<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-12T22:18:40.095390+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/e6bc7143-8827-4bda-b855-e277146fe5e8/export</id>
    <title>e6bc7143-8827-4bda-b855-e277146fe5e8</title>
    <updated>2026-05-12T22:18:40.330442+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e6bc7143-8827-4bda-b855-e277146fe5e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2215", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7253", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2215\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in Doufox up to 0.2.0. Affected by this vulnerability is an unknown functionality of the file /?s=doudou&amp;amp;c=file&amp;amp;a=list. The manipulation of the argument dir leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-11T23:31:05.962Z\n\ud83d\udccf Modified: 2025-03-11T23:31:05.962Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299287\n2. https://vuldb.com/?ctiid.299287\n3. https://vuldb.com/?submit.512316\n4. https://github.com/sate10/11/issues/1", "creation_timestamp": "2025-03-11T23:40:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e6bc7143-8827-4bda-b855-e277146fe5e8/export"/>
    <published>2025-03-11T23:40:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/536b20f1-eb28-4545-a247-be3118c0f40e/export</id>
    <title>536b20f1-eb28-4545-a247-be3118c0f40e</title>
    <updated>2026-05-12T22:18:40.330361+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "536b20f1-eb28-4545-a247-be3118c0f40e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/17763", "content": "\ud83d\udea8CVE-2025-22157: PrivEsc (Privilege Escalation) in Jira Core Data Center\n\nFOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJKSVJBIg%3D%3D\n\nFOFA Query: app=\"JIRA\"\n\nGitHub Advisory: https://github.com/advisories/GHSA-352j-376q-2pmc\n\nResults: 94,656 results", "creation_timestamp": "2025-06-02T17:04:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/536b20f1-eb28-4545-a247-be3118c0f40e/export"/>
    <published>2025-06-02T17:04:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3c558f70-9dfe-4d52-a28f-bc688aabf77e/export</id>
    <title>3c558f70-9dfe-4d52-a28f-bc688aabf77e</title>
    <updated>2026-05-12T22:18:40.330283+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3c558f70-9dfe-4d52-a28f-bc688aabf77e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114614853194971118", "content": "", "creation_timestamp": "2025-06-02T17:04:29.545828Z"}</content>
    <link href="https://db.gcve.eu/sighting/3c558f70-9dfe-4d52-a28f-bc688aabf77e/export"/>
    <published>2025-06-02T17:04:29.545828+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/96e7e20a-bf7b-4ca7-b4a5-c6a4bb064459/export</id>
    <title>96e7e20a-bf7b-4ca7-b4a5-c6a4bb064459</title>
    <updated>2026-05-12T22:18:40.330205+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "96e7e20a-bf7b-4ca7-b4a5-c6a4bb064459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.com/post/3lqnb2uw6ts2s", "content": "", "creation_timestamp": "2025-06-02T17:04:30.021474Z"}</content>
    <link href="https://db.gcve.eu/sighting/96e7e20a-bf7b-4ca7-b4a5-c6a4bb064459/export"/>
    <published>2025-06-02T17:04:30.021474+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/777d8394-ef61-49a4-8bcc-dab11dec85f9/export</id>
    <title>777d8394-ef61-49a4-8bcc-dab11dec85f9</title>
    <updated>2026-05-12T22:18:40.330113+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "777d8394-ef61-49a4-8bcc-dab11dec85f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "https://t.me/DarkWebInformer_News/5974", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer - Cyber Threat Intelligence\nTitle: CVE-2025-22157: Privilege Escalation Vulnerability in Jira Core Data Center\nLink: https://darkwebinformer.com/cve-2025-22157-privilege-escalation-vulnerability-in-jira-core-data-center/", "creation_timestamp": "2025-07-02T00:06:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/777d8394-ef61-49a4-8bcc-dab11dec85f9/export"/>
    <published>2025-07-02T00:06:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2583ce0f-feb9-4a71-922a-a220a09d0dab/export</id>
    <title>2583ce0f-feb9-4a71-922a-a220a09d0dab</title>
    <updated>2026-05-12T22:18:40.330019+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2583ce0f-feb9-4a71-922a-a220a09d0dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/18707", "content": "\ud83d\udea8CVE-2025-22157: Privilege Escalation Vulnerability in Jira Core Data Center\n\nhttps://darkwebinformer.com/cve-2025-22157-privilege-escalation-vulnerability-in-jira-core-data-center/\n\n\u2014\u2014\u2014\u2014\u2014\u2014\n\nFollow @zoomeye_team's official Twitter/X account and send the message \u201cDark Web Informer\u201d via DM to receive an extra 15-day membership.", "creation_timestamp": "2025-07-02T00:06:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2583ce0f-feb9-4a71-922a-a220a09d0dab/export"/>
    <published>2025-07-02T00:06:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c3c8b12d-f745-429c-ab36-3f74c4ec1357/export</id>
    <title>c3c8b12d-f745-429c-ab36-3f74c4ec1357</title>
    <updated>2026-05-12T22:18:40.329932+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c3c8b12d-f745-429c-ab36-3f74c4ec1357", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-22157", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114780719785808328", "content": "", "creation_timestamp": "2025-07-02T00:06:32.236076Z"}</content>
    <link href="https://db.gcve.eu/sighting/c3c8b12d-f745-429c-ab36-3f74c4ec1357/export"/>
    <published>2025-07-02T00:06:32.236076+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ddb200e7-3f0c-4df5-b61b-529a336dc4db/export</id>
    <title>ddb200e7-3f0c-4df5-b61b-529a336dc4db</title>
    <updated>2026-05-12T22:18:40.329840+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ddb200e7-3f0c-4df5-b61b-529a336dc4db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.com/post/3lsww6dv2mc25", "content": "", "creation_timestamp": "2025-07-02T00:06:39.062691Z"}</content>
    <link href="https://db.gcve.eu/sighting/ddb200e7-3f0c-4df5-b61b-529a336dc4db/export"/>
    <published>2025-07-02T00:06:39.062691+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1882542b-09db-4cd4-ac3b-613dd594b222/export</id>
    <title>1882542b-09db-4cd4-ac3b-613dd594b222</title>
    <updated>2026-05-12T22:18:40.329722+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1882542b-09db-4cd4-ac3b-613dd594b222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-06T13:54:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1882542b-09db-4cd4-ac3b-613dd594b222/export"/>
    <published>2025-08-06T13:54:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/61d357ea-e49b-44f4-b71c-89e8113f6c6f/export</id>
    <title>61d357ea-e49b-44f4-b71c-89e8113f6c6f</title>
    <updated>2026-05-12T22:18:40.328243+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "61d357ea-e49b-44f4-b71c-89e8113f6c6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22157", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-14T11:44:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/61d357ea-e49b-44f4-b71c-89e8113f6c6f/export"/>
    <published>2025-08-14T11:44:23+00:00</published>
  </entry>
</feed>
