<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 06:21:01 +0000</lastBuildDate>
    <item>
      <title>5c33fbc2-5959-490c-9e81-d8a263ae7f7a</title>
      <link>https://db.gcve.eu/sighting/5c33fbc2-5959-490c-9e81-d8a263ae7f7a/export</link>
      <description>{"uuid": "5c33fbc2-5959-490c-9e81-d8a263ae7f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-24)", "content": "", "creation_timestamp": "2025-06-24T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "5c33fbc2-5959-490c-9e81-d8a263ae7f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-24)", "content": "", "creation_timestamp": "2025-06-24T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5c33fbc2-5959-490c-9e81-d8a263ae7f7a/export</guid>
      <pubDate>Tue, 24 Jun 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>de60ec5a-4d70-4961-9db9-b700d53b2b43</title>
      <link>https://db.gcve.eu/sighting/de60ec5a-4d70-4961-9db9-b700d53b2b43/export</link>
      <description>{"uuid": "de60ec5a-4d70-4961-9db9-b700d53b2b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}</description>
      <content:encoded>{"uuid": "de60ec5a-4d70-4961-9db9-b700d53b2b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/de60ec5a-4d70-4961-9db9-b700d53b2b43/export</guid>
      <pubDate>Tue, 19 Aug 2025 13:26:45 +0000</pubDate>
    </item>
    <item>
      <title>93390f38-4e75-42fc-bc8b-2ade1cc40ffa</title>
      <link>https://db.gcve.eu/sighting/93390f38-4e75-42fc-bc8b-2ade1cc40ffa/export</link>
      <description>{"uuid": "93390f38-4e75-42fc-bc8b-2ade1cc40ffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/57662", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aSQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.\nURL\uff1ahttps://github.com/XploitGh0st/CVE-2025-26794-exploit\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-31T04:44:17.000000Z"}</description>
      <content:encoded>{"uuid": "93390f38-4e75-42fc-bc8b-2ade1cc40ffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/57662", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aSQL injection exploit for CVE-2025-26794 in Exim 4.98. Automated data extraction via time-based blind SQLi. For authorized penetration testing only.\nURL\uff1ahttps://github.com/XploitGh0st/CVE-2025-26794-exploit\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-31T04:44:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/93390f38-4e75-42fc-bc8b-2ade1cc40ffa/export</guid>
      <pubDate>Fri, 31 Oct 2025 04:44:17 +0000</pubDate>
    </item>
    <item>
      <title>1a1de737-f0ab-4ae3-9554-a667a6e77258</title>
      <link>https://db.gcve.eu/sighting/1a1de737-f0ab-4ae3-9554-a667a6e77258/export</link>
      <description>{"uuid": "1a1de737-f0ab-4ae3-9554-a667a6e77258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "Telegram/0bRfJSeBlp6vzURpP_3ixCuFmuQ1BEJ7M8KtQr6_hqRGyNY", "content": "", "creation_timestamp": "2025-10-31T09:00:04.000000Z"}</description>
      <content:encoded>{"uuid": "1a1de737-f0ab-4ae3-9554-a667a6e77258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26794", "type": "published-proof-of-concept", "source": "Telegram/0bRfJSeBlp6vzURpP_3ixCuFmuQ1BEJ7M8KtQr6_hqRGyNY", "content": "", "creation_timestamp": "2025-10-31T09:00:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1a1de737-f0ab-4ae3-9554-a667a6e77258/export</guid>
      <pubDate>Fri, 31 Oct 2025 09:00:04 +0000</pubDate>
    </item>
    <item>
      <title>09a3a6f1-786b-416a-a4f3-557685ccfdb0</title>
      <link>https://db.gcve.eu/sighting/09a3a6f1-786b-416a-a4f3-557685ccfdb0/export</link>
      <description>{"uuid": "09a3a6f1-786b-416a-a4f3-557685ccfdb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "09a3a6f1-786b-416a-a4f3-557685ccfdb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/09a3a6f1-786b-416a-a4f3-557685ccfdb0/export</guid>
      <pubDate>Tue, 11 Nov 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>3d8cc569-035b-4043-a2f7-c90f062e7f3e</title>
      <link>https://db.gcve.eu/sighting/3d8cc569-035b-4043-a2f7-c90f062e7f3e/export</link>
      <description>{"uuid": "3d8cc569-035b-4043-a2f7-c90f062e7f3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1729", "content": "", "creation_timestamp": "2026-01-21T04:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "3d8cc569-035b-4043-a2f7-c90f062e7f3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1729", "content": "", "creation_timestamp": "2026-01-21T04:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3d8cc569-035b-4043-a2f7-c90f062e7f3e/export</guid>
      <pubDate>Wed, 21 Jan 2026 04:00:00 +0000</pubDate>
    </item>
    <item>
      <title>35594852-a1fb-4227-8cb4-acc9d5bed348</title>
      <link>https://db.gcve.eu/sighting/35594852-a1fb-4227-8cb4-acc9d5bed348/export</link>
      <description>{"uuid": "35594852-a1fb-4227-8cb4-acc9d5bed348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}</description>
      <content:encoded>{"uuid": "35594852-a1fb-4227-8cb4-acc9d5bed348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/35594852-a1fb-4227-8cb4-acc9d5bed348/export</guid>
      <pubDate>Wed, 21 Jan 2026 21:18:16 +0000</pubDate>
    </item>
    <item>
      <title>f86d38c5-283f-4e02-a0b1-859e490522e0</title>
      <link>https://db.gcve.eu/sighting/f86d38c5-283f-4e02-a0b1-859e490522e0/export</link>
      <description>{"uuid": "f86d38c5-283f-4e02-a0b1-859e490522e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26790", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mdl6omhgqv2j", "content": "", "creation_timestamp": "2026-01-29T16:15:11.219976Z"}</description>
      <content:encoded>{"uuid": "f86d38c5-283f-4e02-a0b1-859e490522e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26790", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mdl6omhgqv2j", "content": "", "creation_timestamp": "2026-01-29T16:15:11.219976Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f86d38c5-283f-4e02-a0b1-859e490522e0/export</guid>
      <pubDate>Thu, 29 Jan 2026 16:15:11 +0000</pubDate>
    </item>
    <item>
      <title>32eed323-a710-4baf-9006-33d35971f302</title>
      <link>https://db.gcve.eu/sighting/32eed323-a710-4baf-9006-33d35971f302/export</link>
      <description>{"uuid": "32eed323-a710-4baf-9006-33d35971f302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1833", "content": "", "creation_timestamp": "2026-04-21T21:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "32eed323-a710-4baf-9006-33d35971f302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26791", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1833", "content": "", "creation_timestamp": "2026-04-21T21:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/32eed323-a710-4baf-9006-33d35971f302/export</guid>
      <pubDate>Tue, 21 Apr 2026 21:00:00 +0000</pubDate>
    </item>
    <item>
      <title>6d66eeb1-3325-4ff1-87c8-5178a9d13d70</title>
      <link>https://db.gcve.eu/sighting/6d66eeb1-3325-4ff1-87c8-5178a9d13d70/export</link>
      <description>{"uuid": "6d66eeb1-3325-4ff1-87c8-5178a9d13d70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-28)", "content": "", "creation_timestamp": "2026-04-28T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "6d66eeb1-3325-4ff1-87c8-5178a9d13d70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26793", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-28)", "content": "", "creation_timestamp": "2026-04-28T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6d66eeb1-3325-4ff1-87c8-5178a9d13d70/export</guid>
      <pubDate>Tue, 28 Apr 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
