<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 20 May 2026 09:33:41 +0000</lastBuildDate>
    <item>
      <title>bcec3bd6-0bf0-4b2c-8cbb-32c313153c42</title>
      <link>https://db.gcve.eu/sighting/bcec3bd6-0bf0-4b2c-8cbb-32c313153c42/export</link>
      <description>{"uuid": "bcec3bd6-0bf0-4b2c-8cbb-32c313153c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30432", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-88018e08-9f90bafadba6dbf1", "content": "", "creation_timestamp": "2025-04-01T12:49:35.121133Z"}</description>
      <content:encoded>{"uuid": "bcec3bd6-0bf0-4b2c-8cbb-32c313153c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30432", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-88018e08-9f90bafadba6dbf1", "content": "", "creation_timestamp": "2025-04-01T12:49:35.121133Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bcec3bd6-0bf0-4b2c-8cbb-32c313153c42/export</guid>
      <pubDate>Tue, 01 Apr 2025 12:49:35 +0000</pubDate>
    </item>
    <item>
      <title>113615c4-924b-4d1d-b1f4-2db5f76b4117</title>
      <link>https://db.gcve.eu/sighting/113615c4-924b-4d1d-b1f4-2db5f76b4117/export</link>
      <description>{"uuid": "113615c4-924b-4d1d-b1f4-2db5f76b4117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30432", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-88018e08-9f90bafadba6dbf1", "content": "", "creation_timestamp": "2025-04-01T12:49:35.126790Z"}</description>
      <content:encoded>{"uuid": "113615c4-924b-4d1d-b1f4-2db5f76b4117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30432", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-88018e08-9f90bafadba6dbf1", "content": "", "creation_timestamp": "2025-04-01T12:49:35.126790Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/113615c4-924b-4d1d-b1f4-2db5f76b4117/export</guid>
      <pubDate>Tue, 01 Apr 2025 12:49:35 +0000</pubDate>
    </item>
    <item>
      <title>45867808-a70a-469f-839b-16663cc88fd4</title>
      <link>https://db.gcve.eu/sighting/45867808-a70a-469f-839b-16663cc88fd4/export</link>
      <description>{"uuid": "45867808-a70a-469f-839b-16663cc88fd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30434", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9912", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30434\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved input sanitization. This issue is fixed in iOS 18.4 and iPadOS 18.4. Processing a maliciously crafted file may lead to a cross site scripting attack.\n\ud83d\udccf Published: 2025-03-31T22:23:06.874Z\n\ud83d\udccf Modified: 2025-04-01T14:15:23.497Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122371", "creation_timestamp": "2025-04-01T14:33:17.000000Z"}</description>
      <content:encoded>{"uuid": "45867808-a70a-469f-839b-16663cc88fd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30434", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9912", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30434\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved input sanitization. This issue is fixed in iOS 18.4 and iPadOS 18.4. Processing a maliciously crafted file may lead to a cross site scripting attack.\n\ud83d\udccf Published: 2025-03-31T22:23:06.874Z\n\ud83d\udccf Modified: 2025-04-01T14:15:23.497Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122371", "creation_timestamp": "2025-04-01T14:33:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/45867808-a70a-469f-839b-16663cc88fd4/export</guid>
      <pubDate>Tue, 01 Apr 2025 14:33:17 +0000</pubDate>
    </item>
    <item>
      <title>6947f629-ed7e-4dd4-81eb-999e8962078e</title>
      <link>https://db.gcve.eu/sighting/6947f629-ed7e-4dd4-81eb-999e8962078e/export</link>
      <description>{"uuid": "6947f629-ed7e-4dd4-81eb-999e8962078e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30435", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9914", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30435\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.4. A sandboxed app may be able to access sensitive user data in system logs.\n\ud83d\udccf Published: 2025-03-31T22:23:07.795Z\n\ud83d\udccf Modified: 2025-04-01T14:13:03.120Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373", "creation_timestamp": "2025-04-01T14:33:18.000000Z"}</description>
      <content:encoded>{"uuid": "6947f629-ed7e-4dd4-81eb-999e8962078e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30435", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9914", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30435\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.4. A sandboxed app may be able to access sensitive user data in system logs.\n\ud83d\udccf Published: 2025-03-31T22:23:07.795Z\n\ud83d\udccf Modified: 2025-04-01T14:13:03.120Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373", "creation_timestamp": "2025-04-01T14:33:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6947f629-ed7e-4dd4-81eb-999e8962078e/export</guid>
