<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T04:06:59.184531+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/5b343678-56d2-4d1c-b772-55b93933a502/export</id>
    <title>5b343678-56d2-4d1c-b772-55b93933a502</title>
    <updated>2026-05-04T04:06:59.391210+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5b343678-56d2-4d1c-b772-55b93933a502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3317", "type": "seen", "source": "https://t.me/cvedetector/22221", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3317 - Fumiao OpenCms Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3317 \nPublished : April 6, 2025, 12:15 p.m. | 1\u00a0hour, 30\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in fumiao opencms up to a0fafa5cff58719e9b27c2a2eec204cc165ce14f. Affected is an unknown function of the file opencms-dev/src/main/webapp/view/admin/document/dataPage.jsp. The manipulation of the argument path leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-06T15:59:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5b343678-56d2-4d1c-b772-55b93933a502/export"/>
    <published>2025-04-06T15:59:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ef7c32ec-e4ed-4a17-ba46-f01fe55a9d22/export</id>
    <title>ef7c32ec-e4ed-4a17-ba46-f01fe55a9d22</title>
    <updated>2026-05-04T04:06:59.391147+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ef7c32ec-e4ed-4a17-ba46-f01fe55a9d22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-33177", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m3h5vggl7c2l", "content": "", "creation_timestamp": "2025-10-18T06:28:54.788893Z"}</content>
    <link href="https://db.gcve.eu/sighting/ef7c32ec-e4ed-4a17-ba46-f01fe55a9d22/export"/>
    <published>2025-10-18T06:28:54.788893+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cef7217f-af5d-456c-beaf-a2c22de0490a/export</id>
    <title>cef7217f-af5d-456c-beaf-a2c22de0490a</title>
    <updated>2026-05-04T04:06:59.391086+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cef7217f-af5d-456c-beaf-a2c22de0490a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-33176", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m4th3sgccd32", "content": "", "creation_timestamp": "2025-11-04T21:11:21.106756Z"}</content>
    <link href="https://db.gcve.eu/sighting/cef7217f-af5d-456c-beaf-a2c22de0490a/export"/>
    <published>2025-11-04T21:11:21.106756+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0170be72-a438-45fc-be6b-6c98d861f6d9/export</id>
    <title>0170be72-a438-45fc-be6b-6c98d861f6d9</title>
    <updated>2026-05-04T04:06:59.390447+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0170be72-a438-45fc-be6b-6c98d861f6d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-33176", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4tjw7n54u2n", "content": "", "creation_timestamp": "2025-11-04T22:01:13.479285Z"}</content>
    <link href="https://db.gcve.eu/sighting/0170be72-a438-45fc-be6b-6c98d861f6d9/export"/>
    <published>2025-11-04T22:01:13.479285+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cc027394-5c96-4896-8d33-7cdf459d5353/export</id>
    <title>cc027394-5c96-4896-8d33-7cdf459d5353</title>
    <updated>2026-05-04T04:06:59.390397+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "cc027394-5c96-4896-8d33-7cdf459d5353", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfmyypxslg2d", "content": "", "creation_timestamp": "2026-02-24T20:29:10.562676Z"}</content>
    <link href="https://db.gcve.eu/sighting/cc027394-5c96-4896-8d33-7cdf459d5353/export"/>
    <published>2026-02-24T20:29:10.562676+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d8051a13-abb7-4d2b-9a74-cd06a71090c3/export</id>
    <title>d8051a13-abb7-4d2b-9a74-cd06a71090c3</title>
    <updated>2026-05-04T04:06:59.390345+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "d8051a13-abb7-4d2b-9a74-cd06a71090c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfmyzijpzr2s", "content": "", "creation_timestamp": "2026-02-24T20:29:36.377424Z"}</content>
    <link href="https://db.gcve.eu/sighting/d8051a13-abb7-4d2b-9a74-cd06a71090c3/export"/>
    <published>2026-02-24T20:29:36.377424+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c76d290a-7b5f-46eb-b619-40e2a7c1cdbd/export</id>
    <title>c76d290a-7b5f-46eb-b619-40e2a7c1cdbd</title>
    <updated>2026-05-04T04:06:59.390293+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "c76d290a-7b5f-46eb-b619-40e2a7c1cdbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mfn3p2nuw72y", "content": "", "creation_timestamp": "2026-02-24T21:17:27.267503Z"}</content>
    <link href="https://db.gcve.eu/sighting/c76d290a-7b5f-46eb-b619-40e2a7c1cdbd/export"/>
    <published>2026-02-24T21:17:27.267503+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4384bfc7-895a-435e-8953-a6f9519be9bb/export</id>
    <title>4384bfc7-895a-435e-8953-a6f9519be9bb</title>
    <updated>2026-05-04T04:06:59.390235+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "4384bfc7-895a-435e-8953-a6f9519be9bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mfurppk35c2i", "content": "", "creation_timestamp": "2026-02-27T22:40:10.192210Z"}</content>
    <link href="https://db.gcve.eu/sighting/4384bfc7-895a-435e-8953-a6f9519be9bb/export"/>
    <published>2026-02-27T22:40:10.192210+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4a8a487b-9db5-472a-b358-e7c1faaed9e0/export</id>
    <title>4a8a487b-9db5-472a-b358-e7c1faaed9e0</title>
    <updated>2026-05-04T04:06:59.390141+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "4a8a487b-9db5-472a-b358-e7c1faaed9e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/volk149.bsky.social/post/3mgb6t7ncrk26", "content": "", "creation_timestamp": "2026-03-04T21:06:44.387475Z"}</content>
    <link href="https://db.gcve.eu/sighting/4a8a487b-9db5-472a-b358-e7c1faaed9e0/export"/>
    <published>2026-03-04T21:06:44.387475+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b57e2a81-2638-4299-b972-1057663d811d/export</id>
    <title>b57e2a81-2638-4299-b972-1057663d811d</title>
    <updated>2026-05-04T04:06:59.388971+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "b57e2a81-2638-4299-b972-1057663d811d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mgixgugjdk2l", "content": "", "creation_timestamp": "2026-03-07T23:15:51.229433Z"}</content>
    <link href="https://db.gcve.eu/sighting/b57e2a81-2638-4299-b972-1057663d811d/export"/>
    <published>2026-03-07T23:15:51.229433+00:00</published>
  </entry>
</feed>
