<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 10:55:07 +0000</lastBuildDate>
    <item>
      <title>7d5888b9-67b5-4113-a86f-5ce93a7485e6</title>
      <link>https://db.gcve.eu/sighting/7d5888b9-67b5-4113-a86f-5ce93a7485e6/export</link>
      <description>{"uuid": "7d5888b9-67b5-4113-a86f-5ce93a7485e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55193", "type": "seen", "source": "https://t.me/cvedetector/16235", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55193 - OpenImageIO Integer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55193 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : OpenImageIO v3.1.0.0dev was discovered to contain a segmentation violation via the component /OpenImageIO/string_view.h. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:13.000000Z"}</description>
      <content:encoded>{"uuid": "7d5888b9-67b5-4113-a86f-5ce93a7485e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55193", "type": "seen", "source": "https://t.me/cvedetector/16235", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55193 - OpenImageIO Integer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55193 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : OpenImageIO v3.1.0.0dev was discovered to contain a segmentation violation via the component /OpenImageIO/string_view.h. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7d5888b9-67b5-4113-a86f-5ce93a7485e6/export</guid>
      <pubDate>Fri, 24 Jan 2025 00:10:13 +0000</pubDate>
    </item>
    <item>
      <title>1038ff97-9c52-4e19-9e41-a5136a66655c</title>
      <link>https://db.gcve.eu/sighting/1038ff97-9c52-4e19-9e41-a5136a66655c/export</link>
      <description>{"uuid": "1038ff97-9c52-4e19-9e41-a5136a66655c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55194", "type": "seen", "source": "https://t.me/cvedetector/16236", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55194 - OpenImageIO Heap Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-55194 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:14.000000Z"}</description>
      <content:encoded>{"uuid": "1038ff97-9c52-4e19-9e41-a5136a66655c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55194", "type": "seen", "source": "https://t.me/cvedetector/16236", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55194 - OpenImageIO Heap Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-55194 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1038ff97-9c52-4e19-9e41-a5136a66655c/export</guid>
      <pubDate>Fri, 24 Jan 2025 00:10:14 +0000</pubDate>
    </item>
    <item>
      <title>b0226760-778b-4f51-9ce0-5d8f1734b175</title>
      <link>https://db.gcve.eu/sighting/b0226760-778b-4f51-9ce0-5d8f1734b175/export</link>
      <description>{"uuid": "b0226760-778b-4f51-9ce0-5d8f1734b175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55195", "type": "seen", "source": "https://t.me/cvedetector/16237", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55195 - OpenImageIO Image Buffer Allocation Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-55195 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : An allocation-size-too-big bug in the component /imagebuf.cpp of OpenImageIO v3.1.0.0dev may cause a Denial of Service (DoS) when the program to requests to allocate too much space. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:15.000000Z"}</description>
      <content:encoded>{"uuid": "b0226760-778b-4f51-9ce0-5d8f1734b175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55195", "type": "seen", "source": "https://t.me/cvedetector/16237", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55195 - OpenImageIO Image Buffer Allocation Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-55195 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : An allocation-size-too-big bug in the component /imagebuf.cpp of OpenImageIO v3.1.0.0dev may cause a Denial of Service (DoS) when the program to requests to allocate too much space. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b0226760-778b-4f51-9ce0-5d8f1734b175/export</guid>
      <pubDate>Fri, 24 Jan 2025 00:10:15 +0000</pubDate>
    </item>
    <item>
      <title>ff92b826-35c6-4b45-a8d8-8e145db97fc2</title>
      <link>https://db.gcve.eu/sighting/ff92b826-35c6-4b45-a8d8-8e145db97fc2/export</link>
      <description>{"uuid": "ff92b826-35c6-4b45-a8d8-8e145db97fc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55192", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3390", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55192\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*).\n\ud83d\udccf Published: 2025-01-24T00:31:46Z\n\ud83d\udccf Modified: 2025-01-29T18:31:21Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-55192\n2. https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550", "creation_timestamp": "2025-01-29T19:11:28.000000Z"}</description>
      <content:encoded>{"uuid": "ff92b826-35c6-4b45-a8d8-8e145db97fc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55192", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3390", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55192\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*).\n\ud83d\udccf Published: 2025-01-24T00:31:46Z\n\ud83d\udccf Modified: 2025-01-29T18:31:21Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-55192\n2. https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550", "creation_timestamp": "2025-01-29T19:11:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ff92b826-35c6-4b45-a8d8-8e145db97fc2/export</guid>
      <pubDate>Wed, 29 Jan 2025 19:11:28 +0000</pubDate>
    </item>
    <item>
      <title>d460f4ef-b867-43c5-a7e5-bdfea3e7b25b</title>
      <link>https://db.gcve.eu/sighting/d460f4ef-b867-43c5-a7e5-bdfea3e7b25b/export</link>
      <description>{"uuid": "d460f4ef-b867-43c5-a7e5-bdfea3e7b25b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5519", "type": "seen", "source": "Telegram/H_TAUmBeJHpvDW0jqDIEnAl8Db0G-ySC0oJGUhSj5xvbg9XP", "content": "", "creation_timestamp": "2025-02-14T10:01:40.000000Z"}</description>
      <content:encoded>{"uuid": "d460f4ef-b867-43c5-a7e5-bdfea3e7b25b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5519", "type": "seen", "source": "Telegram/H_TAUmBeJHpvDW0jqDIEnAl8Db0G-ySC0oJGUhSj5xvbg9XP", "content": "", "creation_timestamp": "2025-02-14T10:01:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d460f4ef-b867-43c5-a7e5-bdfea3e7b25b/export</guid>
      <pubDate>Fri, 14 Feb 2025 10:01:40 +0000</pubDate>
    </item>
    <item>
      <title>c2df2aea-9fb1-4b43-a396-292c833c12c6</title>
