<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 03:55:47 +0000</lastBuildDate>
    <item>
      <title>c7db6505-4c79-42de-9d14-9d455c1d2efb</title>
      <link>https://db.gcve.eu/sighting/c7db6505-4c79-42de-9d14-9d455c1d2efb/export</link>
      <description>{"uuid": "c7db6505-4c79-42de-9d14-9d455c1d2efb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "RHSA-2024:2587", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2874", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1488\n\ud83d\udd39 Description: A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.\n\ud83d\udccf Published: 2024-02-15T05:04:13.994Z\n\ud83d\udccf Modified: 2025-01-24T05:55:20.447Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:1750\n2. https://access.redhat.com/errata/RHSA-2024:1751\n3. https://access.redhat.com/errata/RHSA-2024:1780\n4. https://access.redhat.com/errata/RHSA-2024:1801\n5. https://access.redhat.com/errata/RHSA-2024:1802\n6. https://access.redhat.com/errata/RHSA-2024:1804\n7. https://access.redhat.com/errata/RHSA-2024:2587\n8. https://access.redhat.com/errata/RHSA-2024:2696\n9. https://access.redhat.com/security/cve/CVE-2024-1488\n10. https://bugzilla.redhat.com/show_bug.cgi?id=2264183", "creation_timestamp": "2025-01-24T06:12:32.000000Z"}</description>
      <content:encoded>{"uuid": "c7db6505-4c79-42de-9d14-9d455c1d2efb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "RHSA-2024:2587", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2874", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1488\n\ud83d\udd39 Description: A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.\n\ud83d\udccf Published: 2024-02-15T05:04:13.994Z\n\ud83d\udccf Modified: 2025-01-24T05:55:20.447Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:1750\n2. https://access.redhat.com/errata/RHSA-2024:1751\n3. https://access.redhat.com/errata/RHSA-2024:1780\n4. https://access.redhat.com/errata/RHSA-2024:1801\n5. https://access.redhat.com/errata/RHSA-2024:1802\n6. https://access.redhat.com/errata/RHSA-2024:1804\n7. https://access.redhat.com/errata/RHSA-2024:2587\n8. https://access.redhat.com/errata/RHSA-2024:2696\n9. https://access.redhat.com/security/cve/CVE-2024-1488\n10. https://bugzilla.redhat.com/show_bug.cgi?id=2264183", "creation_timestamp": "2025-01-24T06:12:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c7db6505-4c79-42de-9d14-9d455c1d2efb/export</guid>
      <pubDate>Fri, 24 Jan 2025 06:12:32 +0000</pubDate>
    </item>
    <item>
      <title>3b173a3c-ff89-4538-b38f-78f7a6964dd7</title>
      <link>https://db.gcve.eu/sighting/3b173a3c-ff89-4538-b38f-78f7a6964dd7/export</link>
      <description>{"uuid": "3b173a3c-ff89-4538-b38f-78f7a6964dd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "RHSA-2024:2587", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3545", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1488\n\ud83d\udd25 CVSS Score: 8.0 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.\n\ud83d\udccf Published: 2024-02-15T06:31:35Z\n\ud83d\udccf Modified: 2025-01-31T00:30:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-1488\n2. https://access.redhat.com/errata/RHSA-2024:1750\n3. https://access.redhat.com/errata/RHSA-2024:1751\n4. https://access.redhat.com/errata/RHSA-2024:1780\n5. https://access.redhat.com/errata/RHSA-2024:1801\n6. https://access.redhat.com/errata/RHSA-2024:1802\n7. https://access.redhat.com/errata/RHSA-2024:1804\n8. https://access.redhat.com/errata/RHSA-2024:2587\n9. https://access.redhat.com/errata/RHSA-2024:2696\n10. https://access.redhat.com/errata/RHSA-2025:0837\n11. https://access.redhat.com/security/cve/CVE-2024-1488\n12. https://bugzilla.redhat.com/show_bug.cgi?id=2264183", "creation_timestamp": "2025-01-31T01:12:29.000000Z"}</description>
      <content:encoded>{"uuid": "3b173a3c-ff89-4538-b38f-78f7a6964dd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "RHSA-2024:2587", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3545", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1488\n\ud83d\udd25 CVSS Score: 8.0 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.\n\ud83d\udccf Published: 2024-02-15T06:31:35Z\n\ud83d\udccf Modified: 2025-01-31T00:30:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-1488\n2. https://access.redhat.com/errata/RHSA-2024:1750\n3. https://access.redhat.com/errata/RHSA-2024:1751\n4. https://access.redhat.com/errata/RHSA-2024:1780\n5. https://access.redhat.com/errata/RHSA-2024:1801\n6. https://access.redhat.com/errata/RHSA-2024:1802\n7. https://access.redhat.com/errata/RHSA-2024:1804\n8. https://access.redhat.com/errata/RHSA-2024:2587\n9. https://access.redhat.com/errata/RHSA-2024:2696\n10. https://access.redhat.com/errata/RHSA-2025:0837\n11. https://access.redhat.com/security/cve/CVE-2024-1488\n12. https://bugzilla.redhat.com/show_bug.cgi?id=2264183", "creation_timestamp": "2025-01-31T01:12:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3b173a3c-ff89-4538-b38f-78f7a6964dd7/export</guid>
      <pubDate>Fri, 31 Jan 2025 01:12:29 +0000</pubDate>
    </item>
  </channel>
</rss>
