<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-21T15:04:54.513432+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/8f062ed2-4e68-410c-a539-0d35d655b60a/export</id>
    <title>8f062ed2-4e68-410c-a539-0d35d655b60a</title>
    <updated>2026-05-21T15:04:54.664677+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8f062ed2-4e68-410c-a539-0d35d655b60a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2699", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll4kmpclin2m", "content": "", "creation_timestamp": "2025-03-24T10:34:19.192193Z"}</content>
    <link href="https://db.gcve.eu/sighting/8f062ed2-4e68-410c-a539-0d35d655b60a/export"/>
    <published>2025-03-24T10:34:19.192193+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/593f8abc-559d-4921-81d9-510ab1bb76f9/export</id>
    <title>593f8abc-559d-4921-81d9-510ab1bb76f9</title>
    <updated>2026-05-21T15:04:54.664599+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "593f8abc-559d-4921-81d9-510ab1bb76f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26992", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmu3tdelpp24", "content": "", "creation_timestamp": "2025-04-15T12:38:42.444401Z"}</content>
    <link href="https://db.gcve.eu/sighting/593f8abc-559d-4921-81d9-510ab1bb76f9/export"/>
    <published>2025-04-15T12:38:42.444401+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d27bc886-49fb-45ba-85b0-7e33184880cc/export</id>
    <title>d27bc886-49fb-45ba-85b0-7e33184880cc</title>
    <updated>2026-05-21T15:04:54.664519+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d27bc886-49fb-45ba-85b0-7e33184880cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26990", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmu3tdhwva2r", "content": "", "creation_timestamp": "2025-04-15T12:38:43.049625Z"}</content>
    <link href="https://db.gcve.eu/sighting/d27bc886-49fb-45ba-85b0-7e33184880cc/export"/>
    <published>2025-04-15T12:38:43.049625+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b63f31a8-8987-40aa-a8bf-c0408b295b97/export</id>
    <title>b63f31a8-8987-40aa-a8bf-c0408b295b97</title>
    <updated>2026-05-21T15:04:54.664428+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b63f31a8-8987-40aa-a8bf-c0408b295b97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26990", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11790", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26990\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Server-Side Request Forgery (SSRF) vulnerability in WP Royal Royal Elementor Addons allows Server Side Request Forgery. This issue affects Royal Elementor Addons: from n/a through 1.7.1006.\n\ud83d\udccf Published: 2025-04-15T11:59:07.117Z\n\ud83d\udccf Modified: 2025-04-15T11:59:07.117Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-plugin-1-7-1006-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-15T12:54:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b63f31a8-8987-40aa-a8bf-c0408b295b97/export"/>
    <published>2025-04-15T12:54:33+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e4787519-0b04-453d-8a69-29a9cb49c3dc/export</id>
    <title>e4787519-0b04-453d-8a69-29a9cb49c3dc</title>
    <updated>2026-05-21T15:04:54.664328+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e4787519-0b04-453d-8a69-29a9cb49c3dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26990", "type": "seen", "source": "https://t.me/cvedetector/22940", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26990 - Royal Elementor Addons SSRF\", \n  \"Content\": \"CVE ID : CVE-2025-26990 \nPublished : April 15, 2025, 12:15 p.m. | 52\u00a0minutes ago \nDescription : Server-Side Request Forgery (SSRF) vulnerability in WP Royal Royal Elementor Addons allows Server Side Request Forgery. This issue affects Royal Elementor Addons: from n/a through 1.7.1006. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T15:46:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e4787519-0b04-453d-8a69-29a9cb49c3dc/export"/>
    <published>2025-04-15T15:46:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/057b480e-3c10-4b9c-a3fe-b949f4ce12c3/export</id>
    <title>057b480e-3c10-4b9c-a3fe-b949f4ce12c3</title>
    <updated>2026-05-21T15:04:54.664170+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "057b480e-3c10-4b9c-a3fe-b949f4ce12c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26992", "type": "seen", "source": "https://t.me/cvedetector/22941", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26992 - Fatcatapps Landing Page Cat Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26992 \nPublished : April 15, 2025, 12:15 p.m. | 52\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fatcatapps Landing Page Cat allows Reflected XSS. This issue affects Landing Page Cat: from n/a through 1.7.8. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T15:46:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/057b480e-3c10-4b9c-a3fe-b949f4ce12c3/export"/>
    <published>2025-04-15T15:46:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0ebf68b9-e719-4937-aaeb-4cb4003a579b/export</id>
    <title>0ebf68b9-e719-4937-aaeb-4cb4003a579b</title>
    <updated>2026-05-21T15:04:54.663953+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0ebf68b9-e719-4937-aaeb-4cb4003a579b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26999", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0ebf68b9-e719-4937-aaeb-4cb4003a579b/export"/>
    <published>2025-08-18T13:31:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5f6c77dd-a7f5-4dd0-b811-f56b4849444e/export</id>
    <title>5f6c77dd-a7f5-4dd0-b811-f56b4849444e</title>
    <updated>2026-05-21T15:04:54.663727+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5f6c77dd-a7f5-4dd0-b811-f56b4849444e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26999", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:47.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5f6c77dd-a7f5-4dd0-b811-f56b4849444e/export"/>
    <published>2025-08-19T02:47:47+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d260a7bf-428b-4d96-9dc5-081837f2048a/export</id>
    <title>d260a7bf-428b-4d96-9dc5-081837f2048a</title>
    <updated>2026-05-21T15:04:54.663439+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d260a7bf-428b-4d96-9dc5-081837f2048a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26994", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d260a7bf-428b-4d96-9dc5-081837f2048a/export"/>
    <published>2025-08-19T13:26:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/00e6fbdb-d093-4c36-9d85-8408dd272c8c/export</id>
    <title>00e6fbdb-d093-4c36-9d85-8408dd272c8c</title>
    <updated>2026-05-21T15:04:54.660982+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "00e6fbdb-d093-4c36-9d85-8408dd272c8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26995", "type": "seen", "source": "MISP/8e1b6542-ae86-4729-a7a6-4e9f670b8bb7", "content": "", "creation_timestamp": "2025-08-22T17:25:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/00e6fbdb-d093-4c36-9d85-8408dd272c8c/export"/>
    <published>2025-08-22T17:25:06+00:00</published>
  </entry>
</feed>
