<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T06:39:17.590558+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/088acdc1-c275-4925-8440-f3c5c61088dc/export</id>
    <title>088acdc1-c275-4925-8440-f3c5c61088dc</title>
    <updated>2026-05-11T06:39:17.856426+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "088acdc1-c275-4925-8440-f3c5c61088dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21301", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1836", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21301\n\ud83d\udd39 Description: Windows Geolocation Service Information Disclosure Vulnerability\n\ud83d\udccf Published: 2025-01-14T18:03:52.113Z\n\ud83d\udccf Modified: 2025-01-15T19:36:47.560Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21301", "creation_timestamp": "2025-01-15T19:55:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/088acdc1-c275-4925-8440-f3c5c61088dc/export"/>
    <published>2025-01-15T19:55:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2eccdc94-de92-47f6-868f-79f105214127/export</id>
    <title>2eccdc94-de92-47f6-868f-79f105214127</title>
    <updated>2026-05-11T06:39:17.856346+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2eccdc94-de92-47f6-868f-79f105214127", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21308", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113839269430612890", "content": "", "creation_timestamp": "2025-01-16T17:43:20.676570Z"}</content>
    <link href="https://db.gcve.eu/sighting/2eccdc94-de92-47f6-868f-79f105214127/export"/>
    <published>2025-01-16T17:43:20.676570+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/001498ab-2620-42dd-97d2-a0d02a918228/export</id>
    <title>001498ab-2620-42dd-97d2-a0d02a918228</title>
    <updated>2026-05-11T06:39:17.856217+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "001498ab-2620-42dd-97d2-a0d02a918228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21308", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/5362", "content": "Windows Theme Spoofing\n\n\u0412 Windows \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0442 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0442\u0435\u043c \u0441 \u043e\u0434\u043d\u043e\u0438\u043c\u0435\u043d\u043d\u044b\u043c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435\u043c .themes. \u041e\u043d\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043a\u0430\u0441\u0442\u043e\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443, \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044f \u043d\u043e\u0432\u044b\u0435 \u0440\u0430\u0441\u043a\u0440\u0430\u0441\u043a\u0438, \u0446\u0432\u0435\u0442\u043e\u0432\u044b\u0435 \u043f\u0430\u043b\u0438\u0442\u0440\u044b, \u0448\u0440\u0438\u0444\u0442\u044b \u0438 \u043e\u0431\u043e\u0438. \u0412 2023 \u0433\u043e\u0434\u0443 \u0432\u044b\u0448\u0435\u043b POC \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c themebleed (POC2), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043a\u0430\u043a-\u0442\u043e \u043d\u0435 \u0431\u044b\u043b\u0430 \u043e\u0446\u0435\u043d\u0435\u043d\u0430 \u043f\u043e \u0434\u043e\u0441\u0442\u043e\u0438\u043d\u0441\u0442\u0432\u0443.\n\n\u0424\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438, \u044d\u0442\u043e \u0431\u044b\u043b Built-In Loader. \u0412\u0441\u0435 \u043e\u0441\u043d\u043e\u0432\u044b\u0432\u0430\u043b\u043e\u0441\u044c \u043d\u0430 \u0442\u043e\u043c, \u0447\u0442\u043e Explorer.exe, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u044f \u0432 \u0444\u0430\u0439\u043b\u0435 \u0442\u0435\u043c\u044b \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0441\u0441\u044b\u043b\u043a\u0443 \u043d\u0430 \u0444\u0430\u0439\u043b \u0441\u0442\u0438\u043b\u0435\u0439 (msstyles) , \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u0443\u044e \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0443 DLL \u0441 \u0438\u043c\u0435\u043d\u0435\u043c, \u043e\u043a\u0430\u043d\u0447\u0438\u0432\u0430\u044e\u0449\u0435\u043c\u0441\u044f \u043d\u0430 _vrf.dll. \u0411\u044b\u043b\u0430, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u043f\u043e\u0434\u043f\u0438\u0441\u0438, \u043d\u043e \u044d\u0442\u0443 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043e\u0431\u043e\u0448\u043b\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0430\u0442\u0430\u043a\u0438 TOCTOU (Time of Check - Time of Use). \u041f\u0440\u0438 \u043f\u0435\u0440\u0432\u043e\u043c \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u0438 \u043d\u0430 \u043f\u043e\u0434\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u044b\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 SMB-\u0441\u0435\u0440\u0432\u0435\u0440 \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u043b\u0430 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0430 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 DLL \u0434\u043b\u044f \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043e\u043a \u043f\u043e\u0434\u043f\u0438\u0441\u0438, \u043e\u0434\u043d\u0430\u043a\u043e \u0437\u0430 \u043f\u0435\u0440\u0432\u044b\u043c \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u043c \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b \u0432\u0442\u043e\u0440\u043e\u0439 (\u043f\u043e\u0441\u043b\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438), \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0443\u0436\u0435 \u043e\u0442\u0434\u0430\u0432\u0430\u043b\u0430\u0441\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430. \n\n\u041d\u0430 \u044d\u0442\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f Windows Themes \u043d\u0435 \u0437\u0430\u043a\u043e\u043d\u0447\u0438\u043b\u0438\u0441\u044c \u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430\u0441\u044c \u043d\u043e\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u2014  \u0443\u0442\u0435\u0447\u043a\u0430 NetNTLM-\u0445\u0435\u0448\u0430 \u0431\u0435\u0437 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u044f \u0444\u0430\u0439\u043b\u0430 \u0442\u0435\u043c. \u0414\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0431\u044b\u043b\u043e \u0437\u0430\u0439\u0442\u0438 \u0432 \u043f\u0430\u043f\u043a\u0443 \u0441 \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u0441\u0433\u0435\u043d\u0435\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0444\u0430\u0439\u043b\u043e\u043c \u0438 \u0445\u0435\u0448 \u0431\u044b\u043b \u0432 \u043d\u0430\u0448\u0438\u0445 \u0440\u0443\u043a\u0430\u0445. \u042f\u0437\u0432\u0435 \u0431\u044b\u043b \u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-21320, \u0430 POC \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0439\u0442\u0438 \u0442\u0443\u0442. \n\n\u042d\u0442\u0438 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0433\u0443\u0442 \u043e\u0442\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0432 \u0447\u0435\u0439\u043d\u0435 \u0441 Smuggling-\u0442\u0435\u0445\u043d\u0438\u043a\u0430\u043c\u0438.\n\n\u041f\u0430\u0442\u0447 \u043d\u0430 CVE-2024-21320 \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u043b\u0441\u044f \u0432\u043e \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043d\u0430 UNC \u043f\u0443\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 PathIsUnc() \u2014 \u0435\u0441\u043b\u0438 \u043f\u0443\u0442\u044c \u0431\u044b\u043b \u043d\u0430 \u0441\u0435\u0442\u0435\u0432\u0443\u044e \u0448\u0430\u0440\u0443, \u0442\u043e Explorer.exe \u043d\u0435 \u043f\u044b\u0442\u0430\u043b\u0441\u044f \u043f\u043e\u0434\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u0434\u043b\u044f \u0444\u0430\u0439\u043b\u0430 \u0442\u0435\u043c\u044b. \u041e\u0434\u043d\u0430\u043a\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043d\u0430\u0448\u043b\u0438 \u0441\u043f\u043e\u0441\u043e\u0431 \u043e\u0431\u0445\u043e\u0434\u0430 (\u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0441\u0442\u0430\u0442\u044c\u0435 Google Project Zero), \u0443\u043a\u0430\u0437\u0430\u0432 UNC Path \u0432 \u0438\u043d\u043e\u043c \u0444\u043e\u0440\u043c\u0430\u0442\u0435: \\??\\UNC\\ip\\share. \n\n\u0422\u0430\u043a \u0440\u043e\u0434\u0438\u043b\u0430\u0441\u044c CVE-2024-38030, \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0433\u043e \u0435\u0435 \u0440\u0430\u0437\u0431\u043e\u0440\u0430 \u043d\u0435 \u0431\u044b\u043b\u043e, \u043d\u043e \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f POC.\n\nMS \u0447\u0443\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u044e \u0438, \u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c \u0431\u044b, \u043d\u0430 \u044d\u0442\u043e\u043c \u0432\u0441\u0435, \u043e\u0434\u043d\u0430\u043a\u043e, \u043f\u0440\u0438\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043d\u0435 \u0437\u0430\u043a\u043e\u043d\u0447\u0438\u043b\u0438\u0441\u044c, \u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c CVE-2025-21308. \u041d\u0430 \u043d\u0435\u0435 \u043f\u043e\u043a\u0430 \u043d\u0435\u0442 \u043d\u0438 \u0440\u0430\u0437\u0431\u043e\u0440\u0430, \u043d\u0438 POC\u0430, \u043d\u043e \u0447\u0442\u043e-\u0442\u043e \u043c\u043d\u0435 \u043f\u043e\u0434\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u0432\u043d\u043e\u0432\u044c \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u0441\u043f\u043e\u0441\u043e\u0431 \u043e\u0431\u0445\u043e\u0434\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043d\u0430 UNC \u043f\u0443\u0442\u044c :)", "creation_timestamp": "2025-01-18T12:15:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/001498ab-2620-42dd-97d2-a0d02a918228/export"/>
    <published>2025-01-18T12:15:33+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a2714dfb-a4d5-44bb-9f0e-f75caa70339e/export</id>
    <title>a2714dfb-a4d5-44bb-9f0e-f75caa70339e</title>
