<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 20:48:11 +0000</lastBuildDate>
    <item>
      <title>93833f76-154d-4ce2-8ec3-50768efff998</title>
      <link>https://db.gcve.eu/sighting/93833f76-154d-4ce2-8ec3-50768efff998/export</link>
      <description>{"uuid": "93833f76-154d-4ce2-8ec3-50768efff998", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51362", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113431555158214364", "content": "", "creation_timestamp": "2024-11-05T17:36:13.626455Z"}</description>
      <content:encoded>{"uuid": "93833f76-154d-4ce2-8ec3-50768efff998", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51362", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113431555158214364", "content": "", "creation_timestamp": "2024-11-05T17:36:13.626455Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/93833f76-154d-4ce2-8ec3-50768efff998/export</guid>
      <pubDate>Tue, 05 Nov 2024 17:36:13 +0000</pubDate>
    </item>
    <item>
      <title>9e1813a7-bdae-4a1e-81a8-7030eb0d024e</title>
      <link>https://db.gcve.eu/sighting/9e1813a7-bdae-4a1e-81a8-7030eb0d024e/export</link>
      <description>{"uuid": "9e1813a7-bdae-4a1e-81a8-7030eb0d024e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51362", "type": "seen", "source": "https://t.me/cvedetector/9899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51362 - Vulnerability Title: Lensesta Smart Connect Indoor IP Camera RTSP Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-51362 \nPublished : Nov. 5, 2024, 5:15 p.m. | 32\u00a0minutes ago \nDescription : The LSC Smart Connect Indoor IP Camera V7.6.32 is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. This allows unauthorized users with network access to view the camera's feed, potentially compromising user privacy and security. No credentials or special permissions are required, and access can be gained remotely over the network. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T18:53:46.000000Z"}</description>
      <content:encoded>{"uuid": "9e1813a7-bdae-4a1e-81a8-7030eb0d024e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51362", "type": "seen", "source": "https://t.me/cvedetector/9899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51362 - Vulnerability Title: Lensesta Smart Connect Indoor IP Camera RTSP Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-51362 \nPublished : Nov. 5, 2024, 5:15 p.m. | 32\u00a0minutes ago \nDescription : The LSC Smart Connect Indoor IP Camera V7.6.32 is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. This allows unauthorized users with network access to view the camera's feed, potentially compromising user privacy and security. No credentials or special permissions are required, and access can be gained remotely over the network. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-05T18:53:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9e1813a7-bdae-4a1e-81a8-7030eb0d024e/export</guid>
      <pubDate>Tue, 05 Nov 2024 18:53:46 +0000</pubDate>
    </item>
    <item>
      <title>00a70e9d-d70c-42e4-93ed-eb27f28e1172</title>
      <link>https://db.gcve.eu/sighting/00a70e9d-d70c-42e4-93ed-eb27f28e1172/export</link>
      <description>{"uuid": "00a70e9d-d70c-42e4-93ed-eb27f28e1172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51364", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522645973356490", "content": "", "creation_timestamp": "2024-11-21T19:41:49.175923Z"}</description>
      <content:encoded>{"uuid": "00a70e9d-d70c-42e4-93ed-eb27f28e1172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51364", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522645973356490", "content": "", "creation_timestamp": "2024-11-21T19:41:49.175923Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/00a70e9d-d70c-42e4-93ed-eb27f28e1172/export</guid>
      <pubDate>Thu, 21 Nov 2024 19:41:49 +0000</pubDate>
    </item>
    <item>
      <title>015c31ad-de43-4346-a302-3e222c81a1e5</title>
      <link>https://db.gcve.eu/sighting/015c31ad-de43-4346-a302-3e222c81a1e5/export</link>
      <description>{"uuid": "015c31ad-de43-4346-a302-3e222c81a1e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51365", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522645987410096", "content": "", "creation_timestamp": "2024-11-21T19:41:49.363954Z"}</description>
      <content:encoded>{"uuid": "015c31ad-de43-4346-a302-3e222c81a1e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51365", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522645987410096", "content": "", "creation_timestamp": "2024-11-21T19:41:49.363954Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/015c31ad-de43-4346-a302-3e222c81a1e5/export</guid>
      <pubDate>Thu, 21 Nov 2024 19:41:49 +0000</pubDate>
    </item>
    <item>
      <title>523d52ca-d1c3-45c6-b0a7-5756c1800a2c</title>
      <link>https://db.gcve.eu/sighting/523d52ca-d1c3-45c6-b0a7-5756c1800a2c/export</link>
      <description>{"uuid": "523d52ca-d1c3-45c6-b0a7-5756c1800a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51366", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522646000851907", "content": "", "creation_timestamp": "2024-11-21T19:41:49.880807Z"}</description>
