<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-23T11:19:59.604803+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/b22dc426-b602-46ff-9ca9-7c19b5da7039/export</id>
    <title>b22dc426-b602-46ff-9ca9-7c19b5da7039</title>
    <updated>2026-05-23T11:19:59.794567+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b22dc426-b602-46ff-9ca9-7c19b5da7039", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21105", "type": "seen", "source": "https://t.me/cvedetector/18537", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21105 - Dell RecoverPoint for Virtual Machines Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21105 \nPublished : Feb. 20, 2025, 12:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Dell RecoverPoint for Virtual Machines 6.0.X contains a command execution vulnerability. A Low privileged malicious user with local access could potentially exploit this vulnerability by running the specific binary and perform any administrative action permitted by it resulting in shutting down the server, modifying the configuration leading to gain access to unauthorized data. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T14:49:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b22dc426-b602-46ff-9ca9-7c19b5da7039/export"/>
    <published>2025-02-20T14:49:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9f927491-0ddf-4262-9654-13536c910a11/export</id>
    <title>9f927491-0ddf-4262-9654-13536c910a11</title>
    <updated>2026-05-23T11:19:59.794514+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9f927491-0ddf-4262-9654-13536c910a11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21106", "type": "seen", "source": "https://t.me/cvedetector/18538", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21106 - Dell Recover Point for Virtual Machines File System Permission Weakness\", \n  \"Content\": \"CVE ID : CVE-2025-21106 \nPublished : Feb. 20, 2025, 12:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T14:49:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9f927491-0ddf-4262-9654-13536c910a11/export"/>
    <published>2025-02-20T14:49:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/82eb9e60-5ec9-496d-9cad-de373129539e/export</id>
    <title>82eb9e60-5ec9-496d-9cad-de373129539e</title>
    <updated>2026-05-23T11:19:59.794463+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "82eb9e60-5ec9-496d-9cad-de373129539e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21106", "type": "seen", "source": "Telegram/7h3t7Cck5QFt5yxkv-pb8DB98oTT1-0QQa5UEd0kYGoZ-d83", "content": "", "creation_timestamp": "2025-02-20T23:26:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/82eb9e60-5ec9-496d-9cad-de373129539e/export"/>
    <published>2025-02-20T23:26:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/eb4be98d-2401-4747-8635-9161ae483299/export</id>
    <title>eb4be98d-2401-4747-8635-9161ae483299</title>
    <updated>2026-05-23T11:19:59.794414+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "eb4be98d-2401-4747-8635-9161ae483299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21105", "type": "seen", "source": "Telegram/f3fnAM6eg54AkPn_szwgB0yDcxnZcf_O8_OuVAa2felbnozX", "content": "", "creation_timestamp": "2025-02-20T23:26:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/eb4be98d-2401-4747-8635-9161ae483299/export"/>
    <published>2025-02-20T23:26:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cc9df91e-fec2-44fb-8c8a-c64cd1f5b08d/export</id>
    <title>cc9df91e-fec2-44fb-8c8a-c64cd1f5b08d</title>
    <updated>2026-05-23T11:19:59.794360+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cc9df91e-fec2-44fb-8c8a-c64cd1f5b08d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21104", "type": "seen", "source": "https://t.me/cvedetector/20217", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21104 - Dell NetWorker Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21104 \nPublished : March 13, 2025, 12:15 p.m. | 1\u00a0hour, 41\u00a0minutes ago \nDescription : Dell NetWorker, 19.11.0.3 and below versions, contain(s) an Open Redirect Vulnerability in NMC. An unauthenticated attacker with remoter access could potentially exploit this vulnerability, leading to a targeted application user being redirected to arbitrary web URLs. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T15:37:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cc9df91e-fec2-44fb-8c8a-c64cd1f5b08d/export"/>
    <published>2025-03-13T15:37:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1dfe9137-947d-4b58-afcf-3f16b6bf8f8a/export</id>
    <title>1dfe9137-947d-4b58-afcf-3f16b6bf8f8a</title>
