<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-01T12:54:40.562647+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/3944c22b-8e66-4653-aaae-74ddb182c18e/export</id>
    <title>3944c22b-8e66-4653-aaae-74ddb182c18e</title>
    <updated>2026-05-01T12:54:40.718729+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3944c22b-8e66-4653-aaae-74ddb182c18e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113982440858731555", "content": "", "creation_timestamp": "2025-02-11T00:33:42.326780Z"}</content>
    <link href="https://db.gcve.eu/sighting/3944c22b-8e66-4653-aaae-74ddb182c18e/export"/>
    <published>2025-02-11T00:33:42.326780+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/906d2664-0e02-4048-8e00-f899550dfd73/export</id>
    <title>906d2664-0e02-4048-8e00-f899550dfd73</title>
    <updated>2026-05-01T12:54:40.718653+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "906d2664-0e02-4048-8e00-f899550dfd73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhuicdxh2y2o", "content": "", "creation_timestamp": "2025-02-11T01:15:48.600590Z"}</content>
    <link href="https://db.gcve.eu/sighting/906d2664-0e02-4048-8e00-f899550dfd73/export"/>
    <published>2025-02-11T01:15:48.600590+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/971f1cf5-433e-4ad2-8467-839d71ebb3b9/export</id>
    <title>971f1cf5-433e-4ad2-8467-839d71ebb3b9</title>
    <updated>2026-05-01T12:54:40.718572+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "971f1cf5-433e-4ad2-8467-839d71ebb3b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "published-proof-of-concept", "source": "Telegram/oYpT9FfnhKDDCRCq96vhDuDPYORP1VikoMTW0WhVgiwG2A0", "content": "", "creation_timestamp": "2025-02-11T02:00:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/971f1cf5-433e-4ad2-8467-839d71ebb3b9/export"/>
    <published>2025-02-11T02:00:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/28c04007-fb38-4045-a423-bd04eaa4c522/export</id>
    <title>28c04007-fb38-4045-a423-bd04eaa4c522</title>
    <updated>2026-05-01T12:54:40.718483+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "28c04007-fb38-4045-a423-bd04eaa4c522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "https://t.me/cvedetector/17635", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1165 - Lumsoft ERP File Upload Unrestricted Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1165 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in Lumsoft ERP 8. Affected is the function DoUpload/DoWebUpload of the file /Api/FileUploadApi.ashx. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:08:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/28c04007-fb38-4045-a423-bd04eaa4c522/export"/>
    <published>2025-02-11T03:08:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/81e97cfe-6f2a-4269-bcaa-4863dd6aab9a/export</id>
    <title>81e97cfe-6f2a-4269-bcaa-4863dd6aab9a</title>
    <updated>2026-05-01T12:54:40.718398+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "81e97cfe-6f2a-4269-bcaa-4863dd6aab9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhusbvauif2m", "content": "", "creation_timestamp": "2025-02-11T04:14:32.532565Z"}</content>
    <link href="https://db.gcve.eu/sighting/81e97cfe-6f2a-4269-bcaa-4863dd6aab9a/export"/>
    <published>2025-02-11T04:14:32.532565+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b529dda2-5ced-49b4-85e5-8b3afb88e9a6/export</id>
    <title>b529dda2-5ced-49b4-85e5-8b3afb88e9a6</title>
    <updated>2026-05-01T12:54:40.718310+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b529dda2-5ced-49b4-85e5-8b3afb88e9a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1165", "type": "seen", "source": "Telegram/N3mDd0OzYAw1p4loOl4KYD7dnm7N3mA-5oGM4gQ63iax_nY7", "content": "", "creation_timestamp": "2025-02-14T10:01:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b529dda2-5ced-49b4-85e5-8b3afb88e9a6/export"/>
    <published>2025-02-14T10:01:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/160b36cb-eaa1-4c64-9624-fc8650a74b57/export</id>
    <title>160b36cb-eaa1-4c64-9624-fc8650a74b57</title>
    <updated>2026-05-01T12:54:40.718220+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "160b36cb-eaa1-4c64-9624-fc8650a74b57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-11651", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m2zw2nafsz2m", "content": "", "creation_timestamp": "2025-10-13T00:04:03.534994Z"}</content>
    <link href="https://db.gcve.eu/sighting/160b36cb-eaa1-4c64-9624-fc8650a74b57/export"/>
    <published>2025-10-13T00:04:03.534994+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/043da2e6-8d83-4fcc-ad31-f818e8ee0444/export</id>
    <title>043da2e6-8d83-4fcc-ad31-f818e8ee0444</title>
    <updated>2026-05-01T12:54:40.718072+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "043da2e6-8d83-4fcc-ad31-f818e8ee0444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-11652", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m32f7f36cy2i", "content": "", "creation_timestamp": "2025-10-13T04:35:08.111466Z"}</content>
    <link href="https://db.gcve.eu/sighting/043da2e6-8d83-4fcc-ad31-f818e8ee0444/export"/>
    <published>2025-10-13T04:35:08.111466+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9644264d-1c1c-40d9-9028-bcba8fcb90e0/export</id>
    <title>9644264d-1c1c-40d9-9028-bcba8fcb90e0</title>
    <updated>2026-05-01T12:54:40.717796+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9644264d-1c1c-40d9-9028-bcba8fcb90e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11652", "type": "seen", "source": "Telegram/R_GxXEeRer5kVi5nLeLcL052GAZFfig-LMnXOUBG_knIQyg", "content": "", "creation_timestamp": "2026-01-08T18:12:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9644264d-1c1c-40d9-9028-bcba8fcb90e0/export"/>
    <published>2026-01-08T18:12:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/20493529-75b5-4c69-857b-e9f94f3897f0/export</id>
    <title>20493529-75b5-4c69-857b-e9f94f3897f0</title>
    <updated>2026-05-01T12:54:40.715270+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "20493529-75b5-4c69-857b-e9f94f3897f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11651", "type": "published-proof-of-concept", "source": "Telegram/WIp-19cFECHu_hwH-OWXRA2nyjK5LkzfngLwe-whBDy50S8", "content": "", "creation_timestamp": "2026-01-08T19:12:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/20493529-75b5-4c69-857b-e9f94f3897f0/export"/>
    <published>2026-01-08T19:12:51+00:00</published>
  </entry>
</feed>
