<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 23:52:39 +0000</lastBuildDate>
    <item>
      <title>45a228d2-1d2e-48b9-8f4a-d5d9443f5260</title>
      <link>https://db.gcve.eu/sighting/45a228d2-1d2e-48b9-8f4a-d5d9443f5260/export</link>
      <description>{"uuid": "45a228d2-1d2e-48b9-8f4a-d5d9443f5260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2789", "type": "seen", "source": "https://t.me/cvedetector/22182", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2789 - MultiVendorX Unauthenticated Table Rates Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2789 \nPublished : April 5, 2025, 6:15 a.m. | 19\u00a0minutes ago \nDescription : The MultiVendorX \u2013 Empower Your WooCommerce Store with a Dynamic Multivendor Marketplace \u2013 Build the Next Amazon, eBay, Etsy plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_table_rate_shipping_row function in all versions up to, and including, 4.2.19. This makes it possible for unauthenticated attackers to delete Table Rates that can impact the shipping cost calculations. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-05T09:04:04.000000Z"}</description>
      <content:encoded>{"uuid": "45a228d2-1d2e-48b9-8f4a-d5d9443f5260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2789", "type": "seen", "source": "https://t.me/cvedetector/22182", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2789 - MultiVendorX Unauthenticated Table Rates Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2789 \nPublished : April 5, 2025, 6:15 a.m. | 19\u00a0minutes ago \nDescription : The MultiVendorX \u2013 Empower Your WooCommerce Store with a Dynamic Multivendor Marketplace \u2013 Build the Next Amazon, eBay, Etsy plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_table_rate_shipping_row function in all versions up to, and including, 4.2.19. This makes it possible for unauthenticated attackers to delete Table Rates that can impact the shipping cost calculations. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-05T09:04:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/45a228d2-1d2e-48b9-8f4a-d5d9443f5260/export</guid>
      <pubDate>Sat, 05 Apr 2025 09:04:04 +0000</pubDate>
    </item>
    <item>
      <title>a0064e42-cae0-4311-815d-59f25b9b92da</title>
      <link>https://db.gcve.eu/sighting/a0064e42-cae0-4311-815d-59f25b9b92da/export</link>
      <description>{"uuid": "a0064e42-cae0-4311-815d-59f25b9b92da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2789", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10713", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2789\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The MultiVendorX \u2013 Empower Your WooCommerce Store with a Dynamic Multivendor Marketplace \u2013 Build the Next Amazon, eBay, Etsy plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_table_rate_shipping_row function in all versions up to, and including, 4.2.19. This makes it possible for unauthenticated attackers to delete Table Rates that can impact the shipping cost calculations.\n\ud83d\udccf Published: 2025-04-05T05:32:14.306Z\n\ud83d\udccf Modified: 2025-04-07T14:11:36.041Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/bf4eca37-066f-428c-a4f7-061ce06e1142?source=cve\n2. https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.19/packages/mvx-tablerate/mvx-tablerate.php#L78\n3. https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.19/packages/mvx-tablerate/mvx-tablerate.php#L211", "creation_timestamp": "2025-04-07T14:45:11.000000Z"}</description>
      <content:encoded>{"uuid": "a0064e42-cae0-4311-815d-59f25b9b92da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2789", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10713", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2789\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: The MultiVendorX \u2013 Empower Your WooCommerce Store with a Dynamic Multivendor Marketplace \u2013 Build the Next Amazon, eBay, Etsy plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_table_rate_shipping_row function in all versions up to, and including, 4.2.19. This makes it possible for unauthenticated attackers to delete Table Rates that can impact the shipping cost calculations.\n\ud83d\udccf Published: 2025-04-05T05:32:14.306Z\n\ud83d\udccf Modified: 2025-04-07T14:11:36.041Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/bf4eca37-066f-428c-a4f7-061ce06e1142?source=cve\n2. https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.19/packages/mvx-tablerate/mvx-tablerate.php#L78\n3. https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.19/packages/mvx-tablerate/mvx-tablerate.php#L211", "creation_timestamp": "2025-04-07T14:45:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a0064e42-cae0-4311-815d-59f25b9b92da/export</guid>
