<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 11:37:35 +0000</lastBuildDate>
    <item>
      <title>0635214a-32a3-41e3-b02e-c75cffb29539</title>
      <link>https://db.gcve.eu/sighting/0635214a-32a3-41e3-b02e-c75cffb29539/export</link>
      <description>{"uuid": "0635214a-32a3-41e3-b02e-c75cffb29539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-cvv5-9h9w-qp2m", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113687004395004128", "content": "", "creation_timestamp": "2024-12-20T20:20:19.718411Z"}</description>
      <content:encoded>{"uuid": "0635214a-32a3-41e3-b02e-c75cffb29539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-cvv5-9h9w-qp2m", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113687004395004128", "content": "", "creation_timestamp": "2024-12-20T20:20:19.718411Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0635214a-32a3-41e3-b02e-c75cffb29539/export</guid>
      <pubDate>Fri, 20 Dec 2024 20:20:19 +0000</pubDate>
    </item>
    <item>
      <title>134993a2-54a5-4a12-9fde-a121e6631aa4</title>
      <link>https://db.gcve.eu/sighting/134993a2-54a5-4a12-9fde-a121e6631aa4/export</link>
      <description>{"uuid": "134993a2-54a5-4a12-9fde-a121e6631aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CVV5-9H9W-QP2M", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11607", "content": "#WLAN_Security\n1. PMKID Attacks:\nDebunking the 802.11r Myth\nhttps://www.nccgroup.com/us/research-blog/pmkid-attacks-debunking-the-80211r-myth\n2. Command injection vulnerability in getWindowsIEEE8021x (SSID)\nhttps://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m", "creation_timestamp": "2024-12-26T11:19:35.000000Z"}</description>
      <content:encoded>{"uuid": "134993a2-54a5-4a12-9fde-a121e6631aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CVV5-9H9W-QP2M", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11607", "content": "#WLAN_Security\n1. PMKID Attacks:\nDebunking the 802.11r Myth\nhttps://www.nccgroup.com/us/research-blog/pmkid-attacks-debunking-the-80211r-myth\n2. Command injection vulnerability in getWindowsIEEE8021x (SSID)\nhttps://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m", "creation_timestamp": "2024-12-26T11:19:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/134993a2-54a5-4a12-9fde-a121e6631aa4/export</guid>
      <pubDate>Thu, 26 Dec 2024 11:19:35 +0000</pubDate>
    </item>
    <item>
      <title>1bc0321a-5082-41be-b6f9-243a8e9e4db6</title>
      <link>https://db.gcve.eu/sighting/1bc0321a-5082-41be-b6f9-243a8e9e4db6/export</link>
      <description>{"uuid": "1bc0321a-5082-41be-b6f9-243a8e9e4db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CVV5-9H9W-QP2M", "type": "published-proof-of-concept", "source": "https://t.me/ZeroDay_ru/357", "content": "#WLAN_Security\n1. PMKID Attacks:\nDebunking the 802.11r Myth\nhttps://www.nccgroup.com/us/research-blog/pmkid-attacks-debunking-the-80211r-myth\n2. Command injection vulnerability in getWindowsIEEE8021x (SSID)\nhttps://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m", "creation_timestamp": "2024-12-26T12:06:04.000000Z"}</description>
      <content:encoded>{"uuid": "1bc0321a-5082-41be-b6f9-243a8e9e4db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CVV5-9H9W-QP2M", "type": "published-proof-of-concept", "source": "https://t.me/ZeroDay_ru/357", "content": "#WLAN_Security\n1. PMKID Attacks:\nDebunking the 802.11r Myth\nhttps://www.nccgroup.com/us/research-blog/pmkid-attacks-debunking-the-80211r-myth\n2. Command injection vulnerability in getWindowsIEEE8021x (SSID)\nhttps://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m", "creation_timestamp": "2024-12-26T12:06:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1bc0321a-5082-41be-b6f9-243a8e9e4db6/export</guid>
      <pubDate>Thu, 26 Dec 2024 12:06:04 +0000</pubDate>
    </item>
    <item>
      <title>507785ee-32f4-42ca-9c99-c593a88a71af</title>
      <link>https://db.gcve.eu/sighting/507785ee-32f4-42ca-9c99-c593a88a71af/export</link>
      <description>{"uuid": "507785ee-32f4-42ca-9c99-c593a88a71af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CVV5-9H9W-QP2M", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/257", "content": "https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m\n\nCommand injection vulnerability in getWindowsIEEE8021x (SSID)\n#github #poc", "creation_timestamp": "2024-12-26T21:24:21.000000Z"}</description>
      <content:encoded>{"uuid": "507785ee-32f4-42ca-9c99-c593a88a71af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CVV5-9H9W-QP2M", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/257", "content": "https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m\n\nCommand injection vulnerability in getWindowsIEEE8021x (SSID)\n#github #poc", "creation_timestamp": "2024-12-26T21:24:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/507785ee-32f4-42ca-9c99-c593a88a71af/export</guid>
      <pubDate>Thu, 26 Dec 2024 21:24:21 +0000</pubDate>
    </item>
    <item>
      <title>4e8285ff-7f8a-497c-9193-32ba3adc2747</title>
      <link>https://db.gcve.eu/sighting/4e8285ff-7f8a-497c-9193-32ba3adc2747/export</link>
      <description>{"uuid": "4e8285ff-7f8a-497c-9193-32ba3adc2747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-cvv5-9h9w-qp2m", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-079bc9d7-8feebf14eed3d5b1", "content": "", "creation_timestamp": "2025-01-06T09:39:21.971172Z"}</description>
      <content:encoded>{"uuid": "4e8285ff-7f8a-497c-9193-32ba3adc2747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-cvv5-9h9w-qp2m", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-079bc9d7-8feebf14eed3d5b1", "content": "", "creation_timestamp": "2025-01-06T09:39:21.971172Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4e8285ff-7f8a-497c-9193-32ba3adc2747/export</guid>
      <pubDate>Mon, 06 Jan 2025 09:39:21 +0000</pubDate>
    </item>
    <item>
      <title>58b458e3-8f71-4856-811b-a30410edc237</title>
      <link>https://db.gcve.eu/sighting/58b458e3-8f71-4856-811b-a30410edc237/export</link>
      <description>{"uuid": "58b458e3-8f71-4856-811b-a30410edc237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CVV5-9H9W-QP2M", "type": "seen", "source": "https://t.me/suboxone_chatroom/1583", "content": "#WLAN_Security\n1. PMKID Attacks:\nDebunking the 802.11r Myth\nhttps://www.nccgroup.com/us/research-blog/pmkid-attacks-debunking-the-80211r-myth\n2. Command injection vulnerability in getWindowsIEEE8021x (SSID)\nhttps://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m", "creation_timestamp": "2025-01-27T07:07:53.000000Z"}</description>
      <content:encoded>{"uuid": "58b458e3-8f71-4856-811b-a30410edc237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CVV5-9H9W-QP2M", "type": "seen", "source": "https://t.me/suboxone_chatroom/1583", "content": "#WLAN_Security\n1. PMKID Attacks:\nDebunking the 802.11r Myth\nhttps://www.nccgroup.com/us/research-blog/pmkid-attacks-debunking-the-80211r-myth\n2. Command injection vulnerability in getWindowsIEEE8021x (SSID)\nhttps://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m", "creation_timestamp": "2025-01-27T07:07:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/58b458e3-8f71-4856-811b-a30410edc237/export</guid>
      <pubDate>Mon, 27 Jan 2025 07:07:53 +0000</pubDate>
    </item>
  </channel>
</rss>
