<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-22T05:15:09.087432+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/75f4a01c-51d7-4122-a957-19cded83fccf/export</id>
    <title>75f4a01c-51d7-4122-a957-19cded83fccf</title>
    <updated>2026-05-22T05:15:09.284718+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "75f4a01c-51d7-4122-a957-19cded83fccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47681", "type": "seen", "source": "https://t.me/cvedetector/24723", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47681 - Ability, Inc Web Accessibility with Max Access CSRF\", \n  \"Content\": \"CVE ID : CVE-2025-47681 \nPublished : May 7, 2025, 3:16 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Ability, Inc Web Accessibility with Max Access allows Cross Site Request Forgery. This issue affects Web Accessibility with Max Access: from n/a through 2.0.9. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T19:00:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/75f4a01c-51d7-4122-a957-19cded83fccf/export"/>
    <published>2025-05-07T19:00:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7e01d1c2-9c4e-4310-9a89-42528f2bf80d/export</id>
    <title>7e01d1c2-9c4e-4310-9a89-42528f2bf80d</title>
    <updated>2026-05-22T05:15:09.284664+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7e01d1c2-9c4e-4310-9a89-42528f2bf80d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47683", "type": "seen", "source": "https://t.me/cvedetector/24724", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47683 - Florent Maillefaud WP Maintenance Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-47683 \nPublished : May 7, 2025, 3:16 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in Florent Maillefaud WP Maintenance allows Object Injection. This issue affects WP Maintenance: from n/a through 6.1.9.7. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T19:00:47.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7e01d1c2-9c4e-4310-9a89-42528f2bf80d/export"/>
    <published>2025-05-07T19:00:47+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e14f6991-5d43-4e15-92c4-bca2c0ff7c96/export</id>
    <title>e14f6991-5d43-4e15-92c4-bca2c0ff7c96</title>
    <updated>2026-05-22T05:15:09.284613+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e14f6991-5d43-4e15-92c4-bca2c0ff7c96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47682", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15973", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47682\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozy Vision Technologies Pvt. Ltd. SMS Alert Order Notifications \u2013 WooCommerce allows SQL Injection.This issue affects SMS Alert Order Notifications \u2013 WooCommerce: from n/a through 3.8.2.\n\ud83d\udccf Published: 2025-05-12T18:19:43.926Z\n\ud83d\udccf Modified: 2025-05-12T18:19:43.926Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/sms-alert/vulnerability/wordpress-sms-alert-order-notifications-woocommerce-3-8-1-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-12T18:29:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e14f6991-5d43-4e15-92c4-bca2c0ff7c96/export"/>
    <published>2025-05-12T18:29:15+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/45b8c73f-fa70-4253-b6b2-976a89326e94/export</id>
    <title>45b8c73f-fa70-4253-b6b2-976a89326e94</title>
    <updated>2026-05-22T05:15:09.284560+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "45b8c73f-fa70-4253-b6b2-976a89326e94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47682", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15987", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47682\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozy Vision Technologies Pvt. Ltd. SMS Alert Order Notifications \u2013 WooCommerce allows SQL Injection.This issue affects SMS Alert Order Notifications \u2013 WooCommerce: from n/a through 3.8.2.\n\ud83d\udccf Published: 2025-05-12T18:19:43.926Z\n\ud83d\udccf Modified: 2025-05-12T18:19:43.926Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/sms-alert/vulnerability/wordpress-sms-alert-order-notifications-woocommerce-3-8-1-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-12T18:31:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/45b8c73f-fa70-4253-b6b2-976a89326e94/export"/>
    <published>2025-05-12T18:31:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6381893a-8b45-4598-af1a-e309ab09d7f4/export</id>
    <title>6381893a-8b45-4598-af1a-e309ab09d7f4</title>
    <updated>2026-05-22T05:15:09.284501+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6381893a-8b45-4598-af1a-e309ab09d7f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47682", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16001", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47682\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozy Vision Technologies Pvt. Ltd. SMS Alert Order Notifications \u2013 WooCommerce allows SQL Injection.This issue affects SMS Alert Order Notifications \u2013 WooCommerce: from n/a through 3.8.2.\n\ud83d\udccf Published: 2025-05-12T18:19:43.926Z\n\ud83d\udccf Modified: 2025-05-12T18:19:43.926Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/sms-alert/vulnerability/wordpress-sms-alert-order-notifications-woocommerce-3-8-1-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-12T18:37:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6381893a-8b45-4598-af1a-e309ab09d7f4/export"/>
