<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T04:13:08.862002+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/4eb6b132-ccba-4805-9bf8-686371527e62/export</id>
    <title>4eb6b132-ccba-4805-9bf8-686371527e62</title>
    <updated>2026-05-04T04:13:09.016455+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4eb6b132-ccba-4805-9bf8-686371527e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0119", "content": "", "creation_timestamp": "2025-04-28T07:35:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4eb6b132-ccba-4805-9bf8-686371527e62/export"/>
    <published>2025-04-28T07:35:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/228d3fd6-d7a8-45e9-b9b8-36e63b1f9f60/export</id>
    <title>228d3fd6-d7a8-45e9-b9b8-36e63b1f9f60</title>
    <updated>2026-05-04T04:13:09.016409+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "228d3fd6-d7a8-45e9-b9b8-36e63b1f9f60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0119", "content": "", "creation_timestamp": "2025-04-30T11:12:27.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/228d3fd6-d7a8-45e9-b9b8-36e63b1f9f60/export"/>
    <published>2025-04-30T11:12:27+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f716c433-d0cf-4189-aa88-8f54b29d2d8e/export</id>
    <title>f716c433-d0cf-4189-aa88-8f54b29d2d8e</title>
    <updated>2026-05-04T04:13:09.016352+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f716c433-d0cf-4189-aa88-8f54b29d2d8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14624", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27423\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the \":read\" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164\n\ud83d\udccf Published: 2025-03-03T16:30:19.752Z\n\ud83d\udccf Modified: 2025-05-02T23:03:02.425Z\n\ud83d\udd17 References:\n1. https://github.com/vim/vim/security/advisories/GHSA-wfmf-8626-q3r3\n2. https://github.com/vim/vim/commit/129a8446d23cd9cb4445fcfea259cba5e0487d29\n3. https://github.com/vim/vim/commit/334a13bff78aa0ad206bc436885f63e3a0bab399", "creation_timestamp": "2025-05-02T23:17:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f716c433-d0cf-4189-aa88-8f54b29d2d8e/export"/>
    <published>2025-05-02T23:17:18+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fb01db52-afdc-44b7-a150-9416a67a3118/export</id>
    <title>fb01db52-afdc-44b7-a150-9416a67a3118</title>
    <updated>2026-05-04T04:13:09.016300+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fb01db52-afdc-44b7-a150-9416a67a3118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27429", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lw7rlkrj622o", "content": "", "creation_timestamp": "2025-08-12T16:54:01.747753Z"}</content>
    <link href="https://db.gcve.eu/sighting/fb01db52-afdc-44b7-a150-9416a67a3118/export"/>
    <published>2025-08-12T16:54:01.747753+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e1f76c22-baa3-47f6-ac46-d49d906318d3/export</id>
    <title>e1f76c22-baa3-47f6-ac46-d49d906318d3</title>
    <updated>2026-05-04T04:13:09.016247+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e1f76c22-baa3-47f6-ac46-d49d906318d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e1f76c22-baa3-47f6-ac46-d49d906318d3/export"/>
    <published>2025-08-18T13:31:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ac48bb4f-8fbf-4b04-8be3-37e61922e896/export</id>
    <title>ac48bb4f-8fbf-4b04-8be3-37e61922e896</title>
    <updated>2026-05-04T04:13:09.016194+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ac48bb4f-8fbf-4b04-8be3-37e61922e896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27423", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ac48bb4f-8fbf-4b04-8be3-37e61922e896/export"/>
    <published>2025-08-19T02:47:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3c95bee0-d166-4b2f-9c7e-981a63ee8b3b/export</id>
    <title>3c95bee0-d166-4b2f-9c7e-981a63ee8b3b</title>
    <updated>2026-05-04T04:13:09.016135+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3c95bee0-d166-4b2f-9c7e-981a63ee8b3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27425", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3c95bee0-d166-4b2f-9c7e-981a63ee8b3b/export"/>
    <published>2025-08-19T13:26:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f6654132-0f74-43d7-ab09-a4dc439b928e/export</id>
    <title>f6654132-0f74-43d7-ab09-a4dc439b928e</title>
    <updated>2026-05-04T04:13:09.016080+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f6654132-0f74-43d7-ab09-a4dc439b928e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27421", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f6654132-0f74-43d7-ab09-a4dc439b928e/export"/>
    <published>2025-08-19T13:26:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4916e357-8654-479e-8adc-f2a65883baa6/export</id>
    <title>4916e357-8654-479e-8adc-f2a65883baa6</title>
    <updated>2026-05-04T04:13:09.015999+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4916e357-8654-479e-8adc-f2a65883baa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27420", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4916e357-8654-479e-8adc-f2a65883baa6/export"/>
    <published>2025-08-19T13:26:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6f7815c6-4abb-4cf0-8086-ea1332de34f1/export</id>
    <title>6f7815c6-4abb-4cf0-8086-ea1332de34f1</title>
    <updated>2026-05-04T04:13:09.014799+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6f7815c6-4abb-4cf0-8086-ea1332de34f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27428", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/43ff9e04-da8f-45fe-a06a-e8f9b84a2d14", "content": "", "creation_timestamp": "2025-09-11T13:37:23.512990Z"}</content>
    <link href="https://db.gcve.eu/sighting/6f7815c6-4abb-4cf0-8086-ea1332de34f1/export"/>
    <published>2025-09-11T13:37:23.512990+00:00</published>
  </entry>
</feed>