      <pubDate>Tue, 01 Apr 2025 14:33:18 +0000</pubDate>
    </item>
    <item>
      <title>f39afab4-ada4-4f67-b375-f81893cb3146</title>
      <link>https://db.gcve.eu/sighting/f39afab4-ada4-4f67-b375-f81893cb3146/export</link>
      <description>{"uuid": "f39afab4-ada4-4f67-b375-f81893cb3146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30437", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9965", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30437\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.4. An app may be able to corrupt coprocessor memory.\n\ud83d\udccf Published: 2025-03-31T22:23:41.741Z\n\ud83d\udccf Modified: 2025-04-01T18:20:18.123Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373", "creation_timestamp": "2025-04-01T18:32:41.000000Z"}</description>
      <content:encoded>{"uuid": "f39afab4-ada4-4f67-b375-f81893cb3146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30437", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9965", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30437\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.4. An app may be able to corrupt coprocessor memory.\n\ud83d\udccf Published: 2025-03-31T22:23:41.741Z\n\ud83d\udccf Modified: 2025-04-01T18:20:18.123Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122373", "creation_timestamp": "2025-04-01T18:32:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f39afab4-ada4-4f67-b375-f81893cb3146/export</guid>
      <pubDate>Tue, 01 Apr 2025 18:32:41 +0000</pubDate>
    </item>
    <item>
      <title>7795ddc8-fcb6-4af0-841a-460bb93eca00</title>
      <link>https://db.gcve.eu/sighting/7795ddc8-fcb6-4af0-841a-460bb93eca00/export</link>
      <description>{"uuid": "7795ddc8-fcb6-4af0-841a-460bb93eca00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30438", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10103", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30438\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved access restrictions. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to dismiss the system notification on the Lock Screen that a recording was started.\n\ud83d\udccf Published: 2025-03-31T22:23:02.346Z\n\ud83d\udccf Modified: 2025-04-02T15:23:06.883Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122377\n2. https://support.apple.com/en-us/122371\n3. https://support.apple.com/en-us/122373\n4. https://support.apple.com/en-us/122378\n5. https://support.apple.com/en-us/122374\n6. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-04-02T15:33:31.000000Z"}</description>
      <content:encoded>{"uuid": "7795ddc8-fcb6-4af0-841a-460bb93eca00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30438", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10103", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30438\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improved access restrictions. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to dismiss the system notification on the Lock Screen that a recording was started.\n\ud83d\udccf Published: 2025-03-31T22:23:02.346Z\n\ud83d\udccf Modified: 2025-04-02T15:23:06.883Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122377\n2. https://support.apple.com/en-us/122371\n3. https://support.apple.com/en-us/122373\n4. https://support.apple.com/en-us/122378\n5. https://support.apple.com/en-us/122374\n6. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-04-02T15:33:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7795ddc8-fcb6-4af0-841a-460bb93eca00/export</guid>
      <pubDate>Wed, 02 Apr 2025 15:33:31 +0000</pubDate>
    </item>
    <item>
      <title>1d225886-b2b4-43f5-b28c-e26925c24109</title>
      <link>https://db.gcve.eu/sighting/1d225886-b2b4-43f5-b28c-e26925c24109/export</link>
      <description>{"uuid": "1d225886-b2b4-43f5-b28c-e26925c24109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30432", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10352", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30432\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved state management. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sonoma 14.7.5. A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures.\n\ud83d\udccf Published: 2025-03-31T22:22:28.969Z\n\ud83d\udccf Modified: 2025-04-03T20:13:11.090Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122377\n2. https://support.apple.com/en-us/122371\n3. https://support.apple.com/en-us/122372\n4. https://support.apple.com/en-us/122378\n5. https://support.apple.com/en-us/122374\n6. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-04-03T20:36:03.000000Z"}</description>
