<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T06:21:01.349797+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/5c33fbc2-5959-490c-9e81-d8a263ae7f7a/export</id>
    <title>5c33fbc2-5959-490c-9e81-d8a263ae7f7a</title>
    <updated>2026-05-09T06:21:01.452854+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5c33fbc2-5959-490c-9e81-d8a263ae7f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-24)", "content": "", "creation_timestamp": "2025-06-24T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5c33fbc2-5959-490c-9e81-d8a263ae7f7a/export"/>
    <published>2025-06-24T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/de60ec5a-4d70-4961-9db9-b700d53b2b43/export</id>
    <title>de60ec5a-4d70-4961-9db9-b700d53b2b43</title>
    <updated>2026-05-09T06:21:01.452805+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "de60ec5a-4d70-4961-9db9-b700d53b2b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/de60ec5a-4d70-4961-9db9-b700d53b2b43/export"/>
    <published>2025-08-19T13:26:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/93390f38-4e75-42fc-bc8b-2ade1cc40ffa/export</id>
    <title>93390f38-4e75-42fc-bc8b-2ade1cc40ffa</title>
    <updated>2026-05-09T06:21:01.452752+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "93390f38-4e75-42fc-bc8b-2ade1cc40ffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/57662", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aSQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.\nURL\uff1ahttps://github.com/XploitGh0st/CVE-2025-26794-exploit\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-31T04:44:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/93390f38-4e75-42fc-bc8b-2ade1cc40ffa/export"/>
    <published>2025-10-31T04:44:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1a1de737-f0ab-4ae3-9554-a667a6e77258/export</id>
    <title>1a1de737-f0ab-4ae3-9554-a667a6e77258</title>
    <updated>2026-05-09T06:21:01.452703+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1a1de737-f0ab-4ae3-9554-a667a6e77258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "Telegram/0bRfJSeBlp6vzURpP_3ixCuFmuQ1BEJ7M8KtQr6_hqRGyNY", "content": "", "creation_timestamp": "2025-10-31T09:00:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1a1de737-f0ab-4ae3-9554-a667a6e77258/export"/>
    <published>2025-10-31T09:00:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/09a3a6f1-786b-416a-a4f3-557685ccfdb0/export</id>
    <title>09a3a6f1-786b-416a-a4f3-557685ccfdb0</title>
    <updated>2026-05-09T06:21:01.452653+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "09a3a6f1-786b-416a-a4f3-557685ccfdb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/09a3a6f1-786b-416a-a4f3-557685ccfdb0/export"/>
    <published>2025-11-11T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3d8cc569-035b-4043-a2f7-c90f062e7f3e/export</id>
    <title>3d8cc569-035b-4043-a2f7-c90f062e7f3e</title>
    <updated>2026-05-09T06:21:01.452601+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3d8cc569-035b-4043-a2f7-c90f062e7f3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1729", "content": "", "creation_timestamp": "2026-01-21T04:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3d8cc569-035b-4043-a2f7-c90f062e7f3e/export"/>
    <published>2026-01-21T04:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/35594852-a1fb-4227-8cb4-acc9d5bed348/export</id>
    <title>35594852-a1fb-4227-8cb4-acc9d5bed348</title>
    <updated>2026-05-09T06:21:01.452549+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "35594852-a1fb-4227-8cb4-acc9d5bed348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}</content>
    <link href="https://db.gcve.eu/sighting/35594852-a1fb-4227-8cb4-acc9d5bed348/export"/>
    <published>2026-01-21T21:18:16.771453+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f86d38c5-283f-4e02-a0b1-859e490522e0/export</id>
    <title>f86d38c5-283f-4e02-a0b1-859e490522e0</title>
    <updated>2026-05-09T06:21:01.452496+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f86d38c5-283f-4e02-a0b1-859e490522e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26790", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mdl6omhgqv2j", "content": "", "creation_timestamp": "2026-01-29T16:15:11.219976Z"}</content>
    <link href="https://db.gcve.eu/sighting/f86d38c5-283f-4e02-a0b1-859e490522e0/export"/>
    <published>2026-01-29T16:15:11.219976+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/32eed323-a710-4baf-9006-33d35971f302/export</id>
    <title>32eed323-a710-4baf-9006-33d35971f302</title>
    <updated>2026-05-09T06:21:01.452417+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "32eed323-a710-4baf-9006-33d35971f302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1833", "content": "", "creation_timestamp": "2026-04-21T21:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/32eed323-a710-4baf-9006-33d35971f302/export"/>
    <published>2026-04-21T21:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6d66eeb1-3325-4ff1-87c8-5178a9d13d70/export</id>
    <title>6d66eeb1-3325-4ff1-87c8-5178a9d13d70</title>
    <updated>2026-05-09T06:21:01.451247+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6d66eeb1-3325-4ff1-87c8-5178a9d13d70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-28)", "content": "", "creation_timestamp": "2026-04-28T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6d66eeb1-3325-4ff1-87c8-5178a9d13d70/export"/>
    <published>2026-04-28T00:00:00+00:00</published>
  </entry>
</feed>
