<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T20:58:52.344896+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/b7d9bcdc-3a00-4bf0-a3dd-83ccfe07dfdf/export</id>
    <title>b7d9bcdc-3a00-4bf0-a3dd-83ccfe07dfdf</title>
    <updated>2026-05-07T20:58:52.524330+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b7d9bcdc-3a00-4bf0-a3dd-83ccfe07dfdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24045", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-a8b1f1f7-7544db6064fedc76", "content": "", "creation_timestamp": "2025-03-12T09:39:02.729184Z"}</content>
    <link href="https://db.gcve.eu/sighting/b7d9bcdc-3a00-4bf0-a3dd-83ccfe07dfdf/export"/>
    <published>2025-03-12T09:39:02.729184+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5b2de18a-5560-47a7-8f2b-12db6be73ef9/export</id>
    <title>5b2de18a-5560-47a7-8f2b-12db6be73ef9</title>
    <updated>2026-05-07T20:58:52.524277+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5b2de18a-5560-47a7-8f2b-12db6be73ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24044", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-a8b1f1f7-7544db6064fedc76", "content": "", "creation_timestamp": "2025-03-12T09:39:02.854220Z"}</content>
    <link href="https://db.gcve.eu/sighting/5b2de18a-5560-47a7-8f2b-12db6be73ef9/export"/>
    <published>2025-03-12T09:39:02.854220+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0325f1f5-5777-4c00-b01a-ae98fead074c/export</id>
    <title>0325f1f5-5777-4c00-b01a-ae98fead074c</title>
    <updated>2026-05-07T20:58:52.524211+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0325f1f5-5777-4c00-b01a-ae98fead074c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24049", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7459", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24049\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper neutralization of special elements used in a command ('command injection') in Azure Command Line Integration (CLI) allows an unauthorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-03-11T16:59:21.485Z\n\ud83d\udccf Modified: 2025-03-13T17:25:16.892Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24049", "creation_timestamp": "2025-03-13T17:45:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0325f1f5-5777-4c00-b01a-ae98fead074c/export"/>
    <published>2025-03-13T17:45:18+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4121fe83-7e92-4e1e-a1dc-f3d523f9dec1/export</id>
    <title>4121fe83-7e92-4e1e-a1dc-f3d523f9dec1</title>
    <updated>2026-05-07T20:58:52.524159+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4121fe83-7e92-4e1e-a1dc-f3d523f9dec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24045", "type": "seen", "source": "https://infosec.exchange/users/cert_eu/statuses/114161624097802216", "content": "", "creation_timestamp": "2025-03-14T16:02:22.263509Z"}</content>
    <link href="https://db.gcve.eu/sighting/4121fe83-7e92-4e1e-a1dc-f3d523f9dec1/export"/>
    <published>2025-03-14T16:02:22.263509+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c714f411-49a7-45d0-95b7-520784e1f371/export</id>
    <title>c714f411-49a7-45d0-95b7-520784e1f371</title>
    <updated>2026-05-07T20:58:52.524086+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c714f411-49a7-45d0-95b7-520784e1f371", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24049", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9575", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24049\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper neutralization of special elements used in a command ('command injection') in Azure Command Line Integration (CLI) allows an unauthorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-03-11T16:59:21.485Z\n\ud83d\udccf Modified: 2025-03-31T01:40:47.645Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24049", "creation_timestamp": "2025-03-31T02:30:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c714f411-49a7-45d0-95b7-520784e1f371/export"/>
    <published>2025-03-31T02:30:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/59372a19-abfe-4bf9-8466-25bacf5731d6/export</id>
    <title>59372a19-abfe-4bf9-8466-25bacf5731d6</title>
    <updated>2026-05-07T20:58:52.524014+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "59372a19-abfe-4bf9-8466-25bacf5731d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24045", "type": "seen", "source": "https://t.me/ViralCyber/13313", "content": "\ud83d\udd34 \u062a\u0647\u062f\u06cc\u062f \u062c\u062f\u06cc\u062f \u0628\u0631\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0648\u06cc\u0646\u062f\u0648\u0632\n\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u062f\u0631 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0627\u0631\u0633 \u06f2\u06f0\u06f2\u06f5 \u0627\u0632 \u06a9\u0634\u0641 \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc \u062f\u0631 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc \u0631\u06cc\u0645\u0648\u062a \u062f\u0633\u06a9\u062a\u0627\u067e \u0648\u06cc\u0646\u062f\u0648\u0632 (Windows Remote Desktop Services) \u062e\u0628\u0631 \u062f\u0627\u062f. \u0627\u06cc\u0646 \u0646\u0642\u0635\u200c\u0647\u0627\u060c \u0628\u0627 \u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627\u06cc CVE-2025-24035 \u0648 CVE-2025-24045\u060c \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u0646\u062f \u06a9\u062f \u0645\u062e\u0631\u0628 \u0631\u0627 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f \u0648 \u0628\u0647\u200c\u0637\u0648\u0631 \u0628\u0627\u0644\u0642\u0648\u0647 \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0627\u0645\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u0628\u0647 \u062f\u0633\u062a \u06af\u06cc\u0631\u0646\u062f. \u0627\u06cc\u0646 \u062a\u0647\u062f\u06cc\u062f \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\u06cc\u06cc \u06a9\u0647 \u0627\u0632 \u0631\u06cc\u0645\u0648\u062a \u062f\u0633\u06a9\u062a\u0627\u067e \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f\u060c \u0628\u0633\u06cc\u0627\u0631 \u062c\u062f\u06cc \u0627\u0633\u062a.\n\n\u062c\u0632\u0626\u06cc\u0627\u062a \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0686\u06cc\u0633\u062a\u061f\n\u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627: CVE-2025-24035 \u0648 CVE-2025-24045\n\n\u0646\u0648\u0639 \u062a\u0647\u062f\u06cc\u062f: \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (Remote Code Execution - RCE)\n\n\u0634\u062f\u062a \u062e\u0637\u0631: \u0628\u062d\u0631\u0627\u0646\u06cc (\u0627\u0645\u062a\u06cc\u0627\u0632 CVSS: 8.1 \u0628\u0631\u0627\u06cc \u0647\u0631 \u062f\u0648)\n\n\u062a\u0623\u062b\u06cc\u0631: \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0646\u0642\u0635\u200c\u0647\u0627\u060c \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0631\u0648\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f\u060c \u06a9\u0647 \u0645\u0646\u062c\u0631 \u0628\u0647 \u0646\u0642\u0636 \u0645\u062d\u0631\u0645\u0627\u0646\u06af\u06cc\u060c \u06cc\u06a9\u067e\u0627\u0631\u0686\u06af\u06cc \u0648 \u062f\u0633\u062a\u0631\u0633\u06cc\u200c\u067e\u0630\u06cc\u0631\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0645\u06cc\u200c\u0634\u0648\u062f.\n\n\u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631: \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0633\u0631\u0648\u0631 \u0648 \u0648\u06cc\u0646\u062f\u0648\u0632 \u062f\u0633\u06a9\u062a\u0627\u067e \u06a9\u0647 \u0627\u0632 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc \u0631\u06cc\u0645\u0648\u062a \u062f\u0633\u06a9\u062a\u0627\u067e \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f.\n\n\u0645\u0637\u0627\u0644\u0639\u0647 \u06a9\u0627\u0645\u0644 \u062e\u0628\u0631 \ud83d\udc49\n\n\ud83c\udd94 @TakianCo\n\ud83c\uddee\ud83c\uddf7", "creation_timestamp": "2025-05-14T08:31:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/59372a19-abfe-4bf9-8466-25bacf5731d6/export"/>
    <published>2025-05-14T08:31:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/57604853-75ee-43a4-b709-d69c9680ccfe/export</id>
    <title>57604853-75ee-43a4-b709-d69c9680ccfe</title>
    <updated>2026-05-07T20:58:52.523959+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "57604853-75ee-43a4-b709-d69c9680ccfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24049", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/57604853-75ee-43a4-b709-d69c9680ccfe/export"/>
    <published>2025-08-13T13:26:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/415f9196-e6db-45fa-874a-9940cadf2f83/export</id>
    <title>415f9196-e6db-45fa-874a-9940cadf2f83</title>
    <updated>2026-05-07T20:58:52.523906+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "415f9196-e6db-45fa-874a-9940cadf2f83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24043", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/415f9196-e6db-45fa-874a-9940cadf2f83/export"/>
    <published>2025-08-16T01:45:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7099467d-5b85-4a9c-9b89-d65db735257e/export</id>
    <title>7099467d-5b85-4a9c-9b89-d65db735257e</title>
    <updated>2026-05-07T20:58:52.523831+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7099467d-5b85-4a9c-9b89-d65db735257e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24043", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7099467d-5b85-4a9c-9b89-d65db735257e/export"/>
    <published>2025-08-19T04:06:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/206927e1-ff27-4fb1-b2b4-ee8f09c9b945/export</id>
    <title>206927e1-ff27-4fb1-b2b4-ee8f09c9b945</title>
    <updated>2026-05-07T20:58:52.521569+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "206927e1-ff27-4fb1-b2b4-ee8f09c9b945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2404", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lz2qazxym225", "content": "", "creation_timestamp": "2025-09-17T21:02:45.480239Z"}</content>
    <link href="https://db.gcve.eu/sighting/206927e1-ff27-4fb1-b2b4-ee8f09c9b945/export"/>
    <published>2025-09-17T21:02:45.480239+00:00</published>
  </entry>
</feed>
