<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-22T16:30:07.250329+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/2aed6da5-1b4f-428b-86e9-dbf1c1852b35/export</id>
    <title>2aed6da5-1b4f-428b-86e9-dbf1c1852b35</title>
    <updated>2026-05-22T16:30:07.721057+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2aed6da5-1b4f-428b-86e9-dbf1c1852b35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-QRV3-JC3H-F3M6", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8689", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30214\n\ud83d\udd25 CVSS Score: 8 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U)\n\ud83d\udd39 Description: Frappe is a full-stack web application framework. Prior to versions 14.89.0 and 15.51.0, making crafted requests could lead to information disclosure that could further lead to account takeover. Versions 14.89.0 and 15.51.0 fix the issue. There's no workaround to fix this without upgrading.\n\ud83d\udccf Published: 2025-03-25T15:05:42.656Z\n\ud83d\udccf Modified: 2025-03-25T15:05:42.656Z\n\ud83d\udd17 References:\n1. https://github.com/frappe/frappe/security/advisories/GHSA-qrv3-jc3h-f3m6", "creation_timestamp": "2025-03-25T15:24:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2aed6da5-1b4f-428b-86e9-dbf1c1852b35/export"/>
    <published>2025-03-25T15:24:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5f3c0fe8-a51a-41c6-9b19-8d77c5f892a1/export</id>
    <title>5f3c0fe8-a51a-41c6-9b19-8d77c5f892a1</title>
    <updated>2026-05-22T16:30:07.719520+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5f3c0fe8-a51a-41c6-9b19-8d77c5f892a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-QRV3-JC3H-F3M6", "type": "published-proof-of-concept", "source": "Telegram/4yRTt9dy-kSa9hw9IvAX8xqiMQA60h8go96Ck2HC1in5CKw", "content": "", "creation_timestamp": "2025-03-25T17:30:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5f3c0fe8-a51a-41c6-9b19-8d77c5f892a1/export"/>
    <published>2025-03-25T17:30:48+00:00</published>
  </entry>
</feed>