    <updated>2026-05-23T11:19:59.794303+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1dfe9137-947d-4b58-afcf-3f16b6bf8f8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21104", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7479", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21104\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Dell NetWorker, 19.11.0.3 and below versions, contain(s) an Open Redirect Vulnerability in NMC. An unauthenticated attacker with remoter access could potentially exploit this vulnerability, leading to a targeted application user being redirected to arbitrary web URLs. The vulnerability could be leveraged by attackers to conduct phishing attacks that cause users to divulge sensitive information.\n\ud83d\udccf Published: 2025-03-13T11:42:22.866Z\n\ud83d\udccf Modified: 2025-03-13T19:32:16.334Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000294392/dsa-2025-124-security-update-for-dell-networker-management-console-for-http-host-header-injection-vulnerability", "creation_timestamp": "2025-03-13T19:42:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1dfe9137-947d-4b58-afcf-3f16b6bf8f8a/export"/>
    <published>2025-03-13T19:42:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e889ebfe-8fe6-4865-b4a5-5ec03a848eec/export</id>
    <title>e889ebfe-8fe6-4865-b4a5-5ec03a848eec</title>
    <updated>2026-05-23T11:19:59.794242+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e889ebfe-8fe6-4865-b4a5-5ec03a848eec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2110", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8829", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2110\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The WP Compress \u2013 Instant Performance &amp;amp; Speed Optimization plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on its on its AJAX functions in all versions up to, and including, 6.30.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to compromise the site in various ways depending on the specific function exploited - for example, by retrieving sensitive settings and configuration details, or by altering and deleting them, thereby disclosing sensitive information, disrupting the plugin\u2019s functionality, and potentially impacting overall site performance.\n\ud83d\udccf Published: 2025-03-26T11:22:08.756Z\n\ud83d\udccf Modified: 2025-03-26T11:22:08.756Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/2bb4ead4-b2ad-42b4-92a0-fb7293f6df06?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.30.15/classes/ajax.class.php\n3. https://wordpress.org/plugins/wp-compress-image-optimizer/#developers\n4. https://plugins.trac.wordpress.org/changeset/3254259/", "creation_timestamp": "2025-03-26T11:25:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e889ebfe-8fe6-4865-b4a5-5ec03a848eec/export"/>
    <published>2025-03-26T11:25:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5eb9db68-8db0-4d95-b43f-8fabdf5b8fce/export</id>
    <title>5eb9db68-8db0-4d95-b43f-8fabdf5b8fce</title>
    <updated>2026-05-23T11:19:59.794185+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5eb9db68-8db0-4d95-b43f-8fabdf5b8fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2110", "type": "seen", "source": "Telegram/_TV1T31eHrvyU-flISm4W9ELqZ4evKW9LK1i2AgsxeMw9Ac", "content": "", "creation_timestamp": "2025-03-26T13:00:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5eb9db68-8db0-4d95-b43f-8fabdf5b8fce/export"/>
    <published>2025-03-26T13:00:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/16e4cbf4-117f-4639-b341-cec37df7d4dd/export</id>
    <title>16e4cbf4-117f-4639-b341-cec37df7d4dd</title>
    <updated>2026-05-23T11:19:59.794097+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "16e4cbf4-117f-4639-b341-cec37df7d4dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2110", "type": "seen", "source": "https://t.me/cvedetector/21169", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2110 - WordPress WP Compress Unauthorized Access and Data Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2110 \nPublished : March 26, 2025, 12:15 p.m. | 26\u00a0minutes ago \nDescription : The WP Compress \u2013 Instant Performance &amp;amp; Speed Optimization plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on its on its AJAX functions in all versions up to, and including, 6.30.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to compromise the site in various ways depending on the specific function exploited - for example, by retrieving sensitive settings and configuration details, or by altering and deleting them, thereby disclosing sensitive information, disrupting the plugin\u2019s functionality, and potentially impacting overall site performance. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T13:53:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/16e4cbf4-117f-4639-b341-cec37df7d4dd/export"/>
    <published>2025-03-26T13:53:18+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0071d20c-2184-4394-8e25-7b2292144e6f/export</id>
    <title>0071d20c-2184-4394-8e25-7b2292144e6f</title>
    <updated>2026-05-23T11:19:59.791439+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0071d20c-2184-4394-8e25-7b2292144e6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21107", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0071d20c-2184-4394-8e25-7b2292144e6f/export"/>
    <published>2025-08-26T18:36:20+00:00</published>
  </entry>
</feed>
