<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 23:41:25 +0000</lastBuildDate>
    <item>
      <title>aaad6ea7-d3d5-470e-a369-10dd3aef74a4</title>
      <link>https://db.gcve.eu/sighting/aaad6ea7-d3d5-470e-a369-10dd3aef74a4/export</link>
      <description>{"uuid": "aaad6ea7-d3d5-470e-a369-10dd3aef74a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7654", "type": "seen", "source": "https://t.me/cvedetector/4696", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7654 - \"OpenEdge Management ActiveMQ Discovery Service UDP Port Authentication Bypass\"\", \n  \"Content\": \"CVE ID : CVE-2024-7654 \nPublished : Sept. 3, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : An ActiveMQ Discovery service was reachable by default from an OpenEdge Management installation when an OEE/OEM auto-discovery feature was activated.\u00a0 Unauthorized access to the discovery service's UDP port allowed content injection into parts of the OEM web interface making it possible for other types of attack that could spoof or deceive web interface users.\u00a0\u00a0 Unauthorized use of the OEE/OEM discovery service was remediated by deactivating the discovery service by default. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T18:18:40.000000Z"}</description>
      <content:encoded>{"uuid": "aaad6ea7-d3d5-470e-a369-10dd3aef74a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7654", "type": "seen", "source": "https://t.me/cvedetector/4696", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7654 - \"OpenEdge Management ActiveMQ Discovery Service UDP Port Authentication Bypass\"\", \n  \"Content\": \"CVE ID : CVE-2024-7654 \nPublished : Sept. 3, 2024, 3:15 p.m. | 37\u00a0minutes ago \nDescription : An ActiveMQ Discovery service was reachable by default from an OpenEdge Management installation when an OEE/OEM auto-discovery feature was activated.\u00a0 Unauthorized access to the discovery service's UDP port allowed content injection into parts of the OEM web interface making it possible for other types of attack that could spoof or deceive web interface users.\u00a0\u00a0 Unauthorized use of the OEE/OEM discovery service was remediated by deactivating the discovery service by default. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T18:18:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/aaad6ea7-d3d5-470e-a369-10dd3aef74a4/export</guid>
      <pubDate>Tue, 03 Sep 2024 18:18:40 +0000</pubDate>
    </item>
  </channel>
</rss>
