<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 22:02:23 +0000</lastBuildDate>
    <item>
      <title>5842caf4-c960-462d-afce-753b129c0333</title>
      <link>https://db.gcve.eu/sighting/5842caf4-c960-462d-afce-753b129c0333/export</link>
      <description>{"uuid": "5842caf4-c960-462d-afce-753b129c0333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7325", "type": "seen", "source": "https://t.me/cvedetector/2167", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7325 - IObit Driver Booster BPL Handler Uncontrolled Search Path Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7325 \nPublished : July 31, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability was found in IObit Driver Booster 11.0.0.0. It has been rated as critical. Affected by this issue is some unknown functionality in the library VCL120.BPL of the component BPL Handler. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The identifier of this vulnerability is VDB-273248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T22:41:32.000000Z"}</description>
      <content:encoded>{"uuid": "5842caf4-c960-462d-afce-753b129c0333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7325", "type": "seen", "source": "https://t.me/cvedetector/2167", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7325 - IObit Driver Booster BPL Handler Uncontrolled Search Path Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7325 \nPublished : July 31, 2024, 8:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability was found in IObit Driver Booster 11.0.0.0. It has been rated as critical. Affected by this issue is some unknown functionality in the library VCL120.BPL of the component BPL Handler. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The identifier of this vulnerability is VDB-273248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T22:41:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5842caf4-c960-462d-afce-753b129c0333/export</guid>
      <pubDate>Wed, 31 Jul 2024 22:41:32 +0000</pubDate>
    </item>
  </channel>
</rss>
