<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 21:26:43 +0000</lastBuildDate>
    <item>
      <title>59119429-f010-4960-9992-b5b151915753</title>
      <link>https://db.gcve.eu/sighting/59119429-f010-4960-9992-b5b151915753/export</link>
      <description>{"uuid": "59119429-f010-4960-9992-b5b151915753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14864", "type": "seen", "source": "https://t.me/cveNotify/181", "content": "\ud83d\udea8 #CVE-2018-14864\nIncorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14864\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-04T17:59:55.000000Z"}</description>
      <content:encoded>{"uuid": "59119429-f010-4960-9992-b5b151915753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14864", "type": "seen", "source": "https://t.me/cveNotify/181", "content": "\ud83d\udea8 #CVE-2018-14864\nIncorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14864\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-04T17:59:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/59119429-f010-4960-9992-b5b151915753/export</guid>
      <pubDate>Thu, 04 Jul 2019 17:59:55 +0000</pubDate>
    </item>
    <item>
      <title>40bb2ba2-21eb-4134-bb87-c91b489d01c6</title>
      <link>https://db.gcve.eu/sighting/40bb2ba2-21eb-4134-bb87-c91b489d01c6/export</link>
      <description>{"uuid": "40bb2ba2-21eb-4134-bb87-c91b489d01c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14864", "type": "seen", "source": "https://t.me/cveNotify/237", "content": "\ud83d\udea8 #CVE-2018-14864\nIncorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14864\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-05T17:00:09.000000Z"}</description>
      <content:encoded>{"uuid": "40bb2ba2-21eb-4134-bb87-c91b489d01c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14864", "type": "seen", "source": "https://t.me/cveNotify/237", "content": "\ud83d\udea8 #CVE-2018-14864\nIncorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14864\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-05T17:00:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/40bb2ba2-21eb-4134-bb87-c91b489d01c6/export</guid>
      <pubDate>Fri, 05 Jul 2019 17:00:09 +0000</pubDate>
    </item>
  </channel>
</rss>
