<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-21T23:20:19.106412+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e4e6cc64-ad5a-4dab-8755-6f24e60acfe6/export</id>
    <title>e4e6cc64-ad5a-4dab-8755-6f24e60acfe6</title>
    <updated>2026-05-21T23:20:19.296027+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e4e6cc64-ad5a-4dab-8755-6f24e60acfe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27152", "type": "published-proof-of-concept", "source": "Telegram/t2mOu0CqYZ5qLLxESiGoH_sUvRUlHAHlqkD_UKh-Uep6sL0", "content": "", "creation_timestamp": "2025-06-07T03:00:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e4e6cc64-ad5a-4dab-8755-6f24e60acfe6/export"/>
    <published>2025-06-07T03:00:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d98cb7ba-12e7-44b5-9076-faed79230f1d/export</id>
    <title>d98cb7ba-12e7-44b5-9076-faed79230f1d</title>
    <updated>2026-05-21T23:20:19.295950+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d98cb7ba-12e7-44b5-9076-faed79230f1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27151", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3lrnjyzps3k2f", "content": "", "creation_timestamp": "2025-06-15T13:09:41.701742Z"}</content>
    <link href="https://db.gcve.eu/sighting/d98cb7ba-12e7-44b5-9076-faed79230f1d/export"/>
    <published>2025-06-15T13:09:41.701742+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6ccca6c7-2ba5-4a0f-a770-1b0ed9ece31f/export</id>
    <title>6ccca6c7-2ba5-4a0f-a770-1b0ed9ece31f</title>
    <updated>2026-05-21T23:20:19.295875+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6ccca6c7-2ba5-4a0f-a770-1b0ed9ece31f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27151", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3lrnmygxmyn2s", "content": "", "creation_timestamp": "2025-06-15T14:03:04.689591Z"}</content>
    <link href="https://db.gcve.eu/sighting/6ccca6c7-2ba5-4a0f-a770-1b0ed9ece31f/export"/>
    <published>2025-06-15T14:03:04.689591+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/57267cc2-ce5a-4cf1-ab27-0536532f5be2/export</id>
    <title>57267cc2-ce5a-4cf1-ab27-0536532f5be2</title>
    <updated>2026-05-21T23:20:19.295785+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "57267cc2-ce5a-4cf1-ab27-0536532f5be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27153", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/20085", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27153\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Escalade GLPI plugin is a ticket escalation process helper for GLPI. Prior to version 2.9.11, there is an improper access control vulnerability. This can lead to data exposure and workflow disruptions. This issue has been patched in version 2.9.11.\n\ud83d\udccf Published: 2025-07-01T18:27:50.677Z\n\ud83d\udccf Modified: 2025-07-01T19:35:43.790Z\n\ud83d\udd17 References:\n1. https://github.com/pluginsGLPI/escalade/security/advisories/GHSA-pvqv-8r3r-47m9\n2. https://github.com/pluginsGLPI/escalade/releases/tag/2.9.11", "creation_timestamp": "2025-07-01T20:09:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/57267cc2-ce5a-4cf1-ab27-0536532f5be2/export"/>
    <published>2025-07-01T20:09:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a6038b86-4d04-460a-97e3-a803535f50e4/export</id>
    <title>a6038b86-4d04-460a-97e3-a803535f50e4</title>
    <updated>2026-05-21T23:20:19.295703+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a6038b86-4d04-460a-97e3-a803535f50e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27151", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3ltexanaygc2q", "content": "", "creation_timestamp": "2025-07-07T14:03:03.802913Z"}</content>
    <link href="https://db.gcve.eu/sighting/a6038b86-4d04-460a-97e3-a803535f50e4/export"/>
    <published>2025-07-07T14:03:03.802913+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/73adbfbc-824b-4cfc-ad44-d6d7dfe2dae2/export</id>
    <title>73adbfbc-824b-4cfc-ad44-d6d7dfe2dae2</title>
    <updated>2026-05-21T23:20:19.295622+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "73adbfbc-824b-4cfc-ad44-d6d7dfe2dae2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27152", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/73adbfbc-824b-4cfc-ad44-d6d7dfe2dae2/export"/>
    <published>2025-08-13T13:26:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b982c4c5-28e2-4091-9273-9ce74b07de96/export</id>
    <title>b982c4c5-28e2-4091-9273-9ce74b07de96</title>
    <updated>2026-05-21T23:20:19.295536+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b982c4c5-28e2-4091-9273-9ce74b07de96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27150", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b982c4c5-28e2-4091-9273-9ce74b07de96/export"/>
    <published>2025-08-18T18:31:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ab00e96c-a1f3-4604-a918-9ffe0c90aca9/export</id>
    <title>ab00e96c-a1f3-4604-a918-9ffe0c90aca9</title>
    <updated>2026-05-21T23:20:19.295419+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ab00e96c-a1f3-4604-a918-9ffe0c90aca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27157", "type": "seen", "source": "MISP/24306fae-b16b-4478-9297-d2973cdb583c", "content": "", "creation_timestamp": "2025-08-22T14:52:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ab00e96c-a1f3-4604-a918-9ffe0c90aca9/export"/>
    <published>2025-08-22T14:52:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d49fc923-fe31-4596-a5c4-d6aaf0c3f8f6/export</id>
    <title>d49fc923-fe31-4596-a5c4-d6aaf0c3f8f6</title>
    <updated>2026-05-21T23:20:19.293877+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d49fc923-fe31-4596-a5c4-d6aaf0c3f8f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27152", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}</content>
    <link href="https://db.gcve.eu/sighting/d49fc923-fe31-4596-a5c4-d6aaf0c3f8f6/export"/>
    <published>2026-01-21T21:18:16.771453+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8f36523a-7ade-4283-a43d-b1e8788516cb/export</id>
    <title>8f36523a-7ade-4283-a43d-b1e8788516cb</title>
    <updated>2026-05-21T23:20:19.290880+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "8f36523a-7ade-4283-a43d-b1e8788516cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-27152", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mj36pji3jc2f", "content": "", "creation_timestamp": "2026-04-09T16:04:15.265934Z"}</content>
    <link href="https://db.gcve.eu/sighting/8f36523a-7ade-4283-a43d-b1e8788516cb/export"/>
    <published>2026-04-09T16:04:15.265934+00:00</published>
  </entry>
</feed>
