<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-22T15:34:07.104352+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ef88ff5a-be59-426b-8ce4-455387607e8f/export</id>
    <title>ef88ff5a-be59-426b-8ce4-455387607e8f</title>
    <updated>2026-05-22T15:34:07.277637+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ef88ff5a-be59-426b-8ce4-455387607e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-28021", "type": "seen", "source": "https://t.me/cvedetector/23614", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-28021 - TOTOLINK A810R Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-28021 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in the downloadFile.cgi through the v14 and v3 parameters \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ef88ff5a-be59-426b-8ce4-455387607e8f/export"/>
    <published>2025-04-23T21:10:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5ffe664e-e261-42e0-b044-3c85f0bfb5ea/export</id>
    <title>5ffe664e-e261-42e0-b044-3c85f0bfb5ea</title>
    <updated>2026-05-22T15:34:07.277577+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5ffe664e-e261-42e0-b044-3c85f0bfb5ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-28020", "type": "seen", "source": "https://t.me/cvedetector/23615", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-28020 - TOTOLINK A800R Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-28020 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v25 parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5ffe664e-e261-42e0-b044-3c85f0bfb5ea/export"/>
    <published>2025-04-23T21:10:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/801497d7-0cf0-4085-a8ef-55d0fbd785aa/export</id>
    <title>801497d7-0cf0-4085-a8ef-55d0fbd785aa</title>
    <updated>2026-05-22T15:34:07.277503+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "801497d7-0cf0-4085-a8ef-55d0fbd785aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-28020", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13274", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-28020\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v25 parameter.\n\ud83d\udccf Published: 2025-04-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T15:52:36.284Z\n\ud83d\udd17 References:\n1. https://locrian-lightning-dc7.notion.site/BufferOverflow3-1948e5e2b1a280c28ef5c6e54b49324d?pvs=73\n2. https://locrian-lightning-dc7.notion.site/CVE-2025-28020-BufferOverflow3-1948e5e2b1a280c28ef5c6e54b49324d", "creation_timestamp": "2025-04-24T16:07:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/801497d7-0cf0-4085-a8ef-55d0fbd785aa/export"/>
    <published>2025-04-24T16:07:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8d09a05b-a105-434b-b261-4ec06fad35bf/export</id>
    <title>8d09a05b-a105-434b-b261-4ec06fad35bf</title>
    <updated>2026-05-22T15:34:07.277442+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8d09a05b-a105-434b-b261-4ec06fad35bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-28022", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13275", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-28022\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v25 parameter.\n\ud83d\udccf Published: 2025-04-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T15:52:04.404Z\n\ud83d\udd17 References:\n1. https://locrian-lightning-dc7.notion.site/BufferOverflow3-1948e5e2b1a280ec8061ed308b33b5bc?pvs=73\n2. https://locrian-lightning-dc7.notion.site/CVE-2025-28022-BufferOverflow3-1948e5e2b1a280ec8061ed308b33b5bc", "creation_timestamp": "2025-04-24T16:07:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8d09a05b-a105-434b-b261-4ec06fad35bf/export"/>
    <published>2025-04-24T16:07:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f2e765c8-ae92-4e0b-b730-fdf2aa9b6a49/export</id>
    <title>f2e765c8-ae92-4e0b-b730-fdf2aa9b6a49</title>
    <updated>2026-05-22T15:34:07.277374+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f2e765c8-ae92-4e0b-b730-fdf2aa9b6a49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-28025", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13277", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-28025\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in downloadFile.cgi through the v14 parameter.\n\ud83d\udccf Published: 2025-04-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T15:51:11.859Z\n\ud83d\udd17 References:\n1. https://locrian-lightning-dc7.notion.site/BufferOverflow1-19e8e5e2b1a280bfbe52ec9975287f77?pvs=73\n2. https://locrian-lightning-dc7.notion.site/BufferOverflow1-19e8e5e2b1a280bfbe52ec9975287f77", "creation_timestamp": "2025-04-24T16:07:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f2e765c8-ae92-4e0b-b730-fdf2aa9b6a49/export"/>
