<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 02:30:52 +0000</lastBuildDate>
    <item>
      <title>f10abd56-3fab-45ec-8d96-339aa472b680</title>
      <link>https://db.gcve.eu/sighting/f10abd56-3fab-45ec-8d96-339aa472b680/export</link>
      <description>{"uuid": "f10abd56-3fab-45ec-8d96-339aa472b680", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32035", "type": "seen", "source": "https://t.me/cvedetector/22511", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32035 - DotNetNuke File Upload Validation Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32035 \nPublished : April 8, 2025, 6:16 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 9.13.2, when uploading files (e.g. when uploading assets), the file extension is checked to see if it's an allowed file type but the actual contents of the file aren't checked. This means that it's possible to e.g. upload an executable file renamed to be a .jpg. This file could then be executed by another security vulnerability. This vulnerability is fixed in 9.13.2. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:34.000000Z"}</description>
      <content:encoded>{"uuid": "f10abd56-3fab-45ec-8d96-339aa472b680", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32035", "type": "seen", "source": "https://t.me/cvedetector/22511", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32035 - DotNetNuke File Upload Validation Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32035 \nPublished : April 8, 2025, 6:16 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 9.13.2, when uploading files (e.g. when uploading assets), the file extension is checked to see if it's an allowed file type but the actual contents of the file aren't checked. This means that it's possible to e.g. upload an executable file renamed to be a .jpg. This file could then be executed by another security vulnerability. This vulnerability is fixed in 9.13.2. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f10abd56-3fab-45ec-8d96-339aa472b680/export</guid>
      <pubDate>Tue, 08 Apr 2025 22:22:34 +0000</pubDate>
    </item>
  </channel>
</rss>
