<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 12 May 2026 20:16:14 +0000</lastBuildDate>
    <item>
      <title>4f36b364-95eb-4d01-bd14-01c7951919b8</title>
      <link>https://db.gcve.eu/sighting/4f36b364-95eb-4d01-bd14-01c7951919b8/export</link>
      <description>{"uuid": "4f36b364-95eb-4d01-bd14-01c7951919b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27727", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11185", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27727\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-04-08T17:24:05.243Z\n\ud83d\udccf Modified: 2025-04-09T23:42:04.605Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727", "creation_timestamp": "2025-04-09T23:48:03.000000Z"}</description>
      <content:encoded>{"uuid": "4f36b364-95eb-4d01-bd14-01c7951919b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27727", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11185", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27727\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-04-08T17:24:05.243Z\n\ud83d\udccf Modified: 2025-04-09T23:42:04.605Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727", "creation_timestamp": "2025-04-09T23:48:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4f36b364-95eb-4d01-bd14-01c7951919b8/export</guid>
      <pubDate>Wed, 09 Apr 2025 23:48:03 +0000</pubDate>
    </item>
    <item>
      <title>ab619bd0-89ef-4148-9d42-8d6a0ff7e655</title>
      <link>https://db.gcve.eu/sighting/ab619bd0-89ef-4148-9d42-8d6a0ff7e655/export</link>
      <description>{"uuid": "ab619bd0-89ef-4148-9d42-8d6a0ff7e655", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27727", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/77a1b8aa-f86f-4c74-af5b-7e082c7ae3de", "content": "", "creation_timestamp": "2025-04-10T11:32:21.060085Z"}</description>
      <content:encoded>{"uuid": "ab619bd0-89ef-4148-9d42-8d6a0ff7e655", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27727", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/77a1b8aa-f86f-4c74-af5b-7e082c7ae3de", "content": "", "creation_timestamp": "2025-04-10T11:32:21.060085Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ab619bd0-89ef-4148-9d42-8d6a0ff7e655/export</guid>
      <pubDate>Thu, 10 Apr 2025 11:32:21 +0000</pubDate>
    </item>
    <item>
      <title>08bd8a8e-db54-4c7f-b122-8db3a30e48bc</title>
      <link>https://db.gcve.eu/sighting/08bd8a8e-db54-4c7f-b122-8db3a30e48bc/export</link>
      <description>{"uuid": "08bd8a8e-db54-4c7f-b122-8db3a30e48bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27729", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lmzwe6av4h26", "content": "", "creation_timestamp": "2025-04-17T20:16:39.327642Z"}</description>
      <content:encoded>{"uuid": "08bd8a8e-db54-4c7f-b122-8db3a30e48bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27729", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lmzwe6av4h26", "content": "", "creation_timestamp": "2025-04-17T20:16:39.327642Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/08bd8a8e-db54-4c7f-b122-8db3a30e48bc/export</guid>
      <pubDate>Thu, 17 Apr 2025 20:16:39 +0000</pubDate>
    </item>
    <item>
      <title>7e75898f-92bb-43a9-b417-0d07b22e1349</title>
      <link>https://db.gcve.eu/sighting/7e75898f-92bb-43a9-b417-0d07b22e1349/export</link>
      <description>{"uuid": "7e75898f-92bb-43a9-b417-0d07b22e1349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2772", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114388579201738740", "content": "", "creation_timestamp": "2025-04-23T18:00:02.075155Z"}</description>
      <content:encoded>{"uuid": "7e75898f-92bb-43a9-b417-0d07b22e1349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2772", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114388579201738740", "content": "", "creation_timestamp": "2025-04-23T18:00:02.075155Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7e75898f-92bb-43a9-b417-0d07b22e1349/export</guid>
      <pubDate>Wed, 23 Apr 2025 18:00:02 +0000</pubDate>
    </item>
    <item>
      <title>e30b687d-0690-47ae-90e5-f773542720ac</title>
      <link>https://db.gcve.eu/sighting/e30b687d-0690-47ae-90e5-f773542720ac/export</link>
      <description>{"uuid": "e30b687d-0690-47ae-90e5-f773542720ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2772", "type": "seen", "source": "https://t.me/cvedetector/23599", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2772 - BEC Technologies Router Credentials Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2772 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : BEC Technologies Multiple Routers Insufficiently Protected Credentials Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of BEC Technologies routers. Authentication is not required to exploit this vulnerability.  \n  \nThe specific flaw exists within /cgi-bin/tools_usermanage.asp. The issue results from transmitting a list of users and their credentials to be handled on the client side. An attacker can leverage this vulnerability to disclose transported credentials, leading to further compromise. Was ZDI-CAN-25895. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:16.000000Z"}</description>
      <content:encoded>{"uuid": "e30b687d-0690-47ae-90e5-f773542720ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2772", "type": "seen", "source": "https://t.me/cvedetector/23599", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2772 - BEC Technologies Router Credentials Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2772 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : BEC Technologies Multiple Routers Insufficiently Protected Credentials Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of BEC Technologies routers. Authentication is not required to exploit this vulnerability.  \n  \nThe specific flaw exists within /cgi-bin/tools_usermanage.asp. The issue results from transmitting a list of users and their credentials to be handled on the client side. An attacker can leverage this vulnerability to disclose transported credentials, leading to further compromise. Was ZDI-CAN-25895. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e30b687d-0690-47ae-90e5-f773542720ac/export</guid>
