-4f85-9045-7484cb15c773</title>
      <link>https://db.gcve.eu/sighting/63bb255c-84eb-4f85-9045-7484cb15c773/export</link>
      <description>{"uuid": "63bb255c-84eb-4f85-9045-7484cb15c773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50983", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113489233363805293", "content": "", "creation_timestamp": "2024-11-15T22:04:35.061682Z"}</description>
      <content:encoded>{"uuid": "63bb255c-84eb-4f85-9045-7484cb15c773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50983", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113489233363805293", "content": "", "creation_timestamp": "2024-11-15T22:04:35.061682Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/63bb255c-84eb-4f85-9045-7484cb15c773/export</guid>
      <pubDate>Fri, 15 Nov 2024 22:04:35 +0000</pubDate>
    </item>
    <item>
      <title>f6cd8105-e65e-4951-871a-e93db02b9d41</title>
      <link>https://db.gcve.eu/sighting/f6cd8105-e65e-4951-871a-e93db02b9d41/export</link>
      <description>{"uuid": "f6cd8105-e65e-4951-871a-e93db02b9d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50983", "type": "seen", "source": "https://t.me/cvedetector/11193", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50983 - FlightPath Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50983 \nPublished : Nov. 15, 2024, 10:15 p.m. | 34\u00a0minutes ago \nDescription : FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, which allows authenticated remote attackers with administrative rights to inject arbitrary JavaScript in the web browser of a user by including a malicious payload into the Last Name section in the Create/Edit Faculty/Staff User or Create/Edit Student User sections. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T00:09:57.000000Z"}</description>
      <content:encoded>{"uuid": "f6cd8105-e65e-4951-871a-e93db02b9d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50983", "type": "seen", "source": "https://t.me/cvedetector/11193", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50983 - FlightPath Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50983 \nPublished : Nov. 15, 2024, 10:15 p.m. | 34\u00a0minutes ago \nDescription : FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, which allows authenticated remote attackers with administrative rights to inject arbitrary JavaScript in the web browser of a user by including a malicious payload into the Last Name section in the Create/Edit Faculty/Staff User or Create/Edit Student User sections. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T00:09:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f6cd8105-e65e-4951-871a-e93db02b9d41/export</guid>
      <pubDate>Sat, 16 Nov 2024 00:09:57 +0000</pubDate>
    </item>
    <item>
      <title>42124092-234a-412b-98f3-a55f1d6a53bb</title>
      <link>https://db.gcve.eu/sighting/42124092-234a-412b-98f3-a55f1d6a53bb/export</link>
      <description>{"uuid": "42124092-234a-412b-98f3-a55f1d6a53bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5098", "type": "seen", "source": "Telegram/adWKqEhktE073DV6Xb7jwfur5hssPmsbmwtUdNDQrWL2xdK5", "content": "", "creation_timestamp": "2025-02-14T09:46:59.000000Z"}</description>
      <content:encoded>{"uuid": "42124092-234a-412b-98f3-a55f1d6a53bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5098", "type": "seen", "source": "Telegram/adWKqEhktE073DV6Xb7jwfur5hssPmsbmwtUdNDQrWL2xdK5", "content": "", "creation_timestamp": "2025-02-14T09:46:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/42124092-234a-412b-98f3-a55f1d6a53bb/export</guid>
      <pubDate>Fri, 14 Feb 2025 09:46:59 +0000</pubDate>
    </item>
  </channel>
</rss>
