<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 14:29:02 +0000</lastBuildDate>
    <item>
      <title>fd0a3094-73e8-4a47-b909-dba24a95ed84</title>
      <link>https://db.gcve.eu/sighting/fd0a3094-73e8-4a47-b909-dba24a95ed84/export</link>
      <description>{"uuid": "fd0a3094-73e8-4a47-b909-dba24a95ed84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51406", "type": "seen", "source": "https://t.me/cvedetector/9578", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51406 - Floodlight SDN OpenFlow Controller LLDP Packet Forgery permetting Cluster and Host Discovery Evasion\", \n  \"Content\": \"CVE ID : CVE-2024-51406 \nPublished : Nov. 1, 2024, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Floodlight SDN Open Flow Controller v.1.2 has an issue that allows local hosts to build fake LLDP packets that allow specific clusters to be missed by Floodlight, which in turn leads to missed hosts inside and outside the cluster. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-01T16:10:47.000000Z"}</description>
      <content:encoded>{"uuid": "fd0a3094-73e8-4a47-b909-dba24a95ed84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51406", "type": "seen", "source": "https://t.me/cvedetector/9578", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51406 - Floodlight SDN OpenFlow Controller LLDP Packet Forgery permetting Cluster and Host Discovery Evasion\", \n  \"Content\": \"CVE ID : CVE-2024-51406 \nPublished : Nov. 1, 2024, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Floodlight SDN Open Flow Controller v.1.2 has an issue that allows local hosts to build fake LLDP packets that allow specific clusters to be missed by Floodlight, which in turn leads to missed hosts inside and outside the cluster. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-01T16:10:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fd0a3094-73e8-4a47-b909-dba24a95ed84/export</guid>
      <pubDate>Fri, 01 Nov 2024 16:10:47 +0000</pubDate>
    </item>
  </channel>
</rss>
