<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T15:27:31.689040+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/6ac71a61-34c5-47fd-95d5-a5225b5d4562/export</id>
    <title>6ac71a61-34c5-47fd-95d5-a5225b5d4562</title>
    <updated>2026-05-05T15:27:32.048610+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6ac71a61-34c5-47fd-95d5-a5225b5d4562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27416", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6026", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27416\n\ud83d\udd25 CVSS Score: 5.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U)\n\ud83d\udd39 Description: Scratch-Coding-Hut.github.io is the website for Coding Hut. The website as of 28 February 2025 contained a sign in with scratch username and password form. Any user who used the sign in page would be susceptible to any other user signing into their account. As of time of publication, a fix is not available but work on a fix is underway. As a workaround, users should avoid signing in.\n\ud83d\udccf Published: 2025-03-01T00:10:29.184Z\n\ud83d\udccf Modified: 2025-03-01T00:10:29.184Z\n\ud83d\udd17 References:\n1. https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/security/advisories/GHSA-xx32-r9wr-whff\n2. https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/issues/3", "creation_timestamp": "2025-03-01T00:27:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6ac71a61-34c5-47fd-95d5-a5225b5d4562/export"/>
    <published>2025-03-01T00:27:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0eb604c1-35ac-4f18-997e-7ad4da40a362/export</id>
    <title>0eb604c1-35ac-4f18-997e-7ad4da40a362</title>
    <updated>2026-05-05T15:27:32.047034+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0eb604c1-35ac-4f18-997e-7ad4da40a362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27416", "type": "seen", "source": "https://t.me/cvedetector/19198", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27416 - Coding Hut Scratch Sign-in Account Takeover Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27416 \nPublished : March 1, 2025, 1:15 a.m. | 1\u00a0hour, 26\u00a0minutes ago \nDescription : Scratch-Coding-Hut.github.io is the website for Coding Hut. The website as of 28 February 2025 contained a sign in with scratch username and password form. Any user who used the sign in page would be susceptible to any other user signing into their account. As of time of publication, a fix is not available but work on a fix is underway. As a workaround, users should avoid signing in. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T03:54:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0eb604c1-35ac-4f18-997e-7ad4da40a362/export"/>
    <published>2025-03-01T03:54:07+00:00</published>
  </entry>
</feed>
