<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-30T23:40:39.115408+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/68427637-87f4-48a9-9d36-ce6638f5cea8/export</id>
    <title>68427637-87f4-48a9-9d36-ce6638f5cea8</title>
    <updated>2026-04-30T23:40:39.237054+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "68427637-87f4-48a9-9d36-ce6638f5cea8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32056", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-d85938e6-e6afb3a032a3100c", "content": "", "creation_timestamp": "2025-04-14T16:51:01.931720Z"}</content>
    <link href="https://db.gcve.eu/sighting/68427637-87f4-48a9-9d36-ce6638f5cea8/export"/>
    <published>2025-04-14T16:51:01.931720+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/13125f8f-7e85-4ddb-926b-0e9db15f99b2/export</id>
    <title>13125f8f-7e85-4ddb-926b-0e9db15f99b2</title>
    <updated>2026-04-30T23:40:39.236984+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "13125f8f-7e85-4ddb-926b-0e9db15f99b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32051", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14213", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32051\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in libsoup. The libsoup soup_uri_decode_data_uri() function may crash when processing malformed data URI. This flaw allows an attacker to cause a denial of service (DoS).\n\ud83d\udccf Published: 2025-04-03T13:36:50.776Z\n\ud83d\udccf Modified: 2025-05-01T01:48:17.090Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-32051\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2357068", "creation_timestamp": "2025-05-01T02:13:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/13125f8f-7e85-4ddb-926b-0e9db15f99b2/export"/>
    <published>2025-05-01T02:13:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/655d6125-3a3f-4e36-b920-67704bfea04b/export</id>
    <title>655d6125-3a3f-4e36-b920-67704bfea04b</title>
    <updated>2026-04-30T23:40:39.236912+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "655d6125-3a3f-4e36-b920-67704bfea04b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32052", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15833", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32052\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)\n\ud83d\udd39 Description: A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.\n\ud83d\udccf Published: 2025-04-03T13:37:23.109Z\n\ud83d\udccf Modified: 2025-05-09T20:21:41.858Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:4440\n2. https://access.redhat.com/errata/RHSA-2025:4508\n3. https://access.redhat.com/errata/RHSA-2025:4560\n4. https://access.redhat.com/errata/RHSA-2025:4568\n5. https://access.redhat.com/security/cve/CVE-2025-32052\n6. https://bugzilla.redhat.com/show_bug.cgi?id=2357069", "creation_timestamp": "2025-05-09T20:26:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/655d6125-3a3f-4e36-b920-67704bfea04b/export"/>
    <published>2025-05-09T20:26:05+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f272d0e3-699d-46b9-9afb-ae4139860bf7/export</id>
    <title>f272d0e3-699d-46b9-9afb-ae4139860bf7</title>
    <updated>2026-04-30T23:40:39.236835+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f272d0e3-699d-46b9-9afb-ae4139860bf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32050", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15835", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32050\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read.\n\ud83d\udccf Published: 2025-04-03T13:36:29.141Z\n\ud83d\udccf Modified: 2025-05-09T20:16:05.822Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:4440\n2. https://access.redhat.com/errata/RHSA-2025:4508\n3. https://access.redhat.com/errata/RHSA-2025:4560\n4. https://access.redhat.com/errata/RHSA-2025:4568\n5. https://access.redhat.com/security/cve/CVE-2025-32050\n6. https://bugzilla.redhat.com/show_bug.cgi?id=2357067", "creation_timestamp": "2025-05-09T20:26:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f272d0e3-699d-46b9-9afb-ae4139860bf7/export"/>
    <published>2025-05-09T20:26:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a8a38ba4-91e6-4e9e-90c8-46c60516babd/export</id>
    <title>a8a38ba4-91e6-4e9e-90c8-46c60516babd</title>
    <updated>2026-04-30T23:40:39.236767+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a8a38ba4-91e6-4e9e-90c8-46c60516babd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32056", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.302686Z"}</content>
    <link href="https://db.gcve.eu/sighting/a8a38ba4-91e6-4e9e-90c8-46c60516babd/export"/>
    <published>2025-05-14T05:56:35.302686+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a99334fb-cf5e-4a15-b3a1-ce893c0cc046/export</id>
    <title>a99334fb-cf5e-4a15-b3a1-ce893c0cc046</title>
    <updated>2026-04-30T23:40:39.236696+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a99334fb-cf5e-4a15-b3a1-ce893c0cc046", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32057", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.422181Z"}</content>
    <link href="https://db.gcve.eu/sighting/a99334fb-cf5e-4a15-b3a1-ce893c0cc046/export"/>
    <published>2025-05-14T05:56:35.422181+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/80acef7e-e12e-4950-8f60-9b27f38ef367/export</id>
    <title>80acef7e-e12e-4950-8f60-9b27f38ef367</title>
    <updated>2026-04-30T23:40:39.236615+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "80acef7e-e12e-4950-8f60-9b27f38ef367", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32058", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.518661Z"}</content>
    <link href="https://db.gcve.eu/sighting/80acef7e-e12e-4950-8f60-9b27f38ef367/export"/>
    <published>2025-05-14T05:56:35.518661+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/71bbc39d-4275-4346-b902-72847a6e3d80/export</id>
    <title>71bbc39d-4275-4346-b902-72847a6e3d80</title>
    <updated>2026-04-30T23:40:39.236029+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "71bbc39d-4275-4346-b902-72847a6e3d80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32059", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-645abf81-6d0121fb06ee9f87", "content": "", "creation_timestamp": "2025-05-14T05:56:35.617479Z"}</content>
    <link href="https://db.gcve.eu/sighting/71bbc39d-4275-4346-b902-72847a6e3d80/export"/>
    <published>2025-05-14T05:56:35.617479+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d662d16d-b9e3-4212-b335-235010c853f1/export</id>
    <title>d662d16d-b9e3-4212-b335-235010c853f1</title>
    <updated>2026-04-30T23:40:39.235934+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "d662d16d-b9e3-4212-b335-235010c853f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-32059", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mez5m4363z2h", "content": "", "creation_timestamp": "2026-02-16T22:58:21.285746Z"}</content>
    <link href="https://db.gcve.eu/sighting/d662d16d-b9e3-4212-b335-235010c853f1/export"/>
    <published>2026-02-16T22:58:21.285746+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f0329b34-a669-489f-8ab1-295c8f9180e9/export</id>
    <title>f0329b34-a669-489f-8ab1-295c8f9180e9</title>
    <updated>2026-04-30T23:40:39.234385+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "f0329b34-a669-489f-8ab1-295c8f9180e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-32058", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mez5mclpwi2f", "content": "", "creation_timestamp": "2026-02-16T22:58:28.097141Z"}</content>
    <link href="https://db.gcve.eu/sighting/f0329b34-a669-489f-8ab1-295c8f9180e9/export"/>
    <published>2026-02-16T22:58:28.097141+00:00</published>
  </entry>
</feed>
