<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 21:53:43 +0000</lastBuildDate>
    <item>
      <title>dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c</title>
      <link>https://db.gcve.eu/sighting/dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c/export</link>
      <description>{"uuid": "dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5646", "type": "seen", "source": "Telegram/CyShfnxDIVHOXG7Cu89TEXIMBwJip83Ry2BPq0N2ZmPm28i0", "content": "", "creation_timestamp": "2025-02-06T02:43:29.000000Z"}</description>
      <content:encoded>{"uuid": "dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5646", "type": "seen", "source": "Telegram/CyShfnxDIVHOXG7Cu89TEXIMBwJip83Ry2BPq0N2ZmPm28i0", "content": "", "creation_timestamp": "2025-02-06T02:43:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c/export</guid>
      <pubDate>Thu, 06 Feb 2025 02:43:29 +0000</pubDate>
    </item>
    <item>
      <title>caea4fe5-5255-40cc-8eba-2e08469775f9</title>
      <link>https://db.gcve.eu/sighting/caea4fe5-5255-40cc-8eba-2e08469775f9/export</link>
      <description>{"uuid": "caea4fe5-5255-40cc-8eba-2e08469775f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958841808577146", "content": "", "creation_timestamp": "2025-02-06T20:32:09.420917Z"}</description>
      <content:encoded>{"uuid": "caea4fe5-5255-40cc-8eba-2e08469775f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958841808577146", "content": "", "creation_timestamp": "2025-02-06T20:32:09.420917Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/caea4fe5-5255-40cc-8eba-2e08469775f9/export</guid>
      <pubDate>Thu, 06 Feb 2025 20:32:09 +0000</pubDate>
    </item>
    <item>
      <title>ef92ba48-2f57-4a34-828f-0a774dbf439d</title>
      <link>https://db.gcve.eu/sighting/ef92ba48-2f57-4a34-828f-0a774dbf439d/export</link>
      <description>{"uuid": "ef92ba48-2f57-4a34-828f-0a774dbf439d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjyz7demr24", "content": "", "creation_timestamp": "2025-02-06T21:15:38.244213Z"}</description>
      <content:encoded>{"uuid": "ef92ba48-2f57-4a34-828f-0a774dbf439d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjyz7demr24", "content": "", "creation_timestamp": "2025-02-06T21:15:38.244213Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ef92ba48-2f57-4a34-828f-0a774dbf439d/export</guid>
      <pubDate>Thu, 06 Feb 2025 21:15:38 +0000</pubDate>
    </item>
    <item>
      <title>3a6c0db9-9dac-402c-9ac3-24980ce3d5cd</title>
      <link>https://db.gcve.eu/sighting/3a6c0db9-9dac-402c-9ac3-24980ce3d5cd/export</link>
      <description>{"uuid": "3a6c0db9-9dac-402c-9ac3-24980ce3d5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhk6agwuus2g", "content": "", "creation_timestamp": "2025-02-06T22:49:15.509059Z"}</description>
      <content:encoded>{"uuid": "3a6c0db9-9dac-402c-9ac3-24980ce3d5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhk6agwuus2g", "content": "", "creation_timestamp": "2025-02-06T22:49:15.509059Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3a6c0db9-9dac-402c-9ac3-24980ce3d5cd/export</guid>
      <pubDate>Thu, 06 Feb 2025 22:49:15 +0000</pubDate>
    </item>
    <item>
      <title>50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe</title>
      <link>https://db.gcve.eu/sighting/50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe/export</link>
      <description>{"uuid": "50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://t.me/cvedetector/17444", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56467 - IBM EntireX Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56467 \nPublished : Feb. 6, 2025, 9:15 p.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned.  This information could be used in further attacks against the system. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T00:26:10.000000Z"}</description>
      <content:encoded>{"uuid": "50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://t.me/cvedetector/17444", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56467 - IBM EntireX Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56467 \nPublished : Feb. 6, 2025, 9:15 p.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned.  This information could be used in further attacks against the system. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T00:26:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe/export</guid>