    <published>2025-04-24T16:07:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/632b5558-b20c-4b48-b89c-8bb4a2327e90/export</id>
    <title>632b5558-b20c-4b48-b89c-8bb4a2327e90</title>
    <updated>2026-05-22T15:34:07.277304+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "632b5558-b20c-4b48-b89c-8bb4a2327e90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-28021", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13278", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-28021\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in the downloadFile.cgi through the v14 and v3 parameters\n\ud83d\udccf Published: 2025-04-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T15:50:55.963Z\n\ud83d\udd17 References:\n1. https://locrian-lightning-dc7.notion.site/BufferOverflow1-1948e5e2b1a280e8aa5ad87964c5cd3d?pvs=73\n2. https://locrian-lightning-dc7.notion.site/CVE-2025-28021-BufferOverflow1-1948e5e2b1a280e8aa5ad87964c5cd3d", "creation_timestamp": "2025-04-24T16:07:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/632b5558-b20c-4b48-b89c-8bb4a2327e90/export"/>
    <published>2025-04-24T16:07:05+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/72030544-61bb-4855-8daf-530cd869cfca/export</id>
    <title>72030544-61bb-4855-8daf-530cd869cfca</title>
    <updated>2026-05-22T15:34:07.277216+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "72030544-61bb-4855-8daf-530cd869cfca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2802", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15059", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2802\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.\n\ud83d\udccf Published: 2025-05-06T04:24:13.420Z\n\ud83d\udccf Modified: 2025-05-06T04:24:13.420Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/fc3fcb8f-f130-4008-8f11-d98efa30f1a8?source=cve\n2. https://plugins.svn.wordpress.org/layoutboxx/trunk/layoutboxx.php\n3. https://wordpress.org/plugins/layoutboxx/#developers", "creation_timestamp": "2025-05-06T05:20:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/72030544-61bb-4855-8daf-530cd869cfca/export"/>
    <published>2025-05-06T05:20:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/31bd60fd-065d-40ea-af5f-dd7352a2f841/export</id>
    <title>31bd60fd-065d-40ea-af5f-dd7352a2f841</title>
    <updated>2026-05-22T15:34:07.277145+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "31bd60fd-065d-40ea-af5f-dd7352a2f841", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2802", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loiajnldr22l", "content": "", "creation_timestamp": "2025-05-06T06:21:10.140843Z"}</content>
    <link href="https://db.gcve.eu/sighting/31bd60fd-065d-40ea-af5f-dd7352a2f841/export"/>
    <published>2025-05-06T06:21:10.140843+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b14e49f6-5014-4dd1-9560-12fe2d770dc3/export</id>
    <title>b14e49f6-5014-4dd1-9560-12fe2d770dc3</title>
    <updated>2026-05-22T15:34:07.277062+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b14e49f6-5014-4dd1-9560-12fe2d770dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2802", "type": "published-proof-of-concept", "source": "Telegram/hsgN3TUNjstII56MQUCxIc5_azQBv0P4FDc7kkmVAdY01Mk", "content": "", "creation_timestamp": "2025-05-06T07:00:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b14e49f6-5014-4dd1-9560-12fe2d770dc3/export"/>
    <published>2025-05-06T07:00:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fdcf8f39-b883-49c5-903f-8da98908d64f/export</id>
    <title>fdcf8f39-b883-49c5-903f-8da98908d64f</title>
    <updated>2026-05-22T15:34:07.274077+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fdcf8f39-b883-49c5-903f-8da98908d64f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2802", "type": "seen", "source": "https://t.me/cvedetector/24543", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2802 - WordPress LayoutBoxx Plugin Shortcode Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2802 \nPublished : May 6, 2025, 5:15 a.m. | 32\u00a0minutes ago \nDescription : The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T08:37:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fdcf8f39-b883-49c5-903f-8da98908d64f/export"/>
    <published>2025-05-06T08:37:10+00:00</published>
  </entry>
</feed>
