<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 15:27:31 +0000</lastBuildDate>
    <item>
      <title>6ac71a61-34c5-47fd-95d5-a5225b5d4562</title>
      <link>https://db.gcve.eu/sighting/6ac71a61-34c5-47fd-95d5-a5225b5d4562/export</link>
      <description>{"uuid": "6ac71a61-34c5-47fd-95d5-a5225b5d4562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27416", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6026", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27416\n\ud83d\udd25 CVSS Score: 5.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U)\n\ud83d\udd39 Description: Scratch-Coding-Hut.github.io is the website for Coding Hut. The website as of 28 February 2025 contained a sign in with scratch username and password form. Any user who used the sign in page would be susceptible to any other user signing into their account. As of time of publication, a fix is not available but work on a fix is underway. As a workaround, users should avoid signing in.\n\ud83d\udccf Published: 2025-03-01T00:10:29.184Z\n\ud83d\udccf Modified: 2025-03-01T00:10:29.184Z\n\ud83d\udd17 References:\n1. https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/security/advisories/GHSA-xx32-r9wr-whff\n2. https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/issues/3", "creation_timestamp": "2025-03-01T00:27:23.000000Z"}</description>
      <content:encoded>{"uuid": "6ac71a61-34c5-47fd-95d5-a5225b5d4562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27416", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6026", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27416\n\ud83d\udd25 CVSS Score: 5.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U)\n\ud83d\udd39 Description: Scratch-Coding-Hut.github.io is the website for Coding Hut. The website as of 28 February 2025 contained a sign in with scratch username and password form. Any user who used the sign in page would be susceptible to any other user signing into their account. As of time of publication, a fix is not available but work on a fix is underway. As a workaround, users should avoid signing in.\n\ud83d\udccf Published: 2025-03-01T00:10:29.184Z\n\ud83d\udccf Modified: 2025-03-01T00:10:29.184Z\n\ud83d\udd17 References:\n1. https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/security/advisories/GHSA-xx32-r9wr-whff\n2. https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/issues/3", "creation_timestamp": "2025-03-01T00:27:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6ac71a61-34c5-47fd-95d5-a5225b5d4562/export</guid>
      <pubDate>Sat, 01 Mar 2025 00:27:23 +0000</pubDate>
    </item>
    <item>
      <title>0eb604c1-35ac-4f18-997e-7ad4da40a362</title>
      <link>https://db.gcve.eu/sighting/0eb604c1-35ac-4f18-997e-7ad4da40a362/export</link>
      <description>{"uuid": "0eb604c1-35ac-4f18-997e-7ad4da40a362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27416", "type": "seen", "source": "https://t.me/cvedetector/19198", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27416 - Coding Hut Scratch Sign-in Account Takeover Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27416 \nPublished : March 1, 2025, 1:15 a.m. | 1\u00a0hour, 26\u00a0minutes ago \nDescription : Scratch-Coding-Hut.github.io is the website for Coding Hut. The website as of 28 February 2025 contained a sign in with scratch username and password form. Any user who used the sign in page would be susceptible to any other user signing into their account. As of time of publication, a fix is not available but work on a fix is underway. As a workaround, users should avoid signing in. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T03:54:07.000000Z"}</description>
      <content:encoded>{"uuid": "0eb604c1-35ac-4f18-997e-7ad4da40a362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27416", "type": "seen", "source": "https://t.me/cvedetector/19198", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27416 - Coding Hut Scratch Sign-in Account Takeover Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27416 \nPublished : March 1, 2025, 1:15 a.m. | 1\u00a0hour, 26\u00a0minutes ago \nDescription : Scratch-Coding-Hut.github.io is the website for Coding Hut. The website as of 28 February 2025 contained a sign in with scratch username and password form. Any user who used the sign in page would be susceptible to any other user signing into their account. As of time of publication, a fix is not available but work on a fix is underway. As a workaround, users should avoid signing in. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T03:54:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0eb604c1-35ac-4f18-997e-7ad4da40a362/export</guid>
      <pubDate>Sat, 01 Mar 2025 03:54:07 +0000</pubDate>
    </item>
  </channel>
</rss>
