<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 17 May 2026 06:53:35 +0000</lastBuildDate>
    <item>
      <title>39fab709-5dbf-4e82-a543-c5f5f555c395</title>
      <link>https://db.gcve.eu/sighting/39fab709-5dbf-4e82-a543-c5f5f555c395/export</link>
      <description>{"uuid": "39fab709-5dbf-4e82-a543-c5f5f555c395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5110", "type": "seen", "source": "Telegram/BGMaEjXiKuBreu6Lw_yNci6rtGNvq1ugUXmxO8I7xlZRq4JE", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}</description>
      <content:encoded>{"uuid": "39fab709-5dbf-4e82-a543-c5f5f555c395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5110", "type": "seen", "source": "Telegram/BGMaEjXiKuBreu6Lw_yNci6rtGNvq1ugUXmxO8I7xlZRq4JE", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/39fab709-5dbf-4e82-a543-c5f5f555c395/export</guid>
      <pubDate>Fri, 21 Feb 2025 22:10:44 +0000</pubDate>
    </item>
    <item>
      <title>39335085-f603-4ad7-88f0-255d6a20502b</title>
      <link>https://db.gcve.eu/sighting/39335085-f603-4ad7-88f0-255d6a20502b/export</link>
      <description>{"uuid": "39335085-f603-4ad7-88f0-255d6a20502b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51106", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16860", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51106\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in the component mcgs/admin/aboutus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle parameter.\n\ud83d\udccf Published: 2025-05-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-19T14:23:31.545Z\n\ud83d\udd17 References:\n1. https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-About%20Us.pdf", "creation_timestamp": "2025-05-19T14:38:48.000000Z"}</description>
      <content:encoded>{"uuid": "39335085-f603-4ad7-88f0-255d6a20502b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51106", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16860", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51106\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in the component mcgs/admin/aboutus.php of PHPGURUKUL Medical Card Generation System using PHP and MySQL v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the pagetitle parameter.\n\ud83d\udccf Published: 2025-05-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-19T14:23:31.545Z\n\ud83d\udd17 References:\n1. https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Stored%20XSS-About%20Us.pdf", "creation_timestamp": "2025-05-19T14:38:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/39335085-f603-4ad7-88f0-255d6a20502b/export</guid>
      <pubDate>Mon, 19 May 2025 14:38:48 +0000</pubDate>
    </item>
    <item>
      <title>1fddc370-847b-4f34-96c3-43041217ed48</title>
      <link>https://db.gcve.eu/sighting/1fddc370-847b-4f34-96c3-43041217ed48/export</link>
      <description>{"uuid": "1fddc370-847b-4f34-96c3-43041217ed48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51101", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu5y5bto72j", "content": "", "creation_timestamp": "2025-05-23T17:32:41.777949Z"}</description>
      <content:encoded>{"uuid": "1fddc370-847b-4f34-96c3-43041217ed48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51101", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu5y5bto72j", "content": "", "creation_timestamp": "2025-05-23T17:32:41.777949Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1fddc370-847b-4f34-96c3-43041217ed48/export</guid>
      <pubDate>Fri, 23 May 2025 17:32:41 +0000</pubDate>
    </item>
    <item>
      <title>8c877e43-9fc5-4929-bf44-25a2ee5ab44e</title>
      <link>https://db.gcve.eu/sighting/8c877e43-9fc5-4929-bf44-25a2ee5ab44e/export</link>
      <description>{"uuid": "8c877e43-9fc5-4929-bf44-25a2ee5ab44e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51107", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu6aqzoyh2k", "content": "", "creation_timestamp": "2025-05-23T17:37:30.879540Z"}</description>
      <content:encoded>{"uuid": "8c877e43-9fc5-4929-bf44-25a2ee5ab44e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51107", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu6aqzoyh2k", "content": "", "creation_timestamp": "2025-05-23T17:37:30.879540Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8c877e43-9fc5-4929-bf44-25a2ee5ab44e/export</guid>
      <pubDate>Fri, 23 May 2025 17:37:30 +0000</pubDate>
    </item>
    <item>
      <title>d86efec0-0f34-4401-bf1b-4c107253c28e</title>
