<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T14:18:26.128110+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/5ff4d0cb-254c-455b-82a7-5b4fc9f26874/export</id>
    <title>5ff4d0cb-254c-455b-82a7-5b4fc9f26874</title>
    <updated>2026-05-09T14:18:26.529868+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5ff4d0cb-254c-455b-82a7-5b4fc9f26874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2206", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7234", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2206\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as problematic has been found in aitangbao springboot-manager 3.0. This affects an unknown part of the file /sys/permission. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-11T20:00:08.940Z\n\ud83d\udccf Modified: 2025-03-11T20:17:01.460Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299277\n2. https://vuldb.com/?ctiid.299277\n3. https://vuldb.com/?submit.511736\n4. https://github.com/uglory-gll/javasec/blob/main/spring-manage.md", "creation_timestamp": "2025-03-11T20:41:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5ff4d0cb-254c-455b-82a7-5b4fc9f26874/export"/>
    <published>2025-03-11T20:41:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/99c665b6-8aa3-43c7-9167-8bc90e295498/export</id>
    <title>99c665b6-8aa3-43c7-9167-8bc90e295498</title>
    <updated>2026-05-09T14:18:26.529774+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "99c665b6-8aa3-43c7-9167-8bc90e295498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22064", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14805", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22064\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: don't unregister hook when table is dormant\n\nWhen nf_tables_updchain encounters an error, hook registration needs to\nbe rolled back.\n\nThis should only be done if the hook has been registered, which won't\nhappen when the table is flagged as dormant (inactive).\n\nJust move the assignment into the registration block.\n\ud83d\udccf Published: 2025-04-16T14:12:18.870Z\n\ud83d\udccf Modified: 2025-05-04T13:06:59.514Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/6134d1ea1e1408e8e7c8c26545b3b301cbdf1eda\n2. https://git.kernel.org/stable/c/feb1fa2a03a27fec7001e93e4223be4120d1784b\n3. https://git.kernel.org/stable/c/03d1fb457b696c18fe15661440c4f052b2374e7e\n4. https://git.kernel.org/stable/c/ce571eba07d54e3637bf334bc48376fbfa55defe\n5. https://git.kernel.org/stable/c/688c15017d5cd5aac882400782e7213d40dc3556", "creation_timestamp": "2025-05-04T13:18:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/99c665b6-8aa3-43c7-9167-8bc90e295498/export"/>
    <published>2025-05-04T13:18:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5863c167-d41e-463b-833d-83c83e90ff12/export</id>
    <title>5863c167-d41e-463b-833d-83c83e90ff12</title>
    <updated>2026-05-09T14:18:26.528479+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5863c167-d41e-463b-833d-83c83e90ff12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22060", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://db.gcve.eu/sighting/5863c167-d41e-463b-833d-83c83e90ff12/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
</feed>
