<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T17:11:23.772679+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e9b09270-2583-4ed5-b22c-5057c72cd375/export</id>
    <title>e9b09270-2583-4ed5-b22c-5057c72cd375</title>
    <updated>2026-05-06T17:11:24.233170+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e9b09270-2583-4ed5-b22c-5057c72cd375", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27417", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6238", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27417\n\ud83d\udd25 CVSS Score: 6.4 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the adicionar_status_atendido.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the status parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.16.\n\ud83d\udccf Published: 2025-03-03T16:01:25.506Z\n\ud83d\udccf Modified: 2025-03-03T16:01:25.506Z\n\ud83d\udd17 References:\n1. https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-j3p8-xww6-wvqh\n2. https://github.com/LabRedesCefetRJ/WeGIA/commit/0f2644bca2afbdfff21662c51a64679dfba8c2bd", "creation_timestamp": "2025-03-03T16:30:47.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e9b09270-2583-4ed5-b22c-5057c72cd375/export"/>
    <published>2025-03-03T16:30:47+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c7b96544-f088-4562-8f69-8d2f8dc003c6/export</id>
    <title>c7b96544-f088-4562-8f69-8d2f8dc003c6</title>
    <updated>2026-05-06T17:11:24.232994+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c7b96544-f088-4562-8f69-8d2f8dc003c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27417", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljim7ibs752a", "content": "", "creation_timestamp": "2025-03-03T18:44:16.877681Z"}</content>
    <link href="https://db.gcve.eu/sighting/c7b96544-f088-4562-8f69-8d2f8dc003c6/export"/>
    <published>2025-03-03T18:44:16.877681+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2f9d520c-6e9d-4be4-bd5f-fd6c262316f9/export</id>
    <title>2f9d520c-6e9d-4be4-bd5f-fd6c262316f9</title>
    <updated>2026-05-06T17:11:24.231455+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2f9d520c-6e9d-4be4-bd5f-fd6c262316f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27417", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2f9d520c-6e9d-4be4-bd5f-fd6c262316f9/export"/>
    <published>2025-08-19T13:26:46+00:00</published>
  </entry>
</feed>