      <link>https://db.gcve.eu/sighting/d86efec0-0f34-4401-bf1b-4c107253c28e/export</link>
      <description>{"uuid": "d86efec0-0f34-4401-bf1b-4c107253c28e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51108", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu6fnfon222", "content": "", "creation_timestamp": "2025-05-23T17:40:14.827128Z"}</description>
      <content:encoded>{"uuid": "d86efec0-0f34-4401-bf1b-4c107253c28e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51108", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu6fnfon222", "content": "", "creation_timestamp": "2025-05-23T17:40:14.827128Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d86efec0-0f34-4401-bf1b-4c107253c28e/export</guid>
      <pubDate>Fri, 23 May 2025 17:40:14 +0000</pubDate>
    </item>
    <item>
      <title>67fd6e49-3423-4142-838c-f2544079a22e</title>
      <link>https://db.gcve.eu/sighting/67fd6e49-3423-4142-838c-f2544079a22e/export</link>
      <description>{"uuid": "67fd6e49-3423-4142-838c-f2544079a22e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51103", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu7idg6xz2q", "content": "", "creation_timestamp": "2025-05-23T17:59:38.719368Z"}</description>
      <content:encoded>{"uuid": "67fd6e49-3423-4142-838c-f2544079a22e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51103", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu7idg6xz2q", "content": "", "creation_timestamp": "2025-05-23T17:59:38.719368Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/67fd6e49-3423-4142-838c-f2544079a22e/export</guid>
      <pubDate>Fri, 23 May 2025 17:59:38 +0000</pubDate>
    </item>
    <item>
      <title>be6edbb3-17ca-4240-90cd-47ce7dbe9a39</title>
      <link>https://db.gcve.eu/sighting/be6edbb3-17ca-4240-90cd-47ce7dbe9a39/export</link>
      <description>{"uuid": "be6edbb3-17ca-4240-90cd-47ce7dbe9a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51102", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17456", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51102\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: PHPGURUKUL Student Management System using PHP and MySQL v1 was discovered to contain multiple SQL injection vulnerabilities at /studentrecordms/login.php via the username and password parameters.\n\ud83d\udccf Published: 2025-05-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-23T18:43:44.845Z\n\ud83d\udd17 References:\n1. https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Student%20Management%20System/SQL%20Injection%20-%20admin%20login.pdf", "creation_timestamp": "2025-05-23T19:45:28.000000Z"}</description>
      <content:encoded>{"uuid": "be6edbb3-17ca-4240-90cd-47ce7dbe9a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51102", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17456", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51102\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: PHPGURUKUL Student Management System using PHP and MySQL v1 was discovered to contain multiple SQL injection vulnerabilities at /studentrecordms/login.php via the username and password parameters.\n\ud83d\udccf Published: 2025-05-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-23T18:43:44.845Z\n\ud83d\udd17 References:\n1. https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Student%20Management%20System/SQL%20Injection%20-%20admin%20login.pdf", "creation_timestamp": "2025-05-23T19:45:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/be6edbb3-17ca-4240-90cd-47ce7dbe9a39/export</guid>
      <pubDate>Fri, 23 May 2025 19:45:28 +0000</pubDate>
    </item>
    <item>
      <title>d25cdf63-4f06-4592-a47f-817221411090</title>
      <link>https://db.gcve.eu/sighting/d25cdf63-4f06-4592-a47f-817221411090/export</link>
      <description>{"uuid": "d25cdf63-4f06-4592-a47f-817221411090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpum32zpis27", "content": "", "creation_timestamp": "2025-05-23T21:44:52.654895Z"}</description>
      <content:encoded>{"uuid": "d25cdf63-4f06-4592-a47f-817221411090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51102", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpum32zpis27", "content": "", "creation_timestamp": "2025-05-23T21:44:52.654895Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d25cdf63-4f06-4592-a47f-817221411090/export</guid>
      <pubDate>Fri, 23 May 2025 21:44:52 +0000</pubDate>
    </item>
  </channel>
</rss>
