<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T08:29:26.085941+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/8992ad5f-b93a-454c-ac5c-33e938fd5603/export</id>
    <title>8992ad5f-b93a-454c-ac5c-33e938fd5603</title>
    <updated>2026-05-11T08:29:26.216213+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8992ad5f-b93a-454c-ac5c-33e938fd5603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38495", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/5724", "content": "USB HID info-leak exploit for CVE-2025-38494/CVE-2025-38495\n\nExploit by Andrey Konovalov for an integer underflow bug in the HID subsystem that allows leaking up to 64 KB of kernel memory over USB.\n\nThe bug is still not fixed in the Pixel and Ubuntu kernels.", "creation_timestamp": "2025-09-23T15:36:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8992ad5f-b93a-454c-ac5c-33e938fd5603/export"/>
    <published>2025-09-23T15:36:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/08b9d572-e5b8-4f98-af42-38f051aa9916/export</id>
    <title>08b9d572-e5b8-4f98-af42-38f051aa9916</title>
    <updated>2026-05-11T08:29:26.216121+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "08b9d572-e5b8-4f98-af42-38f051aa9916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38494", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/5724", "content": "USB HID info-leak exploit for CVE-2025-38494/CVE-2025-38495\n\nExploit by Andrey Konovalov for an integer underflow bug in the HID subsystem that allows leaking up to 64 KB of kernel memory over USB.\n\nThe bug is still not fixed in the Pixel and Ubuntu kernels.", "creation_timestamp": "2025-09-23T15:36:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/08b9d572-e5b8-4f98-af42-38f051aa9916/export"/>
    <published>2025-09-23T15:36:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/376e19be-b666-4a74-8df9-14a904128f22/export</id>
    <title>376e19be-b666-4a74-8df9-14a904128f22</title>
    <updated>2026-05-11T08:29:26.216048+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "376e19be-b666-4a74-8df9-14a904128f22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38495", "type": "published-proof-of-concept", "source": "Telegram/eMW_wScd-Iod74MRD69D4LgSHW-sjWGfOP6p5XXSEFVVQnk", "content": "", "creation_timestamp": "2025-09-28T12:05:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/376e19be-b666-4a74-8df9-14a904128f22/export"/>
    <published>2025-09-28T12:05:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/20e2a0e6-b493-47f5-89be-3e1fbe4585de/export</id>
    <title>20e2a0e6-b493-47f5-89be-3e1fbe4585de</title>
    <updated>2026-05-11T08:29:26.215972+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "20e2a0e6-b493-47f5-89be-3e1fbe4585de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38494", "type": "published-proof-of-concept", "source": "Telegram/eMW_wScd-Iod74MRD69D4LgSHW-sjWGfOP6p5XXSEFVVQnk", "content": "", "creation_timestamp": "2025-09-28T12:05:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/20e2a0e6-b493-47f5-89be-3e1fbe4585de/export"/>
    <published>2025-09-28T12:05:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/94eeefe7-caf7-448c-9d0a-b7297a441e3e/export</id>
    <title>94eeefe7-caf7-448c-9d0a-b7297a441e3e</title>
    <updated>2026-05-11T08:29:26.215895+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "94eeefe7-caf7-448c-9d0a-b7297a441e3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38498", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lzyipwshok2d", "content": "", "creation_timestamp": "2025-09-29T17:07:36.641316Z"}</content>
    <link href="https://db.gcve.eu/sighting/94eeefe7-caf7-448c-9d0a-b7297a441e3e/export"/>
    <published>2025-09-29T17:07:36.641316+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/882f3767-d6bb-4af6-a2d8-c4c42b831979/export</id>
    <title>882f3767-d6bb-4af6-a2d8-c4c42b831979</title>
    <updated>2026-05-11T08:29:26.215816+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "882f3767-d6bb-4af6-a2d8-c4c42b831979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38499", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}</content>
    <link href="https://db.gcve.eu/sighting/882f3767-d6bb-4af6-a2d8-c4c42b831979/export"/>
    <published>2025-12-03T14:14:49.267740+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/93291455-42a0-4a92-a70d-e07df1d2f7aa/export</id>
    <title>93291455-42a0-4a92-a70d-e07df1d2f7aa</title>
    <updated>2026-05-11T08:29:26.215732+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "93291455-42a0-4a92-a70d-e07df1d2f7aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38499", "type": "seen", "source": "https://gist.github.com/Darkcrai86/30562019a7a0ba086126a72e7607d61c", "content": "", "creation_timestamp": "2025-12-22T11:56:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/93291455-42a0-4a92-a70d-e07df1d2f7aa/export"/>
    <published>2025-12-22T11:56:56+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0024ed88-3076-4425-8a14-72054a8d4c73/export</id>
    <title>0024ed88-3076-4425-8a14-72054a8d4c73</title>
    <updated>2026-05-11T08:29:26.215648+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0024ed88-3076-4425-8a14-72054a8d4c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38497", "type": "published-proof-of-concept", "source": "Telegram/jTPGnUxmSAW8wR6NkmrR5v_wJMt1Uxj8oeIPEEpjbGGi38E", "content": "", "creation_timestamp": "2026-01-07T17:07:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0024ed88-3076-4425-8a14-72054a8d4c73/export"/>
    <published>2026-01-07T17:07:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a55b3d2e-22fe-426b-b60d-bf30b16697c1/export</id>
    <title>a55b3d2e-22fe-426b-b60d-bf30b16697c1</title>
    <updated>2026-05-11T08:29:26.215532+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a55b3d2e-22fe-426b-b60d-bf30b16697c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38498", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-06", "content": "", "creation_timestamp": "2026-02-12T11:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a55b3d2e-22fe-426b-b60d-bf30b16697c1/export"/>
    <published>2026-02-12T11:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2f70f5ed-70eb-4bf2-af74-d5a60e7eb386/export</id>
    <title>2f70f5ed-70eb-4bf2-af74-d5a60e7eb386</title>
    <updated>2026-05-11T08:29:26.213301+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2f70f5ed-70eb-4bf2-af74-d5a60e7eb386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38491", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2f70f5ed-70eb-4bf2-af74-d5a60e7eb386/export"/>
    <published>2026-03-19T00:00:00+00:00</published>
  </entry>
</feed>
