<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent comments.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent comments.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 18 Apr 2026 13:43:53 +0000</lastBuildDate>
    <item>
      <title>Likely exploited</title>
      <link>https://db.gcve.eu/comment/b7668c06-85ed-4e3f-ab33-77c996b4e48b</link>
      <description>&amp;gt; There is growing speculation that the Red Hat compromise may be linked to a recently disclosed vulnerability in Red Hat OpenShift AI — CVE-2025-10725 (CVSS 9.9). 

https://www.seqrite.com/blog/anatomy-of-the-red-hat-intrusion-crimson-collective-and-slsh-extortions/</description>
      <content:encoded>&amp;gt; There is growing speculation that the Red Hat compromise may be linked to a recently disclosed vulnerability in Red Hat OpenShift AI — CVE-2025-10725 (CVSS 9.9). 

https://www.seqrite.com/blog/anatomy-of-the-red-hat-intrusion-crimson-collective-and-slsh-extortions/</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/comment/b7668c06-85ed-4e3f-ab33-77c996b4e48b</guid>
      <pubDate>Fri, 24 Oct 2025 20:54:27 +0000</pubDate>
    </item>
  </channel>
</rss>
