<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 21:39:37 +0000</lastBuildDate>
    <item>
      <title>3bd40173-fe03-4aa4-8e7a-5583c388d821</title>
      <link>https://db.gcve.eu/sighting/3bd40173-fe03-4aa4-8e7a-5583c388d821/export</link>
      <description>{"uuid": "3bd40173-fe03-4aa4-8e7a-5583c388d821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55186", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113685819017965453", "content": "", "creation_timestamp": "2024-12-20T15:18:52.318861Z"}</description>
      <content:encoded>{"uuid": "3bd40173-fe03-4aa4-8e7a-5583c388d821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55186", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113685819017965453", "content": "", "creation_timestamp": "2024-12-20T15:18:52.318861Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3bd40173-fe03-4aa4-8e7a-5583c388d821/export</guid>
      <pubDate>Fri, 20 Dec 2024 15:18:52 +0000</pubDate>
    </item>
    <item>
      <title>75181691-36fa-49e5-b526-4d7ebaba35c7</title>
      <link>https://db.gcve.eu/sighting/75181691-36fa-49e5-b526-4d7ebaba35c7/export</link>
      <description>{"uuid": "75181691-36fa-49e5-b526-4d7ebaba35c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55186", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldqrurdpt42z", "content": "", "creation_timestamp": "2024-12-20T16:15:47.218531Z"}</description>
      <content:encoded>{"uuid": "75181691-36fa-49e5-b526-4d7ebaba35c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55186", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldqrurdpt42z", "content": "", "creation_timestamp": "2024-12-20T16:15:47.218531Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/75181691-36fa-49e5-b526-4d7ebaba35c7/export</guid>
      <pubDate>Fri, 20 Dec 2024 16:15:47 +0000</pubDate>
    </item>
    <item>
      <title>223244b2-abda-4ae5-8ead-0514f24ffec9</title>
      <link>https://db.gcve.eu/sighting/223244b2-abda-4ae5-8ead-0514f24ffec9/export</link>
      <description>{"uuid": "223244b2-abda-4ae5-8ead-0514f24ffec9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55186", "type": "seen", "source": "https://t.me/cvedetector/13447", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55186 - Oqtane Framework User account IDOR Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55186 \nPublished : Dec. 20, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : An IDOR (Insecure Direct Object Reference) vulnerability exists in oqtane Framework 6.0.0, allowing a logged-in user to access inbox messages of other users by manipulating the notification ID in the request URL. By changing the notification ID, an attacker can view sensitive mail details belonging to other users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T18:25:26.000000Z"}</description>
      <content:encoded>{"uuid": "223244b2-abda-4ae5-8ead-0514f24ffec9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55186", "type": "seen", "source": "https://t.me/cvedetector/13447", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55186 - Oqtane Framework User account IDOR Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55186 \nPublished : Dec. 20, 2024, 4:15 p.m. | 42\u00a0minutes ago \nDescription : An IDOR (Insecure Direct Object Reference) vulnerability exists in oqtane Framework 6.0.0, allowing a logged-in user to access inbox messages of other users by manipulating the notification ID in the request URL. By changing the notification ID, an attacker can view sensitive mail details belonging to other users. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T18:25:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/223244b2-abda-4ae5-8ead-0514f24ffec9/export</guid>
      <pubDate>Fri, 20 Dec 2024 18:25:26 +0000</pubDate>
    </item>
    <item>
      <title>19b1095e-5946-4d7b-a61e-b55cb0c1f285</title>
      <link>https://db.gcve.eu/sighting/19b1095e-5946-4d7b-a61e-b55cb0c1f285/export</link>
      <description>{"uuid": "19b1095e-5946-4d7b-a61e-b55cb0c1f285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5518", "type": "seen", "source": "Telegram/FCpCY9W-tL9boIxdhZ0RVWtOS66JFOfkGbpkEiHMo3z0bNuP", "content": "", "creation_timestamp": "2025-02-14T10:03:08.000000Z"}</description>
      <content:encoded>{"uuid": "19b1095e-5946-4d7b-a61e-b55cb0c1f285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5518", "type": "seen", "source": "Telegram/FCpCY9W-tL9boIxdhZ0RVWtOS66JFOfkGbpkEiHMo3z0bNuP", "content": "", "creation_timestamp": "2025-02-14T10:03:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/19b1095e-5946-4d7b-a61e-b55cb0c1f285/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:03:08 +0000</pubDate>
    </item>
  </channel>
</rss>