    <updated>2026-05-11T06:39:17.856131+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a2714dfb-a4d5-44bb-9f0e-f75caa70339e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-21307", "type": "seen", "source": "https://bsky.app/profile/bscyber.bsky.social/post/3lfzeg2uyt42r", "content": "", "creation_timestamp": "2025-01-18T12:59:14.508601Z"}</content>
    <link href="https://db.gcve.eu/sighting/a2714dfb-a4d5-44bb-9f0e-f75caa70339e/export"/>
    <published>2025-01-18T12:59:14.508601+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8c3446be-cab6-4ce6-a0dc-8d7975fd0d5c/export</id>
    <title>8c3446be-cab6-4ce6-a0dc-8d7975fd0d5c</title>
    <updated>2026-05-11T06:39:17.856037+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8c3446be-cab6-4ce6-a0dc-8d7975fd0d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2130", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6975", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2130\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in OpenXE up to 1.12. It has been declared as problematic. This vulnerability affects unknown code of the component Ticket Bearbeiten Page. The manipulation of the argument Notizen leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-09T22:00:10.586Z\n\ud83d\udccf Modified: 2025-03-09T22:00:10.586Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299050\n2. https://vuldb.com/?ctiid.299050\n3. https://vuldb.com/?submit.511529\n4. https://www.singto.io/pocsforexploits/openxe/openxe-xss-ticket.html", "creation_timestamp": "2025-03-09T22:36:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8c3446be-cab6-4ce6-a0dc-8d7975fd0d5c/export"/>
    <published>2025-03-09T22:36:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e0e84af6-267c-4392-b9e2-da384b5a08f7/export</id>
    <title>e0e84af6-267c-4392-b9e2-da384b5a08f7</title>
    <updated>2026-05-11T06:39:17.855939+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e0e84af6-267c-4392-b9e2-da384b5a08f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2130", "type": "seen", "source": "https://t.me/cvedetector/19931", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2130 - OpenXE Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2130 \nPublished : March 9, 2025, 10:15 p.m. | 23\u00a0minutes ago \nDescription : A vulnerability was found in OpenXE up to 1.12. It has been declared as problematic. This vulnerability affects unknown code of the component Ticket Bearbeiten Page. The manipulation of the argument Notizen leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-09T23:48:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e0e84af6-267c-4392-b9e2-da384b5a08f7/export"/>
    <published>2025-03-09T23:48:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f12c4ad0-3625-4755-a865-25a691aad4eb/export</id>
    <title>f12c4ad0-3625-4755-a865-25a691aad4eb</title>
    <updated>2026-05-11T06:39:17.855858+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f12c4ad0-3625-4755-a865-25a691aad4eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2130", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljyf62ce5w2l", "content": "", "creation_timestamp": "2025-03-10T01:20:45.745303Z"}</content>
    <link href="https://db.gcve.eu/sighting/f12c4ad0-3625-4755-a865-25a691aad4eb/export"/>
    <published>2025-03-10T01:20:45.745303+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6300aa1d-1e69-4840-ab56-574bb271e18c/export</id>
    <title>6300aa1d-1e69-4840-ab56-574bb271e18c</title>
    <updated>2026-05-11T06:39:17.855771+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6300aa1d-1e69-4840-ab56-574bb271e18c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2130", "type": "seen", "source": "Telegram/ScOGy_EaJ2S9KthMay_DaTXtPCoTDjhn1weW6tzXqTzkpj59", "content": "", "creation_timestamp": "2025-03-10T14:45:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6300aa1d-1e69-4840-ab56-574bb271e18c/export"/>
    <published>2025-03-10T14:45:05+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f0ccdabb-c5dc-4145-8327-3ac7c48ad81e/export</id>
    <title>f0ccdabb-c5dc-4145-8327-3ac7c48ad81e</title>
    <updated>2026-05-11T06:39:17.855642+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f0ccdabb-c5dc-4145-8327-3ac7c48ad81e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2130", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f0ccdabb-c5dc-4145-8327-3ac7c48ad81e/export"/>
    <published>2025-08-16T01:45:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e9de10d0-fd35-46f0-a52d-387694219189/export</id>
    <title>e9de10d0-fd35-46f0-a52d-387694219189</title>
    <updated>2026-05-11T06:39:17.853216+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e9de10d0-fd35-46f0-a52d-387694219189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2130", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e9de10d0-fd35-46f0-a52d-387694219189/export"/>
    <published>2025-08-19T04:06:33+00:00</published>
  </entry>
</feed>
