<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 10:22:07 +0000</lastBuildDate>
    <item>
      <title>a82c24df-c52c-4068-87f4-4dca467c1fea</title>
      <link>https://db.gcve.eu/sighting/a82c24df-c52c-4068-87f4-4dca467c1fea/export</link>
      <description>{"uuid": "a82c24df-c52c-4068-87f4-4dca467c1fea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6983", "type": "seen", "source": "https://t.me/cvedetector/6549", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6983 - Mudler LocalAI Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-6983 \nPublished : Sept. 27, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T19:14:37.000000Z"}</description>
      <content:encoded>{"uuid": "a82c24df-c52c-4068-87f4-4dca467c1fea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6983", "type": "seen", "source": "https://t.me/cvedetector/6549", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6983 - Mudler LocalAI Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-6983 \nPublished : Sept. 27, 2024, 4:15 p.m. | 38\u00a0minutes ago \nDescription : mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and execute malicious code. This can lead to the attacker gaining full control over the system. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T19:14:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a82c24df-c52c-4068-87f4-4dca467c1fea/export</guid>
      <pubDate>Fri, 27 Sep 2024 19:14:37 +0000</pubDate>
    </item>
    <item>
      <title>97c93c12-7248-4cf0-b34d-a190dec77df0</title>
      <link>https://db.gcve.eu/sighting/97c93c12-7248-4cf0-b34d-a190dec77df0/export</link>
      <description>{"uuid": "97c93c12-7248-4cf0-b34d-a190dec77df0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6983", "type": "published-proof-of-concept", "source": "https://github.com/google/tsunami-security-scanner-plugins/tree/master/community/detectors/mudler_localai_cve_2024_6983", "content": "", "creation_timestamp": "2025-02-18T12:07:35.000000Z"}</description>
      <content:encoded>{"uuid": "97c93c12-7248-4cf0-b34d-a190dec77df0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6983", "type": "published-proof-of-concept", "source": "https://github.com/google/tsunami-security-scanner-plugins/tree/master/community/detectors/mudler_localai_cve_2024_6983", "content": "", "creation_timestamp": "2025-02-18T12:07:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/97c93c12-7248-4cf0-b34d-a190dec77df0/export</guid>
      <pubDate>Tue, 18 Feb 2025 12:07:35 +0000</pubDate>
    </item>
  </channel>
</rss>
