<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 21 May 2026 19:11:45 +0000</lastBuildDate>
    <item>
      <title>407ad0d9-7923-418d-96d0-14db4597d63c</title>
      <link>https://db.gcve.eu/sighting/407ad0d9-7923-418d-96d0-14db4597d63c/export</link>
      <description>{"uuid": "407ad0d9-7923-418d-96d0-14db4597d63c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16232", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30384\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:44.963Z\n\ud83d\udccf Modified: 2025-05-13T20:13:57.820Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384", "creation_timestamp": "2025-05-13T20:31:12.000000Z"}</description>
      <content:encoded>{"uuid": "407ad0d9-7923-418d-96d0-14db4597d63c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16232", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30384\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:44.963Z\n\ud83d\udccf Modified: 2025-05-13T20:13:57.820Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384", "creation_timestamp": "2025-05-13T20:31:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/407ad0d9-7923-418d-96d0-14db4597d63c/export</guid>
      <pubDate>Tue, 13 May 2025 20:31:12 +0000</pubDate>
    </item>
    <item>
      <title>b8acf0c8-b11f-48a0-9f2e-9809d6a822da</title>
      <link>https://db.gcve.eu/sighting/b8acf0c8-b11f-48a0-9f2e-9809d6a822da/export</link>
      <description>{"uuid": "b8acf0c8-b11f-48a0-9f2e-9809d6a822da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30386", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16233", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30386\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:45.977Z\n\ud83d\udccf Modified: 2025-05-13T20:13:49.720Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30386", "creation_timestamp": "2025-05-13T20:31:16.000000Z"}</description>
      <content:encoded>{"uuid": "b8acf0c8-b11f-48a0-9f2e-9809d6a822da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30386", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16233", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30386\n\ud83d\udd25 CVSS Score: 8.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:45.977Z\n\ud83d\udccf Modified: 2025-05-13T20:13:49.720Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30386", "creation_timestamp": "2025-05-13T20:31:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b8acf0c8-b11f-48a0-9f2e-9809d6a822da/export</guid>
      <pubDate>Tue, 13 May 2025 20:31:16 +0000</pubDate>
    </item>
    <item>
      <title>30ae533b-6ef3-493a-b0b0-46e38b062a4f</title>
      <link>https://db.gcve.eu/sighting/30ae533b-6ef3-493a-b0b0-46e38b062a4f/export</link>
      <description>{"uuid": "30ae533b-6ef3-493a-b0b0-46e38b062a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30387", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16234", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30387\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:46.604Z\n\ud83d\udccf Modified: 2025-05-13T20:13:41.235Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30387", "creation_timestamp": "2025-05-13T20:31:17.000000Z"}</description>
      <content:encoded>{"uuid": "30ae533b-6ef3-493a-b0b0-46e38b062a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30387", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16234", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30387\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network.\n\ud83d\udccf Published: 2025-05-13T16:58:46.604Z\n\ud83d\udccf Modified: 2025-05-13T20:13:41.235Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30387", "creation_timestamp": "2025-05-13T20:31:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/30ae533b-6ef3-493a-b0b0-46e38b062a4f/export</guid>
      <pubDate>Tue, 13 May 2025 20:31:17 +0000</pubDate>
    </item>
    <item>
      <title>94bf8402-f425-43a8-81b3-61ca1bd4695f</title>
      <link>https://db.gcve.eu/sighting/94bf8402-f425-43a8-81b3-61ca1bd4695f/export</link>
      <description>{"uuid": "94bf8402-f425-43a8-81b3-61ca1bd4695f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16266", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30388\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:59:10.344Z\n\ud83d\udccf Modified: 2025-05-13T21:40:36.120Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388", "creation_timestamp": "2025-05-13T22:30:57.000000Z"}</description>
      <content:encoded>{"uuid": "94bf8402-f425-43a8-81b3-61ca1bd4695f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16266", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30388\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:59:10.344Z\n\ud83d\udccf Modified: 2025-05-13T21:40:36.120Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388", "creation_timestamp": "2025-05-13T22:30:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/94bf8402-f425-43a8-81b3-61ca1bd4695f/export</guid>
      <pubDate>Tue, 13 May 2025 22:30:57 +0000</pubDate>
    </item>
    <item>
      <title>2518cd56-b654-46e9-ad54-a937c87b5fd9</title>
      <link>https://db.gcve.eu/sighting/2518cd56-b654-46e9-ad54-a937c87b5fd9/export</link>
      <description>{"uuid": "2518cd56-b654-46e9-ad54-a937c87b5fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30385", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16267", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30385\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-05-13T16:59:09.691Z\n\ud83d\udccf Modified: 2025-05-13T21:40:35.411Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385", "creation_timestamp": "2025-05-13T22:30:58.000000Z"}</description>
