<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 22 May 2026 23:20:34 +0000</lastBuildDate>
    <item>
      <title>6453f1ae-6d29-4fa7-abba-f2bce9ff7a45</title>
      <link>https://db.gcve.eu/sighting/6453f1ae-6d29-4fa7-abba-f2bce9ff7a45/export</link>
      <description>{"uuid": "6453f1ae-6d29-4fa7-abba-f2bce9ff7a45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44809", "type": "seen", "source": "https://t.me/cvedetector/4731", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44809 - Pi Camera RECANTHA Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-44809 \nPublished : Sept. 3, 2024, 10:15 p.m. | 36\u00a0minutes ago \nDescription : A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the \"position\" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T01:00:21.000000Z"}</description>
      <content:encoded>{"uuid": "6453f1ae-6d29-4fa7-abba-f2bce9ff7a45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44809", "type": "seen", "source": "https://t.me/cvedetector/4731", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44809 - Pi Camera RECANTHA Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-44809 \nPublished : Sept. 3, 2024, 10:15 p.m. | 36\u00a0minutes ago \nDescription : A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the \"position\" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-04T01:00:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6453f1ae-6d29-4fa7-abba-f2bce9ff7a45/export</guid>
      <pubDate>Wed, 04 Sep 2024 01:00:21 +0000</pubDate>
    </item>
  </channel>
</rss>
