<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-13T12:36:34.585076+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/631bce40-fca7-4c3b-a702-ef42e2da2621/export</id>
    <title>631bce40-fca7-4c3b-a702-ef42e2da2621</title>
    <updated>2026-05-13T12:36:34.791278+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "631bce40-fca7-4c3b-a702-ef42e2da2621", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21416", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114428641966166283", "content": "", "creation_timestamp": "2025-04-30T19:48:32.789804Z"}</content>
    <link href="https://db.gcve.eu/sighting/631bce40-fca7-4c3b-a702-ef42e2da2621/export"/>
    <published>2025-04-30T19:48:32.789804+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/aed75c15-5e6a-4374-a36a-77dd8a39a5e2/export</id>
    <title>aed75c15-5e6a-4374-a36a-77dd8a39a5e2</title>
    <updated>2026-05-13T12:36:34.791226+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "aed75c15-5e6a-4374-a36a-77dd8a39a5e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21416", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2n7embva2h", "content": "", "creation_timestamp": "2025-04-30T20:30:46.407642Z"}</content>
    <link href="https://db.gcve.eu/sighting/aed75c15-5e6a-4374-a36a-77dd8a39a5e2/export"/>
    <published>2025-04-30T20:30:46.407642+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f54fbbe8-e858-4dbd-a41d-9381522c6992/export</id>
    <title>f54fbbe8-e858-4dbd-a41d-9381522c6992</title>
    <updated>2026-05-13T12:36:34.791149+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f54fbbe8-e858-4dbd-a41d-9381522c6992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21416", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14423", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21416\n\ud83d\udd25 CVSS Score: 8.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C)\n\ud83d\udd39 Description: Missing authorization in Azure Virtual Desktop allows an authorized attacker to elevate privileges over a network.\n\ud83d\udccf Published: 2025-04-30T17:14:53.010Z\n\ud83d\udccf Modified: 2025-05-02T03:55:26.547Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21416", "creation_timestamp": "2025-05-02T04:15:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f54fbbe8-e858-4dbd-a41d-9381522c6992/export"/>
    <published>2025-05-02T04:15:33+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9c3c93d0-e372-442b-b021-1181100d8d06/export</id>
    <title>9c3c93d0-e372-442b-b021-1181100d8d06</title>
    <updated>2026-05-13T12:36:34.791052+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9c3c93d0-e372-442b-b021-1181100d8d06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21418", "type": "exploited", "source": "https://t.me/true_secator/7032", "content": "Microsoft \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u043c\u0430\u0439\u0441\u043a\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f PatchTuesday \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 78 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\u00a0\u0432\u043e \u0432\u0441\u0435\u0439 \u043b\u0438\u043d\u0435\u0439\u043a\u0435 \u0441\u0432\u043e\u0435\u0433\u043e \u041f\u041e, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 5 0-day, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u043b\u0438\u0441\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\n11 \u0438\u0437 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c, 66 - \u043a \u0432\u0430\u0436\u043d\u044b\u043c \u0438 \u043b\u0438\u0448\u044c \u043e\u0434\u043d\u0430 \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438. 28 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE , 21 - EoP, \u0430 16 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438. \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0421\u0440\u0435\u0434\u0438 \u043d\u0443\u043b\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445:\n\n- CVE-2025-30397\u00a0(CVSS: 7,5): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 Scripting Engine;\n\n\u0412 Action1 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443 \u0438\u043b\u0438 \u0441\u043a\u0440\u0438\u043f\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432\u044b\u0439 \u0434\u0432\u0438\u0436\u043e\u043a \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u0438\u043f\u044b \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u0432, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 RCE \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.