      <content:encoded>{"uuid": "2518cd56-b654-46e9-ad54-a937c87b5fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30385", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16267", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30385\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-05-13T16:59:09.691Z\n\ud83d\udccf Modified: 2025-05-13T21:40:35.411Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385", "creation_timestamp": "2025-05-13T22:30:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2518cd56-b654-46e9-ad54-a937c87b5fd9/export</guid>
      <pubDate>Tue, 13 May 2025 22:30:58 +0000</pubDate>
    </item>
    <item>
      <title>d8d1fbfd-64a2-41ab-8265-270fb6eacdeb</title>
      <link>https://db.gcve.eu/sighting/d8d1fbfd-64a2-41ab-8265-270fb6eacdeb/export</link>
      <description>{"uuid": "d8d1fbfd-64a2-41ab-8265-270fb6eacdeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30383", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16287", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30383\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:44.101Z\n\ud83d\udccf Modified: 2025-05-14T04:00:45.710Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30383", "creation_timestamp": "2025-05-14T04:32:00.000000Z"}</description>
      <content:encoded>{"uuid": "d8d1fbfd-64a2-41ab-8265-270fb6eacdeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30383", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16287", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30383\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-05-13T16:58:44.101Z\n\ud83d\udccf Modified: 2025-05-14T04:00:45.710Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30383", "creation_timestamp": "2025-05-14T04:32:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d8d1fbfd-64a2-41ab-8265-270fb6eacdeb/export</guid>
      <pubDate>Wed, 14 May 2025 04:32:00 +0000</pubDate>
    </item>
    <item>
      <title>29d753db-d042-47d4-9332-4025d685e198</title>
      <link>https://db.gcve.eu/sighting/29d753db-d042-47d4-9332-4025d685e198/export</link>
      <description>{"uuid": "29d753db-d042-47d4-9332-4025d685e198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30386", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lp5we6qa522u", "content": "", "creation_timestamp": "2025-05-14T21:17:50.384309Z"}</description>
      <content:encoded>{"uuid": "29d753db-d042-47d4-9332-4025d685e198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30386", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lp5we6qa522u", "content": "", "creation_timestamp": "2025-05-14T21:17:50.384309Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/29d753db-d042-47d4-9332-4025d685e198/export</guid>
      <pubDate>Wed, 14 May 2025 21:17:50 +0000</pubDate>
    </item>
    <item>
      <title>d4b4420a-7b90-471b-b399-bf48b71a6b10</title>
      <link>https://db.gcve.eu/sighting/d4b4420a-7b90-471b-b399-bf48b71a6b10/export</link>
      <description>{"uuid": "d4b4420a-7b90-471b-b399-bf48b71a6b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3m4nyavvvtu2u", "content": "", "creation_timestamp": "2025-11-02T17:01:46.493788Z"}</description>
      <content:encoded>{"uuid": "d4b4420a-7b90-471b-b399-bf48b71a6b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3m4nyavvvtu2u", "content": "", "creation_timestamp": "2025-11-02T17:01:46.493788Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d4b4420a-7b90-471b-b399-bf48b71a6b10/export</guid>
      <pubDate>Sun, 02 Nov 2025 17:01:46 +0000</pubDate>
    </item>
    <item>
      <title>f0605273-f6ba-401d-a213-fa3729649663</title>
      <link>https://db.gcve.eu/sighting/f0605273-f6ba-401d-a213-fa3729649663/export</link>
      <description>{"uuid": "f0605273-f6ba-401d-a213-fa3729649663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://gist.github.com/Darkcrai86/cf9e1ffe389625a29a6abf7f1e885e43", "content": "", "creation_timestamp": "2025-11-03T08:27:34.000000Z"}</description>
      <content:encoded>{"uuid": "f0605273-f6ba-401d-a213-fa3729649663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://gist.github.com/Darkcrai86/cf9e1ffe389625a29a6abf7f1e885e43", "content": "", "creation_timestamp": "2025-11-03T08:27:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f0605273-f6ba-401d-a213-fa3729649663/export</guid>
      <pubDate>Mon, 03 Nov 2025 08:27:34 +0000</pubDate>
    </item>
    <item>
      <title>cb4d3c67-1c00-455b-82a3-8be2d496eb4b</title>
      <link>https://db.gcve.eu/sighting/cb4d3c67-1c00-455b-82a3-8be2d496eb4b/export</link>
      <description>{"uuid": "cb4d3c67-1c00-455b-82a3-8be2d496eb4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3m4t42gswl62t", "content": "", "creation_timestamp": "2025-11-04T17:53:03.177227Z"}</description>
      <content:encoded>{"uuid": "cb4d3c67-1c00-455b-82a3-8be2d496eb4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30388", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3m4t42gswl62t", "content": "", "creation_timestamp": "2025-11-04T17:53:03.177227Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cb4d3c67-1c00-455b-82a3-8be2d496eb4b/export</guid>
      <pubDate>Tue, 04 Nov 2025 17:53:03 +0000</pubDate>
    </item>
  </channel>
</rss>
