<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T17:58:46.254260+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e8a5ce3d-365f-4fe8-bc85-bd8fd5d98db5/export</id>
    <title>e8a5ce3d-365f-4fe8-bc85-bd8fd5d98db5</title>
    <updated>2026-05-04T17:58:46.544938+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e8a5ce3d-365f-4fe8-bc85-bd8fd5d98db5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0914", "type": "seen", "source": "https://t.me/secinfosex/54", "content": "\u041d\u0435\u0434\u0430\u0432\u043d\u043e \u0432 \u0447\u0430\u0442\u0435 \u0443 \u043d\u0430\u0441 \u0437\u0430\u0448\u0435\u043b \u0440\u0430\u0437\u0433\u043e\u0432\u043e\u0440 \u043e Google Rapid Response. \n\u0423\u0432\u044b, \u0441\u0447\u0438\u0442\u0430\u044e \u0447\u0442\u043e GRR \u043c\u043e\u0436\u043d\u043e \u0441\u0447\u0438\u0442\u0430\u0442\u044c \u043c\u0435\u0440\u0442\u0432\u044b\u043c, \u044d\u0442\u043e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0437\u0430\u0431\u0440\u043e\u0448\u0435\u043d\u043d\u044b\u0439 \u043f\u0440\u043e\u0435\u043a\u0442. \n\n\u041d\u043e \u043d\u0435 \u0440\u0430\u0441\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u043c\u0441\u044f, \u043d\u0435 \u0432\u0441\u0435 \u043f\u043e\u0442\u0435\u0440\u044f\u043d\u043e - \u0440\u0430\u0437\u0440\u0430\u0431 GRR \u041c\u0430\u0439\u043a \u041a\u043e\u044d\u043d \u0443\u0448\u0435\u043b \u0438\u0437 \u0433\u0443\u0433\u043b\u0430, \u043d\u0430\u0448\u0435\u043b \u0444\u0430\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0432 GRR, \u0438 \u043e\u0441\u043d\u043e\u0432\u0430\u043b \u0441\u0432\u043e\u0439 \u043f\u0440\u043e\u0435\u043a\u0442 Velociraptor \u0441 \u043f\u0430\u043b\u0435\u043e\u0437\u043e\u0435\u043c \u0438 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u043c\u0438 \u043f\u0430\u043b\u0435\u043e\u043d\u0442\u043e\u043b\u043e\u0433\u0430\u043c\u0438. \n\n\u0418 \u0442\u0443\u0442 \u0443 \u043d\u0438\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u043e\u0441\u044c!\n\n\u042d\u0442\u043e \u043e\u0447\u0435\u043d\u044c \u0440\u0430\u0431\u043e\u0447\u0430\u044f \u0448\u0442\u0443\u043a\u0430, \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e \u0441\u043f\u0440\u043e\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0438 \u0433\u0438\u0431\u043a\u0430\u044f, \u043c\u0435\u0441\u0442\u0430\u043c\u0438 \u0432\u0435\u0441\u044c\u043c\u0430 \u043f\u0440\u043e\u0434\u0443\u043c\u0430\u043d\u043d\u0430\u044f (web gui \u043f\u043e\u043b\u043d\u043e\u0446\u0435\u043d\u043d\u043e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u043a\u043b\u0430\u0432\u0443, \u0438 \u044d\u0442\u043e \u0432 2025 \u0433\u043e\u0434\u0443!). \n\n\u0420\u0435\u0431\u044f\u0442\u0430 \u043f\u0438\u043b\u044f\u0442 \u043c\u043e\u043d\u043e\u043b\u0438\u0442\u043d\u043e\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u043d\u0430 golang, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c, \u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u043c, \u0438 \u0443\u043c\u0435\u0435\u0442 \u043c\u043d\u043e\u0433\u043e\u0435 - \u0438 Hunt \u043f\u043e \u0430\u0433\u0435\u043d\u0442\u0430\u043c, \u0438 \u043e\u0444\u0444\u043b\u0430\u0439\u043d \u043a\u043e\u043b\u043b\u0435\u043a\u0442\u043e\u0440 (\u0434\u0430, \u0441\u043e\u0431\u0440\u0430\u043b \u0430\u0433\u0435\u043d\u0442\u0430, \u043e\u043d \u0442\u0435\u0431\u0435 \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b \u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0438 \u0441\u043e\u0445\u0440\u0430\u043d\u0438\u043b/\u043e\u0442\u043f\u0440\u0430\u0432\u0438\u043b \u0434\u0430\u043d\u043d\u044b\u0435), \u0438 EXECVE \u043d\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u0445 (\u0441\u0441\u044b\u043a\u043e\u0442\u043d\u043e, \u043d\u043e \u0442\u0430\u043c \u0435\u0441\u0442\u044c \u0445\u043e\u0440\u043e\u0448\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430 ACL \u0438 \u043d\u0443\u0436\u043d\u043e \u0434\u0430\u0442\u044c \u043f\u0435\u0440\u043c\u0438\u0448\u043d, \u043a\u0441\u0442\u0430\u0442\u0438 \u0435\u0441\u043b\u0438 \u043a\u0442\u043e \u044e\u0437\u0430\u0435\u0442, \u0442\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u0435\u0441\u044c \u0434\u043e 0.73.4, \u0442\u0430\u043c CVE-2025-0914, \u043d\u0443 \u0431\u044b\u0432\u0430\u0435\u0442\ud83e\udd28). \n\n\u041e\u0441\u0442\u0430\u043b\u044c\u043d\u043e\u0435 \u0447\u0438\u0442\u0430\u0435\u043c \u0432 \u043a\u043e\u043c\u043c\u0435\u043d\u0442\u0430\u0445, \u0441\u044e\u0434\u0430 \u0432\u0441\u0435 \u043d\u0435 \u0432\u043c\u0435\u0441\u0442\u0438\u043b\u043e\u0441\u044c.", "creation_timestamp": "2025-02-27T16:37:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e8a5ce3d-365f-4fe8-bc85-bd8fd5d98db5/export"/>
    <published>2025-02-27T16:37:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ebb3cd82-9345-470b-825a-afabcccea67d/export</id>
    <title>ebb3cd82-9345-470b-825a-afabcccea67d</title>
    <updated>2026-05-04T17:58:46.543209+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ebb3cd82-9345-470b-825a-afabcccea67d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0914", "type": "seen", "source": "https://t.me/cvedetector/19062", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0914 - \"Velociraptor VQL Shell Improper Access Control Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-0914 \nPublished : Feb. 27, 2025, 4:15 p.m. | 1\u00a0hour, 17\u00a0minutes ago \nDescription : An improper access control issue in the VQL shell feature in Velociraptor Versions &amp;lt; 0.73.4 allowed authenticated users to execute the execve() plugin in deployments where this was explicitly forbidden by configuring the prevent_execve flag in the configuration file. This setting is not usually recommended and is uncommonly used, so this issue will only affect users who do set it. This issue is fixed in release 0.73.4. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T19:15:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ebb3cd82-9345-470b-825a-afabcccea67d/export"/>
    <published>2025-02-27T19:15:57+00:00</published>
  </entry>
</feed>