    <published>2025-05-12T18:37:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/88d8821e-eb45-47ce-9e18-995d9b1633de/export</id>
    <title>88d8821e-eb45-47ce-9e18-995d9b1633de</title>
    <updated>2026-05-22T05:15:09.284443+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "88d8821e-eb45-47ce-9e18-995d9b1633de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47682", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16003", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47682\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozy Vision Technologies Pvt. Ltd. SMS Alert Order Notifications \u2013 WooCommerce allows SQL Injection.This issue affects SMS Alert Order Notifications \u2013 WooCommerce: from n/a through 3.8.2.\n\ud83d\udccf Published: 2025-05-12T18:19:43.926Z\n\ud83d\udccf Modified: 2025-05-12T18:19:43.926Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/sms-alert/vulnerability/wordpress-sms-alert-order-notifications-woocommerce-3-8-1-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-12T18:37:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/88d8821e-eb45-47ce-9e18-995d9b1633de/export"/>
    <published>2025-05-12T18:37:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/08562559-4e8d-47cd-929e-36e5773a21a2/export</id>
    <title>08562559-4e8d-47cd-929e-36e5773a21a2</title>
    <updated>2026-05-22T05:15:09.284389+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "08562559-4e8d-47cd-929e-36e5773a21a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47682", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loytpbiqqt2p", "content": "", "creation_timestamp": "2025-05-12T20:46:53.864225Z"}</content>
    <link href="https://db.gcve.eu/sighting/08562559-4e8d-47cd-929e-36e5773a21a2/export"/>
    <published>2025-05-12T20:46:53.864225+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/578b3894-e97e-41df-914f-26664c955294/export</id>
    <title>578b3894-e97e-41df-914f-26664c955294</title>
    <updated>2026-05-22T05:15:09.284329+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "578b3894-e97e-41df-914f-26664c955294", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47682", "type": "seen", "source": "https://t.me/cvedetector/25110", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47682 - Cozy Vision Technologies Pvt. Ltd. SMS Alert Order Notifications \u2013 WooCommerce SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-47682 \nPublished : May 12, 2025, 7:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozy Vision Technologies Pvt. Ltd. SMS Alert Order Notifications \u2013 WooCommerce allows SQL Injection.This issue affects SMS Alert Order Notifications \u2013 WooCommerce: from n/a through 3.8.2. \nSeverity: 9.3 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T22:48:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/578b3894-e97e-41df-914f-26664c955294/export"/>
    <published>2025-05-12T22:48:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a9ac579d-0344-45bf-892d-992ae253d4bc/export</id>
    <title>a9ac579d-0344-45bf-892d-992ae253d4bc</title>
    <updated>2026-05-22T05:15:09.284250+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a9ac579d-0344-45bf-892d-992ae253d4bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4768", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16670", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4768\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in feng_ha_ha/megagao ssm-erp and production_ssm 1.0. This affects the function uploadPicture of the file PictureServiceImpl.java. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is distributed under two entirely different names.\n\ud83d\udccf Published: 2025-05-16T10:00:07.182Z\n\ud83d\udccf Modified: 2025-05-16T10:00:07.182Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309069\n2. https://vuldb.com/?ctiid.309069\n3. https://vuldb.com/?submit.571737\n4. https://github.com/Hao-Ni/CVE/issues/4", "creation_timestamp": "2025-05-16T10:34:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a9ac579d-0344-45bf-892d-992ae253d4bc/export"/>
    <published>2025-05-16T10:34:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2b111408-9acd-4ec7-9181-7c48d33da868/export</id>
    <title>2b111408-9acd-4ec7-9181-7c48d33da868</title>
    <updated>2026-05-22T05:15:09.283445+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2b111408-9acd-4ec7-9181-7c48d33da868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47687", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lptxntl3qy2m", "content": "", "creation_timestamp": "2025-05-23T15:39:33.773573Z"}</content>
    <link href="https://db.gcve.eu/sighting/2b111408-9acd-4ec7-9181-7c48d33da868/export"/>
    <published>2025-05-23T15:39:33.773573+00:00</published>
  </entry>
</feed>
