<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 23:35:39 +0000</lastBuildDate>
    <item>
      <title>b6acc1f3-8465-4be6-8fca-d8e3242c912b</title>
      <link>https://db.gcve.eu/sighting/b6acc1f3-8465-4be6-8fca-d8e3242c912b/export</link>
      <description>{"uuid": "b6acc1f3-8465-4be6-8fca-d8e3242c912b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7346", "type": "seen", "source": "https://t.me/cvedetector/4697", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7346 - Prologic OpenEdge TLS Certificate Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-7346 \nPublished : Sept. 3, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Host name validation for TLS certificates is bypassed when the installed OpenEdge default certificates are used to perform the TLS handshake for a networked connection.\u00a0 This has been corrected so that default certificates are no longer capable of overriding host name validation and will need to be replaced where full TLS certificate validation is needed for network security.\u00a0 The existing certificates should be replaced with CA-signed certificates from a recognized certificate authority that contain the necessary information to support host name validation. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T18:18:41.000000Z"}</description>
      <content:encoded>{"uuid": "b6acc1f3-8465-4be6-8fca-d8e3242c912b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7346", "type": "seen", "source": "https://t.me/cvedetector/4697", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7346 - Prologic OpenEdge TLS Certificate Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-7346 \nPublished : Sept. 3, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : Host name validation for TLS certificates is bypassed when the installed OpenEdge default certificates are used to perform the TLS handshake for a networked connection.\u00a0 This has been corrected so that default certificates are no longer capable of overriding host name validation and will need to be replaced where full TLS certificate validation is needed for network security.\u00a0 The existing certificates should be replaced with CA-signed certificates from a recognized certificate authority that contain the necessary information to support host name validation. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T18:18:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b6acc1f3-8465-4be6-8fca-d8e3242c912b/export</guid>
      <pubDate>Tue, 03 Sep 2024 18:18:41 +0000</pubDate>
    </item>
  </channel>
</rss>