      <content:encoded>{"uuid": "1d225886-b2b4-43f5-b28c-e26925c24109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30432", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10352", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30432\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved state management. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sonoma 14.7.5. A malicious app may be able to attempt passcode entries on a locked device and thereby cause escalating time delays after 4 failures.\n\ud83d\udccf Published: 2025-03-31T22:22:28.969Z\n\ud83d\udccf Modified: 2025-04-03T20:13:11.090Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122377\n2. https://support.apple.com/en-us/122371\n3. https://support.apple.com/en-us/122372\n4. https://support.apple.com/en-us/122378\n5. https://support.apple.com/en-us/122374\n6. https://support.apple.com/en-us/122375", "creation_timestamp": "2025-04-03T20:36:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1d225886-b2b4-43f5-b28c-e26925c24109/export</guid>
      <pubDate>Thu, 03 Apr 2025 20:36:03 +0000</pubDate>
    </item>
    <item>
      <title>dd8d1b17-0801-404c-9032-8898cbbb2e46</title>
      <link>https://db.gcve.eu/sighting/dd8d1b17-0801-404c-9032-8898cbbb2e46/export</link>
      <description>{"uuid": "dd8d1b17-0801-404c-9032-8898cbbb2e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30436", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16321", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30436\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker may be able to use Siri to enable Auto-Answer Calls.\n\ud83d\udccf Published: 2025-05-12T21:42:46.888Z\n\ud83d\udccf Modified: 2025-05-14T16:18:29.443Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122371", "creation_timestamp": "2025-05-14T16:33:39.000000Z"}</description>
      <content:encoded>{"uuid": "dd8d1b17-0801-404c-9032-8898cbbb2e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30436", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16321", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30436\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker may be able to use Siri to enable Auto-Answer Calls.\n\ud83d\udccf Published: 2025-05-12T21:42:46.888Z\n\ud83d\udccf Modified: 2025-05-14T16:18:29.443Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122371", "creation_timestamp": "2025-05-14T16:33:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dd8d1b17-0801-404c-9032-8898cbbb2e46/export</guid>
      <pubDate>Wed, 14 May 2025 16:33:39 +0000</pubDate>
    </item>
    <item>
      <title>8f9232b5-b742-4991-853f-2f6a4219c193</title>
      <link>https://db.gcve.eu/sighting/8f9232b5-b742-4991-853f-2f6a4219c193/export</link>
      <description>{"uuid": "8f9232b5-b742-4991-853f-2f6a4219c193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30430", "type": "published-proof-of-concept", "source": "Telegram/MjTxKferycnY5Pne62qxIs8GZVQD5pDYWQHmJtbu7pIL3GM", "content": "", "creation_timestamp": "2026-04-02T22:15:38.000000Z"}</description>
      <content:encoded>{"uuid": "8f9232b5-b742-4991-853f-2f6a4219c193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30430", "type": "published-proof-of-concept", "source": "Telegram/MjTxKferycnY5Pne62qxIs8GZVQD5pDYWQHmJtbu7pIL3GM", "content": "", "creation_timestamp": "2026-04-02T22:15:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8f9232b5-b742-4991-853f-2f6a4219c193/export</guid>
      <pubDate>Thu, 02 Apr 2026 22:15:38 +0000</pubDate>
    </item>
    <item>
      <title>1d17c078-b430-48b9-beeb-b1d02c718447</title>
      <link>https://db.gcve.eu/sighting/1d17c078-b430-48b9-beeb-b1d02c718447/export</link>
      <description>{"uuid": "1d17c078-b430-48b9-beeb-b1d02c718447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30433", "type": "published-proof-of-concept", "source": "Telegram/MjTxKferycnY5Pne62qxIs8GZVQD5pDYWQHmJtbu7pIL3GM", "content": "", "creation_timestamp": "2026-04-02T22:15:38.000000Z"}</description>
      <content:encoded>{"uuid": "1d17c078-b430-48b9-beeb-b1d02c718447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30433", "type": "published-proof-of-concept", "source": "Telegram/MjTxKferycnY5Pne62qxIs8GZVQD5pDYWQHmJtbu7pIL3GM", "content": "", "creation_timestamp": "2026-04-02T22:15:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1d17c078-b430-48b9-beeb-b1d02c718447/export</guid>
      <pubDate>Thu, 02 Apr 2026 22:15:38 +0000</pubDate>
    </item>
  </channel>
</rss>
