<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T22:53:11.515220+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/112b4e38-ba0a-4f6c-9a37-d91d4147b93b/export</id>
    <title>112b4e38-ba0a-4f6c-9a37-d91d4147b93b</title>
    <updated>2026-05-05T22:53:11.824373+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "112b4e38-ba0a-4f6c-9a37-d91d4147b93b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-R5JX-GQFH-5PMR", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/134", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-r5jx-gqfh-5pmr\n\ud83d\udd17 Aliases: CVE-2025-0223\n\ud83d\udd39 Details: A vulnerability was found in IObit Protected Folder up to 13.6.0.5. It has been classified as problematic. Affected is the function 0x8001E000/0x8001E00C/0x8001E004/0x8001E010 in the library IURegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udd22 Severity: CVSS_V3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, CVSS_V4: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\n\ud83d\uddd3\ufe0f Modified: 2025-01-05T18:30:35Z\n\ud83d\uddd3\ufe0f Published: 2025-01-05T18:30:35Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-404\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-0223\n2. https://shareforall.notion.site/IOBit-Uninstaller-IURegistryFilter-0x8001E000-NP-OS-1526043bb1e80e482e0e3c9b22b58d0\n3. https://vuldb.com/?ctiid.290202\n4. https://vuldb.com/?id.290202\n5. https://vuldb.com/?submit.466963", "creation_timestamp": "2025-01-05T18:40:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/112b4e38-ba0a-4f6c-9a37-d91d4147b93b/export"/>
    <published>2025-01-05T18:40:41+00:00</published>
  </entry>
</feed>