\n\n\u0415\u0441\u043b\u0438 \u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0435\u0441\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u0432\u044b\u0442\u0435\u043a\u0430\u044e\u0449\u0438\u043c\u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438.\n\n- CVE-2025-30400\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0430\u0437\u043e\u0432\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Microsoft Desktop Window Manager (DWM), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\nCVE-2025-30400 - \u044d\u0442\u043e \u0442\u0440\u0435\u0442\u044c\u044f EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 DWM Core Library, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 2023 \u0433\u043e\u0434\u0430. \n\n\u0413\u043e\u0434 \u043d\u0430\u0437\u0430\u0434 Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2024-30051, \u043a\u043e\u0442\u043e\u0440\u0430\u044f, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e QakBot (Qwaking Mantis).\n\n\u0413\u043e\u0434\u043e\u043c \u0440\u0430\u043d\u0435\u0435 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c CVE-2023-36033.\n\n- CVE-2025-32701\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u043e\u0431\u0449\u0435\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0436\u0443\u0440\u043d\u0430\u043b\u0430 Windows (CLFS), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\n- CVE-2025-32706\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows Common Log, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\n\u041e\u0431\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u0435\u0434\u044c\u043c\u0443\u044e \u0438 \u0432\u043e\u0441\u044c\u043c\u0443\u044e EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 CLFS \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0435\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0441 2022 \u0433\u043e\u0434\u0430.\n\n\u0411\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u043c\u0435\u0441\u044f\u0446 \u043d\u0430\u0437\u0430\u0434 \u0434\u0440\u0443\u0433\u0430\u044f CVE-2025-29824 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 \u0421\u0428\u0410, \u0412\u0435\u043d\u0435\u0441\u0443\u044d\u043b\u0435, \u0418\u0441\u043f\u0430\u043d\u0438\u0438 \u0438 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0431\u0430\u043d\u0434\u043e\u0439 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 Play.\n\n- CVE-2025-32709\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0432\u0441\u043f\u043e\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Windows \u0434\u043b\u044f WinSock, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP.\n\n\u0410\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u043e, CVE-2025-32709 - \u044d\u0442\u043e \u0442\u0440\u0435\u0442\u044c\u044f EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 Ancillary Function Driver for WinSock, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0433\u043e\u0434\u0430 \u043f\u043e\u0441\u043b\u0435 CVE-2024-38193 (\u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b Lazarus) \u0438 CVE-2025-21418.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0435\u0440\u0432\u044b\u0445 \u0442\u0440\u0435\u0445 \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Microsoft, CVE-2025-32706 - \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Google Threat Intelligence Group \u0438 CrowdStrike Advanced Research Team, \u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f - \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u043c\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e.\n\n\u041d\u043e\u0432\u044b\u0439 Patch Tuesday \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f EoP-\u043e\u0448\u0438\u0431\u043a\u0438 \u0432 Microsoft Defender \u0434\u043b\u044f Endpoint \u0434\u043b\u044f Linux (CVE-2025-26684, CVSS: 6,7), \u043a\u043e\u0442\u043e\u0440\u0430\u044f  \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438. \u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Stratascale.\n\n\u0414\u0440\u0443\u0433\u0438\u043c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u043c \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0437\u0432\u0430\u0442\u044c CVE-2025-26685 (CVSS: 6,5) \u0432 Microsoft Defender for Identity, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0447\u0435\u0440\u0435\u0437 \u0441\u043e\u0441\u0435\u0434\u043d\u044e\u044e \u0441\u0435\u0442\u044c.\n\n\u0418, \u043d\u0430\u043a\u043e\u043d\u0435\u0446, \u043d\u0435\u043b\u044c\u0437\u044f \u043d\u0435 \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044c \u043f\u0440\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441 CVSS: 10,0 - CVE-2025-29813, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a EoP \u0432 Azure DevOps Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043f\u043e \u0441\u0435\u0442\u0438.\n\nMicrosoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a, \u0432\u043c\u0435\u0448\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f.", "creation_timestamp": "2025-05-14T19:14:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9c3c93d0-e372-442b-b021-1181100d8d06/export"/>