      <link>https://db.gcve.eu/sighting/c2df2aea-9fb1-4b43-a396-292c833c12c6/export</link>
      <description>{"uuid": "c2df2aea-9fb1-4b43-a396-292c833c12c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55199", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7025", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55199\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Stored Cross Site Scripting (XSS) vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to store JavaScript code inside a PDF file through the file upload feature. When the file is rendered, the injected code is executed on the user's browser.\n\ud83d\udccf Published: 2025-03-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-10T17:10:53.517Z\n\ud83d\udd17 References:\n1. https://portswigger.net/web-security/cross-site-scripting/stored\n2. https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55199", "creation_timestamp": "2025-03-10T17:38:21.000000Z"}</description>
      <content:encoded>{"uuid": "c2df2aea-9fb1-4b43-a396-292c833c12c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55199", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7025", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55199\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Stored Cross Site Scripting (XSS) vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to store JavaScript code inside a PDF file through the file upload feature. When the file is rendered, the injected code is executed on the user's browser.\n\ud83d\udccf Published: 2025-03-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-10T17:10:53.517Z\n\ud83d\udd17 References:\n1. https://portswigger.net/web-security/cross-site-scripting/stored\n2. https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55199", "creation_timestamp": "2025-03-10T17:38:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c2df2aea-9fb1-4b43-a396-292c833c12c6/export</guid>
      <pubDate>Mon, 10 Mar 2025 17:38:21 +0000</pubDate>
    </item>
    <item>
      <title>d2d71fdf-6f37-4b85-9111-65f651d5dd6b</title>
      <link>https://db.gcve.eu/sighting/d2d71fdf-6f37-4b85-9111-65f651d5dd6b/export</link>
      <description>{"uuid": "d2d71fdf-6f37-4b85-9111-65f651d5dd6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55199", "type": "seen", "source": "https://t.me/cvedetector/19976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55199 - Celk Sistemas Celk Saude Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-55199 \nPublished : March 10, 2025, 6:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : A Stored Cross Site Scripting (XSS) vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to store JavaScript code inside a PDF file through the file upload feature. When the file is rendered, the injected code is executed on the user's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T20:43:06.000000Z"}</description>
      <content:encoded>{"uuid": "d2d71fdf-6f37-4b85-9111-65f651d5dd6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55199", "type": "seen", "source": "https://t.me/cvedetector/19976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55199 - Celk Sistemas Celk Saude Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-55199 \nPublished : March 10, 2025, 6:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : A Stored Cross Site Scripting (XSS) vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to store JavaScript code inside a PDF file through the file upload feature. When the file is rendered, the injected code is executed on the user's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T20:43:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d2d71fdf-6f37-4b85-9111-65f651d5dd6b/export</guid>
      <pubDate>Mon, 10 Mar 2025 20:43:06 +0000</pubDate>
    </item>
    <item>
      <title>849b0969-44ad-4b5a-ac2e-799c0e146c65</title>
      <link>https://db.gcve.eu/sighting/849b0969-44ad-4b5a-ac2e-799c0e146c65/export</link>
      <description>{"uuid": "849b0969-44ad-4b5a-ac2e-799c0e146c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55198", "type": "seen", "source": "https://t.me/cvedetector/20219", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55198 - Celk Sistemas Celk Saude User Enumeration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55198 \nPublished : March 13, 2025, 3:15 p.m. | 41\u00a0minutes ago \nDescription : User Enumeration via Discrepancies in Error Messages in the Celk Sistemas Celk Saude v.3.1.252.1 password recovery functionality which allows a remote attacker to enumerate users through discrepancies in the responses. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T17:17:23.000000Z"}</description>
      <content:encoded>{"uuid": "849b0969-44ad-4b5a-ac2e-799c0e146c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55198", "type": "seen", "source": "https://t.me/cvedetector/20219", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55198 - Celk Sistemas Celk Saude User Enumeration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55198 \nPublished : March 13, 2025, 3:15 p.m. | 41\u00a0minutes ago \nDescription : User Enumeration via Discrepancies in Error Messages in the Celk Sistemas Celk Saude v.3.1.252.1 password recovery functionality which allows a remote attacker to enumerate users through discrepancies in the responses. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T17:17:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/849b0969-44ad-4b5a-ac2e-799c0e146c65/export</guid>
      <pubDate>Thu, 13 Mar 2025 17:17:23 +0000</pubDate>
    </item>
    <item>
      <title>e3ac246f-56f8-455f-8b80-fa305b85eaea</title>
      <link>https://db.gcve.eu/sighting/e3ac246f-56f8-455f-8b80-fa305b85eaea/export</link>
      <description>{"uuid": "e3ac246f-56f8-455f-8b80-fa305b85eaea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}</description>
      <content:encoded>{"uuid": "e3ac246f-56f8-455f-8b80-fa305b85eaea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e3ac246f-56f8-455f-8b80-fa305b85eaea/export</guid>
      <pubDate>Mon, 15 Sep 2025 13:28:31 +0000</pubDate>
    </item>
    <item>
      <title>eac84de1-65f3-4818-9098-a6f4bdcd80de</title>
      <link>https://db.gcve.eu/sighting/eac84de1-65f3-4818-9098-a6f4bdcd80de/export</link>
      <description>{"uuid": "eac84de1-65f3-4818-9098-a6f4bdcd80de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:01.000000Z"}</description>
      <content:encoded>{"uuid": "eac84de1-65f3-4818-9098-a6f4bdcd80de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/eac84de1-65f3-4818-9098-a6f4bdcd80de/export</guid>
      <pubDate>Tue, 16 Sep 2025 03:45:01 +0000</pubDate>
    </item>
  </channel>
</rss>
