<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-12T20:16:10.241940+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c9e44783-a350-411b-8e97-dfe6e4615392/export</id>
    <title>c9e44783-a350-411b-8e97-dfe6e4615392</title>
    <updated>2026-05-12T20:16:10.386707+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c9e44783-a350-411b-8e97-dfe6e4615392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2770", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-186/", "content": "", "creation_timestamp": "2025-03-25T04:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c9e44783-a350-411b-8e97-dfe6e4615392/export"/>
    <published>2025-03-25T04:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/54bfc12d-d32b-4def-833d-65b110fd121f/export</id>
    <title>54bfc12d-d32b-4def-833d-65b110fd121f</title>
    <updated>2026-05-12T20:16:10.386606+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "54bfc12d-d32b-4def-833d-65b110fd121f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2770", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114388579201738740", "content": "", "creation_timestamp": "2025-04-23T18:00:01.899357Z"}</content>
    <link href="https://db.gcve.eu/sighting/54bfc12d-d32b-4def-833d-65b110fd121f/export"/>
    <published>2025-04-23T18:00:01.899357+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/565ccd38-9a1f-45ea-bae8-16f871425989/export</id>
    <title>565ccd38-9a1f-45ea-bae8-16f871425989</title>
    <updated>2026-05-12T20:16:10.386488+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "565ccd38-9a1f-45ea-bae8-16f871425989", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2770", "type": "seen", "source": "https://t.me/cvedetector/23604", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2770 - BEC Technologies Router Cleartext Password Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-2770 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : BEC Technologies Multiple Routers Cleartext Password Storage Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of BEC Technologies routers. Authentication is required to exploit this vulnerability.  \n  \nThe specific flaw exists within the web-based user interface. The issue results from storing credentials in a recoverable format. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-25986. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/565ccd38-9a1f-45ea-bae8-16f871425989/export"/>
    <published>2025-04-23T21:10:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ff4942cb-9c14-4a13-8466-56b7099d3753/export</id>
    <title>ff4942cb-9c14-4a13-8466-56b7099d3753</title>
    <updated>2026-05-12T20:16:10.386383+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ff4942cb-9c14-4a13-8466-56b7099d3753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2770", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnj4fbuzoy2v", "content": "", "creation_timestamp": "2025-04-23T21:14:36.992832Z"}</content>
    <link href="https://db.gcve.eu/sighting/ff4942cb-9c14-4a13-8466-56b7099d3753/export"/>
    <published>2025-04-23T21:14:36.992832+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/184dac2c-bd44-460b-ab7f-1b31cb2dfabc/export</id>
    <title>184dac2c-bd44-460b-ab7f-1b31cb2dfabc</title>
    <updated>2026-05-12T20:16:10.386273+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "184dac2c-bd44-460b-ab7f-1b31cb2dfabc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27701", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17654", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27701\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the function process_crypto_cmd, the values of ptrs[i] can be potentially equal to NULL which is valid value after calling slice_map_array(). Later this values will be derefenced without prior NULL check, which can lead to local Temporary DoS or OOB Read, leading to information disclosure.\n\ud83d\udccf Published: 2025-05-27T15:42:11.318Z\n\ud83d\udccf Modified: 2025-05-27T15:42:11.318Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2025-05-01", "creation_timestamp": "2025-05-27T15:49:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/184dac2c-bd44-460b-ab7f-1b31cb2dfabc/export"/>
    <published>2025-05-27T15:49:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c8c988b9-05ed-4cc3-a6bc-eb3cc3e9174a/export</id>
    <title>c8c988b9-05ed-4cc3-a6bc-eb3cc3e9174a</title>
    <updated>2026-05-12T20:16:10.386157+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c8c988b9-05ed-4cc3-a6bc-eb3cc3e9174a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27700", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17656", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27700\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a possible bypass of carrier restrictions due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-05-27T15:41:52.015Z\n\ud83d\udccf Modified: 2025-05-27T15:41:52.015Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2025-05-01", "creation_timestamp": "2025-05-27T15:49:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c8c988b9-05ed-4cc3-a6bc-eb3cc3e9174a/export"/>
    <published>2025-05-27T15:49:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9bb4f285-f456-436b-bfcf-e5011bb1131f/export</id>
    <title>9bb4f285-f456-436b-bfcf-e5011bb1131f</title>
    <updated>2026-05-12T20:16:10.386039+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9bb4f285-f456-436b-bfcf-e5011bb1131f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27701", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq65vkwwxm22", "content": "", "creation_timestamp": "2025-05-27T17:00:36.433825Z"}</content>
    <link href="https://db.gcve.eu/sighting/9bb4f285-f456-436b-bfcf-e5011bb1131f/export"/>
    <published>2025-05-27T17:00:36.433825+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f094e5d4-00b4-4e41-a28e-85009d0844dc/export</id>
    <title>f094e5d4-00b4-4e41-a28e-85009d0844dc</title>
    <updated>2026-05-12T20:16:10.385913+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f094e5d4-00b4-4e41-a28e-85009d0844dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27700", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq65w2v5id22", "content": "", "creation_timestamp": "2025-05-27T17:01:18.280277Z"}</content>
    <link href="https://db.gcve.eu/sighting/f094e5d4-00b4-4e41-a28e-85009d0844dc/export"/>
    <published>2025-05-27T17:01:18.280277+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/50603972-abab-41c5-83fe-8a3a3de41d6d/export</id>
    <title>50603972-abab-41c5-83fe-8a3a3de41d6d</title>
    <updated>2026-05-12T20:16:10.385755+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "50603972-abab-41c5-83fe-8a3a3de41d6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27709", "type": "seen", "source": "Telegram/bTJ9s_6Dm5c98HBw_nHhlVxkUI4b7kIVaieHQvre00jyC9A", "content": "", "creation_timestamp": "2025-06-09T12:01:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/50603972-abab-41c5-83fe-8a3a3de41d6d/export"/>
    <published>2025-06-09T12:01:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cb5670ed-be18-4606-9538-17d6ed547b72/export</id>
    <title>cb5670ed-be18-4606-9538-17d6ed547b72</title>
    <updated>2026-05-12T20:16:10.383991+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cb5670ed-be18-4606-9538-17d6ed547b72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27709", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114653436896870669", "content": "", "creation_timestamp": "2025-06-09T12:36:49.666647Z"}</content>
    <link href="https://db.gcve.eu/sighting/cb5670ed-be18-4606-9538-17d6ed547b72/export"/>
    <published>2025-06-09T12:36:49.666647+00:00</published>
  </entry>
</feed>