      <pubDate>Fri, 07 Feb 2025 00:26:10 +0000</pubDate>
    </item>
    <item>
      <title>b0ec69cb-f7f2-4546-ab59-5fc4a4781c95</title>
      <link>https://db.gcve.eu/sighting/b0ec69cb-f7f2-4546-ab59-5fc4a4781c95/export</link>
      <description>{"uuid": "b0ec69cb-f7f2-4546-ab59-5fc4a4781c95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5pdhacsw2g", "content": "", "creation_timestamp": "2025-02-14T17:15:40.303384Z"}</description>
      <content:encoded>{"uuid": "b0ec69cb-f7f2-4546-ab59-5fc4a4781c95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5pdhacsw2g", "content": "", "creation_timestamp": "2025-02-14T17:15:40.303384Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b0ec69cb-f7f2-4546-ab59-5fc4a4781c95/export</guid>
      <pubDate>Fri, 14 Feb 2025 17:15:40 +0000</pubDate>
    </item>
    <item>
      <title>bf319dd2-0d6b-4fb6-a698-a466f6c580af</title>
      <link>https://db.gcve.eu/sighting/bf319dd2-0d6b-4fb6-a698-a466f6c580af/export</link>
      <description>{"uuid": "bf319dd2-0d6b-4fb6-a698-a466f6c580af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5uda4wp62m", "content": "", "creation_timestamp": "2025-02-14T18:45:08.417167Z"}</description>
      <content:encoded>{"uuid": "bf319dd2-0d6b-4fb6-a698-a466f6c580af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5uda4wp62m", "content": "", "creation_timestamp": "2025-02-14T18:45:08.417167Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bf319dd2-0d6b-4fb6-a698-a466f6c580af/export</guid>
      <pubDate>Fri, 14 Feb 2025 18:45:08 +0000</pubDate>
    </item>
    <item>
      <title>a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae</title>
      <link>https://db.gcve.eu/sighting/a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae/export</link>
      <description>{"uuid": "a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://t.me/cvedetector/18132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56463 - IBM QRadar SIEM Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56463 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : IBM QRadar SIEM 7.5 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:57:09.000000Z"}</description>
      <content:encoded>{"uuid": "a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://t.me/cvedetector/18132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56463 - IBM QRadar SIEM Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56463 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : IBM QRadar SIEM 7.5 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:57:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae/export</guid>
      <pubDate>Fri, 14 Feb 2025 19:57:09 +0000</pubDate>
    </item>
    <item>
      <title>aaead5bf-3e68-4981-809e-fc7f4ae16eab</title>
      <link>https://db.gcve.eu/sighting/aaead5bf-3e68-4981-809e-fc7f4ae16eab/export</link>
      <description>{"uuid": "aaead5bf-3e68-4981-809e-fc7f4ae16eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5079", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56467\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned.  This information could be used in further attacks against the system.\n\ud83d\udccf Published: 2025-02-06T20:30:45.432Z\n\ud83d\udccf Modified: 2025-02-22T22:13:01.190Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7182693", "creation_timestamp": "2025-02-22T23:19:59.000000Z"}</description>
      <content:encoded>{"uuid": "aaead5bf-3e68-4981-809e-fc7f4ae16eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5079", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56467\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned.  This information could be used in further attacks against the system.\n\ud83d\udccf Published: 2025-02-06T20:30:45.432Z\n\ud83d\udccf Modified: 2025-02-22T22:13:01.190Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7182693", "creation_timestamp": "2025-02-22T23:19:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/aaead5bf-3e68-4981-809e-fc7f4ae16eab/export</guid>
      <pubDate>Sat, 22 Feb 2025 23:19:59 +0000</pubDate>
    </item>
  </channel>
</rss>
