<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-23T17:19:55.582107+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/82d0a431-d87f-4318-ade2-52b14e92ff69/export</id>
    <title>82d0a431-d87f-4318-ade2-52b14e92ff69</title>
    <updated>2026-05-23T17:19:55.946622+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "82d0a431-d87f-4318-ade2-52b14e92ff69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-J8XJ-7JFF-46MX", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8907", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30225\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of malformed transformations. When making many malformed transformation requests at once, at some point, all assets are served as 403. This causes denial of assets for all policies of Directus, including Admin and Public. Version 12.0.1 of the `@directus/storage-driver-s3` package, corresponding to version 11.5.0 of Directus, fixes the issue.\n\ud83d\udccf Published: 2025-03-26T16:27:14.665Z\n\ud83d\udccf Modified: 2025-03-26T16:27:14.665Z\n\ud83d\udd17 References:\n1. https://github.com/directus/directus/security/advisories/GHSA-j8xj-7jff-46mx", "creation_timestamp": "2025-03-26T17:25:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/82d0a431-d87f-4318-ade2-52b14e92ff69/export"/>
    <published>2025-03-26T17:25:35+00:00</published>
  </entry>
</feed>
