<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-20T09:33:41.708026+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/bcec3bd6-0bf0-4b2c-8cbb-32c313153c42/export</id>
    <title>bcec3bd6-0bf0-4b2c-8cbb-32c313153c42</title>
    <updated>2026-05-20T09:33:42.025037+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bcec3bd6-0bf0-4b2c-8cbb-32c313153c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30432", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-88018e08-9f90bafadba6dbf1", "content": "", "creation_timestamp": "2025-04-01T12:49:35.121133Z"}</content>
    <link href="https://db.gcve.eu/sighting/bcec3bd6-0bf0-4b2c-8cbb-32c313153c42/export"/>
    <published>2025-04-01T12:49:35.121133+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/113615c4-924b-4d1d-b1f4-2db5f76b4117/export</id>
    <title>113615c4-924b-4d1d-b1f4-2db5f76b4117</title>
    <updated>2026-05-20T09:33:42.024990+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "113615c4-924b-4d1d-b1f4-2db5f76b4117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30432", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-88018e08-9f90bafadba6dbf1", "content": "", "creation_timestamp": "2025-04-01T12:49:35.126790Z"}</content>
    <link href="https://db.gcve.eu/sighting/113615c4-924b-4d1d-b1f4-2db5f76b4117/export"/>
    <published>2025-04-01T12:49:35.126790+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/45867808-a70a-469f-839b-16663cc88fd4/export</id>
    <title>45867808-a70a-469f-839b-16663cc88fd4</title>
    <updated>2026-05-20T09:33:42.024939+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "45867808-a70a-469f-839b-16663cc88fd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30434", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9912", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30434\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved input sanitization. This issue is fixed in iOS 18.4 and iPadOS 18.4. Processing a maliciously crafted file may lead to a cross site scripting attack.\n\ud83d\udccf Published: 2025-03-31T22:23:06.874Z\n\ud83d\udccf Modified: 2025-04-01T14:15:23.497Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122371", "creation_timestamp": "2025-04-01T14:33:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/45867808-a70a-469f-839b-16663cc88fd4/export"/>
    <published>2025-04-01T14:33:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6947f629-ed7e-4dd4-81eb-999e8962078e/export</id>
    <title>6947f629-ed7e-4dd4-81eb-999e8962078e</title>
    <updated>2026-05-20T09:33:42.024887+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6947f629-ed7e-4dd4-81eb-999e8962078e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30435", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9914", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30435\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.4. A sandboxed app may be able to access sensitive user data in system logs.\n\ud83d\udccf Published: 2025-03-31T22:23:07.795Z\n\ud83d\udccf Modified: 2025-04-01T14:13:03.120Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373", "creation_timestamp": "2025-04-01T14:33:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6947f629-ed7e-4dd4-81eb-999e8962078e/export"/>
    <published>2025-04-01T14:33:18+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f39afab4-ada4-4f67-b375-f81893cb3146/export</id>
    <title>f39afab4-ada4-4f67-b375-f81893cb3146</title>
    <updated>2026-05-20T09:33:42.024835+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f39afab4-ada4-4f67-b375-f81893cb3146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30437", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9965", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30437\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.4. An app may be able to corrupt coprocessor memory.\n\ud83d\udccf Published: 2025-03-31T22:23:41.741Z\n\ud83d\udccf Modified: 2025-04-01T18:20:18.123Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373", "creation_timestamp": "2025-04-01T18:32:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f39afab4-ada4-4f67-b375-f81893cb3146/export"/>
    <published>2025-04-01T18:32:41+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7795ddc8-fcb6-4af0-841a-460bb93eca00/export</id>
    <title>7795ddc8-fcb6-4af0-841a-460bb93eca00</title>
    <updated>2026-05-20T09:33:42.024782+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7795ddc8-fcb6-4af0-841a-460bb93eca00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30438", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10103", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30438\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved access restrictions. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to dismiss the system notification on the Lock Screen that a recording was started.\n\ud83d\udccf Published: 2025-03-31T22:23:02.346Z\n\ud83d\udccf Modified: 2025-04-02T15:23:06.883Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122377\n2. https://support.apple.com/en-us/122371\n3. https://support.apple.com/en-us/122373\n4. https://support.apple.com/en-us/122378\n5. https://support.apple.com/en-us/122374\n6. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-04-02T15:33:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7795ddc8-fcb6-4af0-841a-460bb93eca00/export"/>
    <published>2025-04-02T15:33:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1d225886-b2b4-43f5-b28c-e26925c24109/export</id>
    <title>1d225886-b2b4-43f5-b28c-e26925c24109</title>
    <updated>2026-05-20T09:33:42.024725+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1d225886-b2b4-43f5-b28c-e26925c24109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30432", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10352", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30432\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved state management. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sonoma 14.7.5. A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures.\n\ud83d\udccf Published: 2025-03-31T22:22:28.969Z\n\ud83d\udccf Modified: 2025-04-03T20:13:11.090Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122377\n2. https://support.apple.com/en-us/122371\n3. https://support.apple.com/en-us/122372\n4. https://support.apple.com/en-us/122378\n5. https://support.apple.com/en-us/122374\n6. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-04-03T20:36:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1d225886-b2b4-43f5-b28c-e26925c24109/export"/>
    <published>2025-04-03T20:36:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dd8d1b17-0801-404c-9032-8898cbbb2e46/export</id>
    <title>dd8d1b17-0801-404c-9032-8898cbbb2e46</title>
    <updated>2026-05-20T09:33:42.024667+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dd8d1b17-0801-404c-9032-8898cbbb2e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30436", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16321", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30436\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker may be able to use Siri to enable Auto-Answer Calls.\n\ud83d\udccf Published: 2025-05-12T21:42:46.888Z\n\ud83d\udccf Modified: 2025-05-14T16:18:29.443Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122371", "creation_timestamp": "2025-05-14T16:33:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dd8d1b17-0801-404c-9032-8898cbbb2e46/export"/>
    <published>2025-05-14T16:33:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8f9232b5-b742-4991-853f-2f6a4219c193/export</id>
    <title>8f9232b5-b742-4991-853f-2f6a4219c193</title>
    <updated>2026-05-20T09:33:42.024590+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8f9232b5-b742-4991-853f-2f6a4219c193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30430", "type": "published-proof-of-concept", "source": "Telegram/MjTxKferycnY5Pne62qxIs8GZVQD5pDYWQHmJtbu7pIL3GM", "content": "", "creation_timestamp": "2026-04-02T22:15:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8f9232b5-b742-4991-853f-2f6a4219c193/export"/>
    <published>2026-04-02T22:15:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1d17c078-b430-48b9-beeb-b1d02c718447/export</id>
    <title>1d17c078-b430-48b9-beeb-b1d02c718447</title>
    <updated>2026-05-20T09:33:42.023598+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1d17c078-b430-48b9-beeb-b1d02c718447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30433", "type": "published-proof-of-concept", "source": "Telegram/MjTxKferycnY5Pne62qxIs8GZVQD5pDYWQHmJtbu7pIL3GM", "content": "", "creation_timestamp": "2026-04-02T22:15:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1d17c078-b430-48b9-beeb-b1d02c718447/export"/>
    <published>2026-04-02T22:15:38+00:00</published>
  </entry>
</feed>