      <content:encoded>{"uuid": "523d52ca-d1c3-45c6-b0a7-5756c1800a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51366", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522646000851907", "content": "", "creation_timestamp": "2024-11-21T19:41:49.880807Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/523d52ca-d1c3-45c6-b0a7-5756c1800a2c/export</guid>
      <pubDate>Thu, 21 Nov 2024 19:41:49 +0000</pubDate>
    </item>
    <item>
      <title>9b1e53a9-179e-4fa8-a1e3-589c15502752</title>
      <link>https://db.gcve.eu/sighting/9b1e53a9-179e-4fa8-a1e3-589c15502752/export</link>
      <description>{"uuid": "9b1e53a9-179e-4fa8-a1e3-589c15502752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51367", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522646013946271", "content": "", "creation_timestamp": "2024-11-21T19:41:50.219650Z"}</description>
      <content:encoded>{"uuid": "9b1e53a9-179e-4fa8-a1e3-589c15502752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51367", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522646013946271", "content": "", "creation_timestamp": "2024-11-21T19:41:50.219650Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9b1e53a9-179e-4fa8-a1e3-589c15502752/export</guid>
      <pubDate>Thu, 21 Nov 2024 19:41:50 +0000</pubDate>
    </item>
    <item>
      <title>e0298bcc-86f9-4d59-a063-02a0d2422b39</title>
      <link>https://db.gcve.eu/sighting/e0298bcc-86f9-4d59-a063-02a0d2422b39/export</link>
      <description>{"uuid": "e0298bcc-86f9-4d59-a063-02a0d2422b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51363", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113591134290464027", "content": "", "creation_timestamp": "2024-12-03T21:59:18.034261Z"}</description>
      <content:encoded>{"uuid": "e0298bcc-86f9-4d59-a063-02a0d2422b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51363", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113591134290464027", "content": "", "creation_timestamp": "2024-12-03T21:59:18.034261Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e0298bcc-86f9-4d59-a063-02a0d2422b39/export</guid>
      <pubDate>Tue, 03 Dec 2024 21:59:18 +0000</pubDate>
    </item>
    <item>
      <title>a2678b8a-a0c3-4b1d-a080-9c23b84f404c</title>
      <link>https://db.gcve.eu/sighting/a2678b8a-a0c3-4b1d-a080-9c23b84f404c/export</link>
      <description>{"uuid": "a2678b8a-a0c3-4b1d-a080-9c23b84f404c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51363", "type": "seen", "source": "https://t.me/cvedetector/11918", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51363 - Insecure deserialization in Hodoku v2.3.0 to v2.3.\", \n  \"Content\": \"CVE ID : CVE-2024-51363 \nPublished : Dec. 3, 2024, 10:15 p.m. | 41\u00a0minutes ago \nDescription : Insecure deserialization in Hodoku v2.3.0 to v2.3.2 allows attackers to execute arbitrary code. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T00:01:27.000000Z"}</description>
      <content:encoded>{"uuid": "a2678b8a-a0c3-4b1d-a080-9c23b84f404c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51363", "type": "seen", "source": "https://t.me/cvedetector/11918", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51363 - Insecure deserialization in Hodoku v2.3.0 to v2.3.\", \n  \"Content\": \"CVE ID : CVE-2024-51363 \nPublished : Dec. 3, 2024, 10:15 p.m. | 41\u00a0minutes ago \nDescription : Insecure deserialization in Hodoku v2.3.0 to v2.3.2 allows attackers to execute arbitrary code. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T00:01:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a2678b8a-a0c3-4b1d-a080-9c23b84f404c/export</guid>
      <pubDate>Wed, 04 Dec 2024 00:01:27 +0000</pubDate>
    </item>
    <item>
      <title>c23d866a-99d3-4df9-998c-46162951cee8</title>
      <link>https://db.gcve.eu/sighting/c23d866a-99d3-4df9-998c-46162951cee8/export</link>
      <description>{"uuid": "c23d866a-99d3-4df9-998c-46162951cee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5136", "type": "seen", "source": "Telegram/hlp5xDAQKlTB0eHnEDM15ndyOCOYSxOPPHcAyBC3TplKiB_h", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}</description>
      <content:encoded>{"uuid": "c23d866a-99d3-4df9-998c-46162951cee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5136", "type": "seen", "source": "Telegram/hlp5xDAQKlTB0eHnEDM15ndyOCOYSxOPPHcAyBC3TplKiB_h", "content": "", "creation_timestamp": "2025-02-21T22:10:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c23d866a-99d3-4df9-998c-46162951cee8/export</guid>
      <pubDate>Fri, 21 Feb 2025 22:10:44 +0000</pubDate>
    </item>
    <item>
      <title>d18fb279-b1d6-44dd-910d-afc21062699e</title>
      <link>https://db.gcve.eu/sighting/d18fb279-b1d6-44dd-910d-afc21062699e/export</link>
      <description>{"uuid": "d18fb279-b1d6-44dd-910d-afc21062699e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51360", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu5k6okc32r", "content": "", "creation_timestamp": "2025-05-23T17:24:53.512656Z"}</description>
      <content:encoded>{"uuid": "d18fb279-b1d6-44dd-910d-afc21062699e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51360", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpu5k6okc32r", "content": "", "creation_timestamp": "2025-05-23T17:24:53.512656Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d18fb279-b1d6-44dd-910d-afc21062699e/export</guid>
      <pubDate>Fri, 23 May 2025 17:24:53 +0000</pubDate>
    </item>
  </channel>
</rss>
