<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T21:30:47.389919+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/03f0b300-47af-45f1-97b2-6bce61e1b8f9/export</id>
    <title>03f0b300-47af-45f1-97b2-6bce61e1b8f9</title>
    <updated>2026-05-04T21:30:47.808121+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "03f0b300-47af-45f1-97b2-6bce61e1b8f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114196115958327030", "content": "", "creation_timestamp": "2025-03-20T18:14:06.134221Z"}</content>
    <link href="https://db.gcve.eu/sighting/03f0b300-47af-45f1-97b2-6bce61e1b8f9/export"/>
    <published>2025-03-20T18:14:06.134221+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3d9c1544-3560-4e6f-8d29-a2261a6e5a0f/export</id>
    <title>3d9c1544-3560-4e6f-8d29-a2261a6e5a0f</title>
    <updated>2026-05-04T21:30:47.808046+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3d9c1544-3560-4e6f-8d29-a2261a6e5a0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-Q9F5-625G-XM39", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8257", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29914\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.\n\ud83d\udccf Published: 2025-03-20T17:44:59.024Z\n\ud83d\udccf Modified: 2025-03-20T17:44:59.024Z\n\ud83d\udd17 References:\n1. https://github.com/corazawaf/coraza/security/advisories/GHSA-q9f5-625g-xm39\n2. https://github.com/corazawaf/coraza/commit/4722c9ad0d502abd56b8d6733c6b47eb4111742d", "creation_timestamp": "2025-03-20T18:20:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3d9c1544-3560-4e6f-8d29-a2261a6e5a0f/export"/>
    <published>2025-03-20T18:20:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5eb5948f-a5a3-4b2e-90f6-994c6372f31e/export</id>
    <title>5eb5948f-a5a3-4b2e-90f6-994c6372f31e</title>
    <updated>2026-05-04T21:30:47.807971+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5eb5948f-a5a3-4b2e-90f6-994c6372f31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/19367fed712521a1833c7c1711d66e07", "content": "", "creation_timestamp": "2026-01-24T21:30:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5eb5948f-a5a3-4b2e-90f6-994c6372f31e/export"/>
    <published>2026-01-24T21:30:35+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5b1380bb-0785-44ba-a4e5-10c047781be2/export</id>
    <title>5b1380bb-0785-44ba-a4e5-10c047781be2</title>
    <updated>2026-05-04T21:30:47.807828+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5b1380bb-0785-44ba-a4e5-10c047781be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/c2368f00bd72d41149f54bfc49fec47c", "content": "", "creation_timestamp": "2026-01-24T21:30:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5b1380bb-0785-44ba-a4e5-10c047781be2/export"/>
    <published>2026-01-24T21:30:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1ac8f174-2e8f-49dc-b49b-c3899f753f09/export</id>
    <title>1ac8f174-2e8f-49dc-b49b-c3899f753f09</title>
    <updated>2026-05-04T21:30:47.797570+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1ac8f174-2e8f-49dc-b49b-c3899f753f09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/d47e577d192090116b68a7b27e69bca4", "content": "", "creation_timestamp": "2026-01-24T22:42:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1ac8f174-2e8f-49dc-b49b-c3899f753f09/export"/>
    <published>2026-01-24T22:42:37+00:00</published>
  </entry>
</feed>
