<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T18:43:14.425940+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/00134d37-9afc-4fac-8f3f-cc55d256bb74/export</id>
    <title>00134d37-9afc-4fac-8f3f-cc55d256bb74</title>
    <updated>2026-05-09T18:43:14.828635+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "00134d37-9afc-4fac-8f3f-cc55d256bb74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CM7W-99V2-PRRQ", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2211", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23202\n\ud83d\udd39 Description: Bible Module is a tool designed for ROBLOX developers to integrate Bible functionality into their games. The `FetchVerse` and `FetchPassage` functions in the Bible Module are susceptible to injection attacks due to the absence of input validation. This vulnerability could allow an attacker to manipulate the API request URLs, potentially leading to unauthorized access or data tampering. This issue has been addressed in version 0.0.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-17T20:18:20.352Z\n\ud83d\udccf Modified: 2025-01-17T20:18:20.352Z\n\ud83d\udd17 References:\n1. https://github.com/devycreates/Bible-Module/security/advisories/GHSA-cm7w-99v2-prrq\n2. https://github.com/devycreates/Bible-Module/commit/5b783855fc3285be2da8639c97ac37af28f8c55a", "creation_timestamp": "2025-01-17T20:57:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/00134d37-9afc-4fac-8f3f-cc55d256bb74/export"/>
    <published>2025-01-17T20:57:56+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ee6dd9a8-96d6-401e-84c6-6e5059f4fc4a/export</id>
    <title>ee6dd9a8-96d6-401e-84c6-6e5059f4fc4a</title>
    <updated>2026-05-09T18:43:14.827552+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ee6dd9a8-96d6-401e-84c6-6e5059f4fc4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-cm7w-99v2-prrq", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113845775391436167", "content": "", "creation_timestamp": "2025-01-17T21:17:52.856031Z"}</content>
    <link href="https://db.gcve.eu/sighting/ee6dd9a8-96d6-401e-84c6-6e5059f4fc4a/export"/>
    <published>2025-01-17T21:17:52.856031+00:00</published>
  </entry>
</feed>