      <pubDate>Wed, 23 Apr 2025 21:10:16 +0000</pubDate>
    </item>
    <item>
      <title>7c91c7a3-9148-40ad-ba76-45e17c3a2da7</title>
      <link>https://db.gcve.eu/sighting/7c91c7a3-9148-40ad-ba76-45e17c3a2da7/export</link>
      <description>{"uuid": "7c91c7a3-9148-40ad-ba76-45e17c3a2da7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27720", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loozcq6f5gh2", "content": "", "creation_timestamp": "2025-05-08T23:16:42.679133Z"}</description>
      <content:encoded>{"uuid": "7c91c7a3-9148-40ad-ba76-45e17c3a2da7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27720", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loozcq6f5gh2", "content": "", "creation_timestamp": "2025-05-08T23:16:42.679133Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7c91c7a3-9148-40ad-ba76-45e17c3a2da7/export</guid>
      <pubDate>Thu, 08 May 2025 23:16:42 +0000</pubDate>
    </item>
    <item>
      <title>282511a7-fcf2-48f7-8109-c73a8cb13ca6</title>
      <link>https://db.gcve.eu/sighting/282511a7-fcf2-48f7-8109-c73a8cb13ca6/export</link>
      <description>{"uuid": "282511a7-fcf2-48f7-8109-c73a8cb13ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27720", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15642", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27720\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to steal credentials.\n\ud83d\udccf Published: 2025-05-08T22:43:28.046Z\n\ud83d\udccf Modified: 2025-05-08T22:43:28.046Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-128-01\n2. https://www.osirix-viewer.com/osirix/osirix-md/\n3. https://www.osirix-viewer.com/about/contact/", "creation_timestamp": "2025-05-08T23:24:06.000000Z"}</description>
      <content:encoded>{"uuid": "282511a7-fcf2-48f7-8109-c73a8cb13ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27720", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15642", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27720\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to steal credentials.\n\ud83d\udccf Published: 2025-05-08T22:43:28.046Z\n\ud83d\udccf Modified: 2025-05-08T22:43:28.046Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-128-01\n2. https://www.osirix-viewer.com/osirix/osirix-md/\n3. https://www.osirix-viewer.com/about/contact/", "creation_timestamp": "2025-05-08T23:24:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/282511a7-fcf2-48f7-8109-c73a8cb13ca6/export</guid>
      <pubDate>Thu, 08 May 2025 23:24:06 +0000</pubDate>
    </item>
    <item>
      <title>773f31eb-6f36-4814-b0a4-81dbbd2d51c9</title>
      <link>https://db.gcve.eu/sighting/773f31eb-6f36-4814-b0a4-81dbbd2d51c9/export</link>
      <description>{"uuid": "773f31eb-6f36-4814-b0a4-81dbbd2d51c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27720", "type": "seen", "source": "https://t.me/cvedetector/24884", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27720 - Pixmeo Osirix MD Unencrypted Credential Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27720 \nPublished : May 8, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to steal credentials. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T01:59:41.000000Z"}</description>
      <content:encoded>{"uuid": "773f31eb-6f36-4814-b0a4-81dbbd2d51c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27720", "type": "seen", "source": "https://t.me/cvedetector/24884", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27720 - Pixmeo Osirix MD Unencrypted Credential Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27720 \nPublished : May 8, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to steal credentials. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T01:59:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/773f31eb-6f36-4814-b0a4-81dbbd2d51c9/export</guid>
      <pubDate>Fri, 09 May 2025 01:59:41 +0000</pubDate>
    </item>
    <item>
      <title>4f16010e-e6ad-43df-830e-57f5c7c8c925</title>
      <link>https://db.gcve.eu/sighting/4f16010e-e6ad-43df-830e-57f5c7c8c925/export</link>
      <description>{"uuid": "4f16010e-e6ad-43df-830e-57f5c7c8c925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27724", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3luzwc47lt52v", "content": "", "creation_timestamp": "2025-07-28T15:37:03.514045Z"}</description>
      <content:encoded>{"uuid": "4f16010e-e6ad-43df-830e-57f5c7c8c925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27724", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3luzwc47lt52v", "content": "", "creation_timestamp": "2025-07-28T15:37:03.514045Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4f16010e-e6ad-43df-830e-57f5c7c8c925/export</guid>
      <pubDate>Mon, 28 Jul 2025 15:37:03 +0000</pubDate>
    </item>
    <item>
      <title>4086997d-b217-4b04-b9f3-b0528118ef5b</title>
      <link>https://db.gcve.eu/sighting/4086997d-b217-4b04-b9f3-b0528118ef5b/export</link>
      <description>{"uuid": "4086997d-b217-4b04-b9f3-b0528118ef5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27724", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3luzxmxnto72j", "content": "", "creation_timestamp": "2025-07-28T16:01:01.088348Z"}</description>
      <content:encoded>{"uuid": "4086997d-b217-4b04-b9f3-b0528118ef5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27724", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3luzxmxnto72j", "content": "", "creation_timestamp": "2025-07-28T16:01:01.088348Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4086997d-b217-4b04-b9f3-b0528118ef5b/export</guid>
      <pubDate>Mon, 28 Jul 2025 16:01:01 +0000</pubDate>
    </item>
  </channel>
</rss>
