<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 12:57:12 +0000</lastBuildDate>
    <item>
      <title>47cbb2e7-9654-4ccf-bedb-1a6ae3a01488</title>
      <link>https://db.gcve.eu/sighting/47cbb2e7-9654-4ccf-bedb-1a6ae3a01488/export</link>
      <description>{"uuid": "47cbb2e7-9654-4ccf-bedb-1a6ae3a01488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1107", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhlrzyquxy2u", "content": "", "creation_timestamp": "2025-02-07T14:16:08.820255Z"}</description>
      <content:encoded>{"uuid": "47cbb2e7-9654-4ccf-bedb-1a6ae3a01488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1107", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhlrzyquxy2u", "content": "", "creation_timestamp": "2025-02-07T14:16:08.820255Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/47cbb2e7-9654-4ccf-bedb-1a6ae3a01488/export</guid>
      <pubDate>Fri, 07 Feb 2025 14:16:08 +0000</pubDate>
    </item>
    <item>
      <title>eeddeadd-7acc-4b2a-8461-0b3501c3fe7c</title>
      <link>https://db.gcve.eu/sighting/eeddeadd-7acc-4b2a-8461-0b3501c3fe7c/export</link>
      <description>{"uuid": "eeddeadd-7acc-4b2a-8461-0b3501c3fe7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1107", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113963153430960574", "content": "", "creation_timestamp": "2025-02-07T14:48:40.696430Z"}</description>
      <content:encoded>{"uuid": "eeddeadd-7acc-4b2a-8461-0b3501c3fe7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1107", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113963153430960574", "content": "", "creation_timestamp": "2025-02-07T14:48:40.696430Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/eeddeadd-7acc-4b2a-8461-0b3501c3fe7c/export</guid>
      <pubDate>Fri, 07 Feb 2025 14:48:40 +0000</pubDate>
    </item>
    <item>
      <title>b7683e49-fce9-479c-ad0c-5c6d2103af00</title>
      <link>https://db.gcve.eu/sighting/b7683e49-fce9-479c-ad0c-5c6d2103af00/export</link>
      <description>{"uuid": "b7683e49-fce9-479c-ad0c-5c6d2103af00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1107", "type": "seen", "source": "https://t.me/cvedetector/17491", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1107 - Janto Password Change Encryption Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1107 \nPublished : Feb. 7, 2025, 2:15 p.m. | 54\u00a0minutes ago \nDescription : Unverified password change vulnerability in Janto, versions prior to r12. This could allow an unauthenticated attacker to change another user's password without knowing their current password. To exploit the vulnerability, the attacker must create a specific POST request and send it to the endpoint \u2018/public/cgi/Gateway.php\u2019. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T16:19:41.000000Z"}</description>
      <content:encoded>{"uuid": "b7683e49-fce9-479c-ad0c-5c6d2103af00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1107", "type": "seen", "source": "https://t.me/cvedetector/17491", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1107 - Janto Password Change Encryption Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1107 \nPublished : Feb. 7, 2025, 2:15 p.m. | 54\u00a0minutes ago \nDescription : Unverified password change vulnerability in Janto, versions prior to r12. This could allow an unauthenticated attacker to change another user's password without knowing their current password. To exploit the vulnerability, the attacker must create a specific POST request and send it to the endpoint \u2018/public/cgi/Gateway.php\u2019. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T16:19:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b7683e49-fce9-479c-ad0c-5c6d2103af00/export</guid>
      <pubDate>Fri, 07 Feb 2025 16:19:41 +0000</pubDate>
    </item>
    <item>
      <title>996683b0-dff8-42fa-8260-06557b1249b4</title>
      <link>https://db.gcve.eu/sighting/996683b0-dff8-42fa-8260-06557b1249b4/export</link>
      <description>{"uuid": "996683b0-dff8-42fa-8260-06557b1249b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11077", "type": "seen", "source": "https://sploitus.com/exploit?id=D43364B9-1196-55FE-80AC-9A2006E6D1F8&amp;amp;amp;utm_source=rss&amp;amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-29T12:32:29.000000Z"}</description>
      <content:encoded>{"uuid": "996683b0-dff8-42fa-8260-06557b1249b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11077", "type": "seen", "source": "https://sploitus.com/exploit?id=D43364B9-1196-55FE-80AC-9A2006E6D1F8&amp;amp;amp;utm_source=rss&amp;amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-29T12:32:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/996683b0-dff8-42fa-8260-06557b1249b4/export</guid>
      <pubDate>Mon, 29 Sep 2025 12:32:29 +0000</pubDate>
    </item>
    <item>
      <title>e9f873f2-7591-4a82-9831-9dfa7eacf0a7</title>
      <link>https://db.gcve.eu/sighting/e9f873f2-7591-4a82-9831-9dfa7eacf0a7/export</link>
      <description>{"uuid": "e9f873f2-7591-4a82-9831-9dfa7eacf0a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11077", "type": "published-proof-of-concept", "source": "Telegram/bqxvewZNAlgXGitqNtOcsvttJ2A_p-4JKRZykL6yZkM_19w", "content": "", "creation_timestamp": "2025-09-29T15:00:12.000000Z"}</description>
      <content:encoded>{"uuid": "e9f873f2-7591-4a82-9831-9dfa7eacf0a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11077", "type": "published-proof-of-concept", "source": "Telegram/bqxvewZNAlgXGitqNtOcsvttJ2A_p-4JKRZykL6yZkM_19w", "content": "", "creation_timestamp": "2025-09-29T15:00:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e9f873f2-7591-4a82-9831-9dfa7eacf0a7/export</guid>
      <pubDate>Mon, 29 Sep 2025 15:00:12 +0000</pubDate>
    </item>
    <item>
      <title>ca49bbeb-12e0-4224-81f3-dbe858fc8a98</title>
      <link>https://db.gcve.eu/sighting/ca49bbeb-12e0-4224-81f3-dbe858fc8a98/export</link>
      <description>{"uuid": "ca49bbeb-12e0-4224-81f3-dbe858fc8a98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11077", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m25wrrcy7x2e", "content": "", "creation_timestamp": "2025-10-01T21:02:28.319073Z"}</description>
      <content:encoded>{"uuid": "ca49bbeb-12e0-4224-81f3-dbe858fc8a98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11077", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m25wrrcy7x2e", "content": "", "creation_timestamp": "2025-10-01T21:02:28.319073Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ca49bbeb-12e0-4224-81f3-dbe858fc8a98/export</guid>
      <pubDate>Wed, 01 Oct 2025 21:02:28 +0000</pubDate>
    </item>
    <item>
      <title>6b9d6a56-3daf-400a-b20f-62db51c2619f</title>
      <link>https://db.gcve.eu/sighting/6b9d6a56-3daf-400a-b20f-62db51c2619f/export</link>
      <description>{"uuid": "6b9d6a56-3daf-400a-b20f-62db51c2619f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11072", "type": "seen", "source": "https://gist.github.com/Darkcrai86/c4d44670b29a5ed180178c01985cf62d", "content": "", "creation_timestamp": "2025-11-05T07:41:38.000000Z"}</description>
      <content:encoded>{"uuid": "6b9d6a56-3daf-400a-b20f-62db51c2619f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-11072", "type": "seen", "source": "https://gist.github.com/Darkcrai86/c4d44670b29a5ed180178c01985cf62d", "content": "", "creation_timestamp": "2025-11-05T07:41:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6b9d6a56-3daf-400a-b20f-62db51c2619f/export</guid>
      <pubDate>Wed, 05 Nov 2025 07:41:38 +0000</pubDate>
    </item>
  </channel>
</rss>