    <published>2025-05-14T19:14:33+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f4d9117c-c3d0-480a-b5b4-cb3eee541a70/export</id>
    <title>f4d9117c-c3d0-480a-b5b4-cb3eee541a70</title>
    <updated>2026-05-13T12:36:34.790999+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f4d9117c-c3d0-480a-b5b4-cb3eee541a70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21418", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lpub6swxgm2t", "content": "", "creation_timestamp": "2025-05-23T18:30:08.603427Z"}</content>
    <link href="https://db.gcve.eu/sighting/f4d9117c-c3d0-480a-b5b4-cb3eee541a70/export"/>
    <published>2025-05-23T18:30:08.603427+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3266da2e-ee55-41be-a06d-8ad2e320a046/export</id>
    <title>3266da2e-ee55-41be-a06d-8ad2e320a046</title>
    <updated>2026-05-13T12:36:34.790934+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3266da2e-ee55-41be-a06d-8ad2e320a046", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2141", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/20000", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2141\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM System Storage Virtualization Engine TS7700 3957 VED R5.4 8.54.2.17, R6.0 8.60.0.115, 3948 VED R5.4 8.54.2.17, R6.0 8.60.0.115, and 3948 VEF R6.0 8.60.0.115\u00a0is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-07-01T01:01:51.136Z\n\ud83d\udccf Modified: 2025-07-01T01:01:51.136Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7238556", "creation_timestamp": "2025-07-01T02:07:48.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3266da2e-ee55-41be-a06d-8ad2e320a046/export"/>
    <published>2025-07-01T02:07:48+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6224b736-151b-4ce8-a415-d5c7769fbb21/export</id>
    <title>6224b736-151b-4ce8-a415-d5c7769fbb21</title>
    <updated>2026-05-13T12:36:34.790879+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6224b736-151b-4ce8-a415-d5c7769fbb21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2141", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsuu667vha2s", "content": "", "creation_timestamp": "2025-07-01T04:25:21.164163Z"}</content>
    <link href="https://db.gcve.eu/sighting/6224b736-151b-4ce8-a415-d5c7769fbb21/export"/>
    <published>2025-07-01T04:25:21.164163+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/764d686e-473e-4d7d-94f9-1e4575e0be01/export</id>
    <title>764d686e-473e-4d7d-94f9-1e4575e0be01</title>
    <updated>2026-05-13T12:36:34.790817+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "764d686e-473e-4d7d-94f9-1e4575e0be01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21418", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/764d686e-473e-4d7d-94f9-1e4575e0be01/export"/>
    <published>2025-08-25T13:32:05+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0ea67853-d600-4972-82ba-9d57045a0aba/export</id>
    <title>0ea67853-d600-4972-82ba-9d57045a0aba</title>
    <updated>2026-05-13T12:36:34.790734+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0ea67853-d600-4972-82ba-9d57045a0aba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21418", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/987ef681-cfb2-4843-adf1-57fcda547fa0", "content": "", "creation_timestamp": "2026-02-02T12:26:14.339310Z"}</content>
    <link href="https://db.gcve.eu/sighting/0ea67853-d600-4972-82ba-9d57045a0aba/export"/>
    <published>2026-02-02T12:26:14.339310+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1f74a9b8-f0a3-46fa-9aa7-8374e646c27e/export</id>
    <title>1f74a9b8-f0a3-46fa-9aa7-8374e646c27e</title>
    <updated>2026-05-13T12:36:34.789654+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1f74a9b8-f0a3-46fa-9aa7-8374e646c27e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21418", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/987ef681-cfb2-4843-adf1-57fcda547fa0", "content": "", "creation_timestamp": "2026-02-02T12:26:14.339310Z"}</content>
    <link href="https://db.gcve.eu/sighting/1f74a9b8-f0a3-46fa-9aa7-8374e646c27e/export"/>
    <published>2026-02-02T12:26:14.339310+00:00</published>
  </entry>
</feed>