      <pubDate>Mon, 07 Apr 2025 14:45:11 +0000</pubDate>
    </item>
    <item>
      <title>ac5445af-d900-4a3e-84e0-66593e774ddf</title>
      <link>https://db.gcve.eu/sighting/ac5445af-d900-4a3e-84e0-66593e774ddf/export</link>
      <description>{"uuid": "ac5445af-d900-4a3e-84e0-66593e774ddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://bsky.app/profile/campuscodi.risky.biz/post/3lmhq7wh5zk2w", "content": "", "creation_timestamp": "2025-04-10T14:38:56.790828Z"}</description>
      <content:encoded>{"uuid": "ac5445af-d900-4a3e-84e0-66593e774ddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://bsky.app/profile/campuscodi.risky.biz/post/3lmhq7wh5zk2w", "content": "", "creation_timestamp": "2025-04-10T14:38:56.790828Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ac5445af-d900-4a3e-84e0-66593e774ddf/export</guid>
      <pubDate>Thu, 10 Apr 2025 14:38:56 +0000</pubDate>
    </item>
    <item>
      <title>840dfe24-4977-4c07-be58-309815df58f3</title>
      <link>https://db.gcve.eu/sighting/840dfe24-4977-4c07-be58-309815df58f3/export</link>
      <description>{"uuid": "840dfe24-4977-4c07-be58-309815df58f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmv5megosj2j", "content": "", "creation_timestamp": "2025-04-15T22:43:11.599912Z"}</description>
      <content:encoded>{"uuid": "840dfe24-4977-4c07-be58-309815df58f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmv5megosj2j", "content": "", "creation_timestamp": "2025-04-15T22:43:11.599912Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/840dfe24-4977-4c07-be58-309815df58f3/export</guid>
      <pubDate>Tue, 15 Apr 2025 22:43:11 +0000</pubDate>
    </item>
    <item>
      <title>72d79ddf-92d5-4f0d-a9ab-eba30b9b7b78</title>
      <link>https://db.gcve.eu/sighting/72d79ddf-92d5-4f0d-a9ab-eba30b9b7b78/export</link>
      <description>{"uuid": "72d79ddf-92d5-4f0d-a9ab-eba30b9b7b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://t.me/cvedetector/23032", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27892 - Shopware SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27892 \nPublished : April 15, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Shopware prior to version 6.5.8.13 is affected by a SQL injection vulnerability in the /api/search/order endpoint. NOTE: this issue exists because of a CVE-2024-22406 and CVE-2024-42357 regression. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T01:49:06.000000Z"}</description>
      <content:encoded>{"uuid": "72d79ddf-92d5-4f0d-a9ab-eba30b9b7b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://t.me/cvedetector/23032", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27892 - Shopware SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27892 \nPublished : April 15, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : Shopware prior to version 6.5.8.13 is affected by a SQL injection vulnerability in the /api/search/order endpoint. NOTE: this issue exists because of a CVE-2024-22406 and CVE-2024-42357 regression. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T01:49:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/72d79ddf-92d5-4f0d-a9ab-eba30b9b7b78/export</guid>
      <pubDate>Wed, 16 Apr 2025 01:49:06 +0000</pubDate>
    </item>
    <item>
      <title>7a860ee4-3915-4d7a-b820-7e3010a5c366</title>
      <link>https://db.gcve.eu/sighting/7a860ee4-3915-4d7a-b820-7e3010a5c366/export</link>
      <description>{"uuid": "7a860ee4-3915-4d7a-b820-7e3010a5c366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12139", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27892\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Shopware prior to version 6.5.8.13 is affected by a SQL injection vulnerability in the /api/search/order endpoint. NOTE: this issue exists because of a CVE-2024-22406 and CVE-2024-42357 regression.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-16T18:32:23.303Z\n\ud83d\udd17 References:\n1. https://github.com/shopware/shopware/security/advisories/GHSA-8g35-7rmw-7f59\n2. https://www.redteam-pentesting.de/en/advisories/rt-sa-2025-001/", "creation_timestamp": "2025-04-16T18:56:18.000000Z"}</description>
      <content:encoded>{"uuid": "7a860ee4-3915-4d7a-b820-7e3010a5c366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12139", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27892\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Shopware prior to version 6.5.8.13 is affected by a SQL injection vulnerability in the /api/search/order endpoint. NOTE: this issue exists because of a CVE-2024-22406 and CVE-2024-42357 regression.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-16T18:32:23.303Z\n\ud83d\udd17 References:\n1. https://github.com/shopware/shopware/security/advisories/GHSA-8g35-7rmw-7f59\n2. https://www.redteam-pentesting.de/en/advisories/rt-sa-2025-001/", "creation_timestamp": "2025-04-16T18:56:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7a860ee4-3915-4d7a-b820-7e3010a5c366/export</guid>
