<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-21T19:11:45.591517+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/407ad0d9-7923-418d-96d0-14db4597d63c/export</id>
    <title>407ad0d9-7923-418d-96d0-14db4597d63c</title>
    <updated>2026-05-21T19:11:45.718145+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "407ad0d9-7923-418d-96d0-14db4597d63c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16232", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30384\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:44.963Z\n\ud83d\udccf Modified: 2025-05-13T20:13:57.820Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384", "creation_timestamp": "2025-05-13T20:31:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/407ad0d9-7923-418d-96d0-14db4597d63c/export"/>
    <published>2025-05-13T20:31:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b8acf0c8-b11f-48a0-9f2e-9809d6a822da/export</id>
    <title>b8acf0c8-b11f-48a0-9f2e-9809d6a822da</title>
    <updated>2026-05-21T19:11:45.717942+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b8acf0c8-b11f-48a0-9f2e-9809d6a822da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30386", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16233", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30386\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:45.977Z\n\ud83d\udccf Modified: 2025-05-13T20:13:49.720Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30386", "creation_timestamp": "2025-05-13T20:31:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b8acf0c8-b11f-48a0-9f2e-9809d6a822da/export"/>
    <published>2025-05-13T20:31:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/30ae533b-6ef3-493a-b0b0-46e38b062a4f/export</id>
    <title>30ae533b-6ef3-493a-b0b0-46e38b062a4f</title>
    <updated>2026-05-21T19:11:45.717735+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "30ae533b-6ef3-493a-b0b0-46e38b062a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30387", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16234", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30387\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:46.604Z\n\ud83d\udccf Modified: 2025-05-13T20:13:41.235Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30387", "creation_timestamp": "2025-05-13T20:31:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/30ae533b-6ef3-493a-b0b0-46e38b062a4f/export"/>
    <published>2025-05-13T20:31:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/94bf8402-f425-43a8-81b3-61ca1bd4695f/export</id>
    <title>94bf8402-f425-43a8-81b3-61ca1bd4695f</title>
    <updated>2026-05-21T19:11:45.717478+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "94bf8402-f425-43a8-81b3-61ca1bd4695f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16266", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30388\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:59:10.344Z\n\ud83d\udccf Modified: 2025-05-13T21:40:36.120Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388", "creation_timestamp": "2025-05-13T22:30:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/94bf8402-f425-43a8-81b3-61ca1bd4695f/export"/>
    <published>2025-05-13T22:30:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2518cd56-b654-46e9-ad54-a937c87b5fd9/export</id>
    <title>2518cd56-b654-46e9-ad54-a937c87b5fd9</title>
    <updated>2026-05-21T19:11:45.717269+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2518cd56-b654-46e9-ad54-a937c87b5fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30385", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16267", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30385\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-05-13T16:59:09.691Z\n\ud83d\udccf Modified: 2025-05-13T21:40:35.411Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385", "creation_timestamp": "2025-05-13T22:30:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2518cd56-b654-46e9-ad54-a937c87b5fd9/export"/>
    <published>2025-05-13T22:30:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d8d1fbfd-64a2-41ab-8265-270fb6eacdeb/export</id>
    <title>d8d1fbfd-64a2-41ab-8265-270fb6eacdeb</title>
    <updated>2026-05-21T19:11:45.717030+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d8d1fbfd-64a2-41ab-8265-270fb6eacdeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30383", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16287", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30383\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:44.101Z\n\ud83d\udccf Modified: 2025-05-14T04:00:45.710Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30383", "creation_timestamp": "2025-05-14T04:32:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d8d1fbfd-64a2-41ab-8265-270fb6eacdeb/export"/>
    <published>2025-05-14T04:32:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/29d753db-d042-47d4-9332-4025d685e198/export</id>
    <title>29d753db-d042-47d4-9332-4025d685e198</title>
    <updated>2026-05-21T19:11:45.716814+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "29d753db-d042-47d4-9332-4025d685e198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30386", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lp5we6qa522u", "content": "", "creation_timestamp": "2025-05-14T21:17:50.384309Z"}</content>
    <link href="https://db.gcve.eu/sighting/29d753db-d042-47d4-9332-4025d685e198/export"/>
    <published>2025-05-14T21:17:50.384309+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d4b4420a-7b90-471b-b399-bf48b71a6b10/export</id>
    <title>d4b4420a-7b90-471b-b399-bf48b71a6b10</title>
    <updated>2026-05-21T19:11:45.716591+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d4b4420a-7b90-471b-b399-bf48b71a6b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3m4nyavvvtu2u", "content": "", "creation_timestamp": "2025-11-02T17:01:46.493788Z"}</content>
    <link href="https://db.gcve.eu/sighting/d4b4420a-7b90-471b-b399-bf48b71a6b10/export"/>
    <published>2025-11-02T17:01:46.493788+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f0605273-f6ba-401d-a213-fa3729649663/export</id>
    <title>f0605273-f6ba-401d-a213-fa3729649663</title>
    <updated>2026-05-21T19:11:45.716281+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f0605273-f6ba-401d-a213-fa3729649663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://gist.github.com/Darkcrai86/cf9e1ffe389625a29a6abf7f1e885e43", "content": "", "creation_timestamp": "2025-11-03T08:27:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f0605273-f6ba-401d-a213-fa3729649663/export"/>
    <published>2025-11-03T08:27:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cb4d3c67-1c00-455b-82a3-8be2d496eb4b/export</id>
    <title>cb4d3c67-1c00-455b-82a3-8be2d496eb4b</title>
    <updated>2026-05-21T19:11:45.713606+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cb4d3c67-1c00-455b-82a3-8be2d496eb4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3m4t42gswl62t", "content": "", "creation_timestamp": "2025-11-04T17:53:03.177227Z"}</content>
    <link href="https://db.gcve.eu/sighting/cb4d3c67-1c00-455b-82a3-8be2d496eb4b/export"/>
    <published>2025-11-04T17:53:03.177227+00:00</published>
  </entry>
</feed>
