<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-22T06:15:43.925045+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c15dd793-125b-4489-ac51-e257927db259/export</id>
    <title>c15dd793-125b-4489-ac51-e257927db259</title>
    <updated>2026-05-22T06:15:44.127581+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c15dd793-125b-4489-ac51-e257927db259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2769", "type": "published-proof-of-concept", "source": "Telegram/tGlnxgJ45kvnhr-0GuZEauiX58JIxK_MY4hRnR_Ek7fiyk0", "content": "", "creation_timestamp": "2025-04-23T20:32:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c15dd793-125b-4489-ac51-e257927db259/export"/>
    <published>2025-04-23T20:32:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c1f4ccee-817e-4e7d-a2c9-7d587ad4065f/export</id>
    <title>c1f4ccee-817e-4e7d-a2c9-7d587ad4065f</title>
    <updated>2026-05-22T06:15:44.127515+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c1f4ccee-817e-4e7d-a2c9-7d587ad4065f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2769", "type": "seen", "source": "https://t.me/cvedetector/23612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2769 - Bdrive NetDrive OpenSSL Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2769 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.  \n  \nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25295. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c1f4ccee-817e-4e7d-a2c9-7d587ad4065f/export"/>
    <published>2025-04-23T21:10:35+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a94d0698-d2ae-479e-8663-5ac99116381f/export</id>
    <title>a94d0698-d2ae-479e-8663-5ac99116381f</title>
    <updated>2026-05-22T06:15:44.127462+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a94d0698-d2ae-479e-8663-5ac99116381f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2769", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnj4fb6ha52a", "content": "", "creation_timestamp": "2025-04-23T21:14:34.342428Z"}</content>
    <link href="https://db.gcve.eu/sighting/a94d0698-d2ae-479e-8663-5ac99116381f/export"/>
    <published>2025-04-23T21:14:34.342428+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/431b6968-b960-4f6d-82dd-95e4c62f018a/export</id>
    <title>431b6968-b960-4f6d-82dd-95e4c62f018a</title>
    <updated>2026-05-22T06:15:44.127402+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "431b6968-b960-4f6d-82dd-95e4c62f018a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27695", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15592", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27695\n\ud83d\udd25 CVSS Score: 4.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Dell Wyse Management Suite, versions prior to WMS 5.1 contain an Authentication Bypass by Spoofing vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information Disclosure.\n\ud83d\udccf Published: 2025-05-08T19:06:42.090Z\n\ud83d\udccf Modified: 2025-05-08T19:06:42.090Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000296515/dsa-2025-135", "creation_timestamp": "2025-05-08T19:24:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/431b6968-b960-4f6d-82dd-95e4c62f018a/export"/>
    <published>2025-05-08T19:24:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/464626fb-ca53-4a50-8d1f-562d9308243c/export</id>
    <title>464626fb-ca53-4a50-8d1f-562d9308243c</title>
    <updated>2026-05-22T06:15:44.127347+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "464626fb-ca53-4a50-8d1f-562d9308243c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27695", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3looojr5xpch2", "content": "", "creation_timestamp": "2025-05-08T19:48:25.486171Z"}</content>
    <link href="https://db.gcve.eu/sighting/464626fb-ca53-4a50-8d1f-562d9308243c/export"/>
    <published>2025-05-08T19:48:25.486171+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/203385af-4922-436b-ab36-793922c689bd/export</id>
    <title>203385af-4922-436b-ab36-793922c689bd</title>
    <updated>2026-05-22T06:15:44.127288+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "203385af-4922-436b-ab36-793922c689bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27695", "type": "seen", "source": "https://t.me/cvedetector/24844", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27695 - Dell Wyse Management Suite Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-27695 \nPublished : May 8, 2025, 7:16 p.m. | 17\u00a0minutes ago \nDescription : Dell Wyse Management Suite, versions prior to WMS 5.1 contain an Authentication Bypass by Spoofing vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information Disclosure. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T21:48:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/203385af-4922-436b-ab36-793922c689bd/export"/>
    <published>2025-05-08T21:48:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f03d9615-18a0-41cb-9b2a-f7151e3656a6/export</id>
    <title>f03d9615-18a0-41cb-9b2a-f7151e3656a6</title>
    <updated>2026-05-22T06:15:44.127236+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f03d9615-18a0-41cb-9b2a-f7151e3656a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27695", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq22syp2n", "content": "", "creation_timestamp": "2025-05-08T22:32:17.668560Z"}</content>
    <link href="https://db.gcve.eu/sighting/f03d9615-18a0-41cb-9b2a-f7151e3656a6/export"/>
    <published>2025-05-08T22:32:17.668560+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/68380d94-f706-4842-a19a-141524548db6/export</id>
    <title>68380d94-f706-4842-a19a-141524548db6</title>
    <updated>2026-05-22T06:15:44.127177+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "68380d94-f706-4842-a19a-141524548db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27696", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/119", "content": "", "creation_timestamp": "2025-05-12T14:34:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/68380d94-f706-4842-a19a-141524548db6/export"/>
    <published>2025-05-12T14:34:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2f14c08a-911f-40b2-a4a2-b3db25c7cf1e/export</id>
    <title>2f14c08a-911f-40b2-a4a2-b3db25c7cf1e</title>
    <updated>2026-05-22T06:15:44.127063+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2f14c08a-911f-40b2-a4a2-b3db25c7cf1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27696", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3loyh66t75c2t", "content": "", "creation_timestamp": "2025-05-12T17:02:36.350285Z"}</content>
    <link href="https://db.gcve.eu/sighting/2f14c08a-911f-40b2-a4a2-b3db25c7cf1e/export"/>
    <published>2025-05-12T17:02:36.350285+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/704a68d2-cd2c-4fa0-a18e-ad1509d2add1/export</id>
    <title>704a68d2-cd2c-4fa0-a18e-ad1509d2add1</title>
    <updated>2026-05-22T06:15:44.124601+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "704a68d2-cd2c-4fa0-a18e-ad1509d2add1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16086", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27696\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: Improper Authorization vulnerability in Apache Superset allows ownership takeover of dashboards, charts or datasets by authenticated users with read permissions.\n\nThis issue affects Apache Superset: through 4.1.1.\n\nUsers are recommended to upgrade to version 4.1.2 or above, which fixes the issue.\n\ud83d\udccf Published: 2025-05-13T08:21:21.199Z\n\ud83d\udccf Modified: 2025-05-13T08:21:21.199Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/k2od03bxnxs6vcp80sr03ywcxl194413", "creation_timestamp": "2025-05-13T08:30:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/704a68d2-cd2c-4fa0-a18e-ad1509d2add1/export"/>
    <published>2025-05-13T08:30:18+00:00</published>
  </entry>
</feed>