      <pubDate>Wed, 16 Apr 2025 18:56:18 +0000</pubDate>
    </item>
    <item>
      <title>0d64ea96-ab3a-4d76-95a4-a0b7a3238431</title>
      <link>https://db.gcve.eu/sighting/0d64ea96-ab3a-4d76-95a4-a0b7a3238431/export</link>
      <description>{"uuid": "0d64ea96-ab3a-4d76-95a4-a0b7a3238431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-27892.yaml", "content": "", "creation_timestamp": "2025-04-22T12:39:12.000000Z"}</description>
      <content:encoded>{"uuid": "0d64ea96-ab3a-4d76-95a4-a0b7a3238431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-27892.yaml", "content": "", "creation_timestamp": "2025-04-22T12:39:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0d64ea96-ab3a-4d76-95a4-a0b7a3238431/export</guid>
      <pubDate>Tue, 22 Apr 2025 12:39:12 +0000</pubDate>
    </item>
    <item>
      <title>942d7a0b-2000-4bcb-993c-e41da72598cb</title>
      <link>https://db.gcve.eu/sighting/942d7a0b-2000-4bcb-993c-e41da72598cb/export</link>
      <description>{"uuid": "942d7a0b-2000-4bcb-993c-e41da72598cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lnlm6a2lkd2t", "content": "", "creation_timestamp": "2025-04-24T21:02:20.127212Z"}</description>
      <content:encoded>{"uuid": "942d7a0b-2000-4bcb-993c-e41da72598cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27892", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lnlm6a2lkd2t", "content": "", "creation_timestamp": "2025-04-24T21:02:20.127212Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/942d7a0b-2000-4bcb-993c-e41da72598cb/export</guid>
      <pubDate>Thu, 24 Apr 2025 21:02:20 +0000</pubDate>
    </item>
    <item>
      <title>eac025d7-1af6-40b5-86bb-3ac1a0ead72c</title>
      <link>https://db.gcve.eu/sighting/eac025d7-1af6-40b5-86bb-3ac1a0ead72c/export</link>
      <description>{"uuid": "eac025d7-1af6-40b5-86bb-3ac1a0ead72c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27891", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp63whpfze2t", "content": "", "creation_timestamp": "2025-05-14T22:57:27.195554Z"}</description>
      <content:encoded>{"uuid": "eac025d7-1af6-40b5-86bb-3ac1a0ead72c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27891", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp63whpfze2t", "content": "", "creation_timestamp": "2025-05-14T22:57:27.195554Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/eac025d7-1af6-40b5-86bb-3ac1a0ead72c/export</guid>
      <pubDate>Wed, 14 May 2025 22:57:27 +0000</pubDate>
    </item>
    <item>
      <title>e487e643-ea08-476c-b845-509878ad0e33</title>
      <link>https://db.gcve.eu/sighting/e487e643-ea08-476c-b845-509878ad0e33/export</link>
      <description>{"uuid": "e487e643-ea08-476c-b845-509878ad0e33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27891", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16995", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27891\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400. The lack of a length check leads to out-of-bounds reads via malformed NAS packets.\n\ud83d\udccf Published: 2025-05-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-20T14:27:14.444Z\n\ud83d\udd17 References:\n1. https://semiconductor.samsung.com/support/quality-support/product-security-updates/\n2. https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-27891/", "creation_timestamp": "2025-05-20T14:41:01.000000Z"}</description>
      <content:encoded>{"uuid": "e487e643-ea08-476c-b845-509878ad0e33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27891", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16995", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27891\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400. The lack of a length check leads to out-of-bounds reads via malformed NAS packets.\n\ud83d\udccf Published: 2025-05-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-20T14:27:14.444Z\n\ud83d\udd17 References:\n1. https://semiconductor.samsung.com/support/quality-support/product-security-updates/\n2. https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-27891/", "creation_timestamp": "2025-05-20T14:41:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e487e643-ea08-476c-b845-509878ad0e33/export</guid>
      <pubDate>Tue, 20 May 2025 14:41:01 +0000</pubDate>
    </item>
  </channel>
</rss>
