<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T08:28:14.393190+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/39ad5b4d-75f8-499b-8f82-ee6fcaec4caa/export</id>
    <title>39ad5b4d-75f8-499b-8f82-ee6fcaec4caa</title>
    <updated>2026-05-01T08:28:14.797244+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "39ad5b4d-75f8-499b-8f82-ee6fcaec4caa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0909", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-064/", "content": "", "creation_timestamp": "2025-01-31T05:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/39ad5b4d-75f8-499b-8f82-ee6fcaec4caa/export"/>
    <published>2025-01-31T05:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7e1757ae-3c44-400f-bd9b-07dafd9aa0c8/export</id>
    <title>7e1757ae-3c44-400f-bd9b-07dafd9aa0c8</title>
    <updated>2026-05-01T08:28:14.797189+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7e1757ae-3c44-400f-bd9b-07dafd9aa0c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0909", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwi2ecozc2a", "content": "", "creation_timestamp": "2025-02-11T20:16:40.407854Z"}</content>
    <link href="https://db.gcve.eu/sighting/7e1757ae-3c44-400f-bd9b-07dafd9aa0c8/export"/>
    <published>2025-02-11T20:16:40.407854+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a70a9afb-06ea-4c1e-af6e-707aab1c5a8e/export</id>
    <title>a70a9afb-06ea-4c1e-af6e-707aab1c5a8e</title>
    <updated>2026-05-01T08:28:14.797105+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a70a9afb-06ea-4c1e-af6e-707aab1c5a8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0909", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3929", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0909\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T20:15:35.500\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://www.zerodayinitiative.com/advisories/ZDI-25-064/", "creation_timestamp": "2025-02-11T21:13:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a70a9afb-06ea-4c1e-af6e-707aab1c5a8e/export"/>
    <published>2025-02-11T21:13:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/48b5e108-9735-49cd-8bf3-7ce6dc1d1389/export</id>
    <title>48b5e108-9735-49cd-8bf3-7ce6dc1d1389</title>
    <updated>2026-05-01T08:28:14.795905+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "48b5e108-9735-49cd-8bf3-7ce6dc1d1389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0909", "type": "seen", "source": "https://t.me/cvedetector/17766", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0909 - PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-0909 \nPublished : Feb. 11, 2025, 8:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  \n  \nThe specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25678. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T00:04:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/48b5e108-9735-49cd-8bf3-7ce6dc1d1389/export"/>
    <published>2025-02-12T00:04:22+00:00</published>
  </entry>
</feed>
