<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 04:06:59 +0000</lastBuildDate>
    <item>
      <title>5b343678-56d2-4d1c-b772-55b93933a502</title>
      <link>https://db.gcve.eu/sighting/5b343678-56d2-4d1c-b772-55b93933a502/export</link>
      <description>{"uuid": "5b343678-56d2-4d1c-b772-55b93933a502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3317", "type": "seen", "source": "https://t.me/cvedetector/22221", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3317 - Fumiao OpenCms Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3317 \nPublished : April 6, 2025, 12:15 p.m. | 1\u00a0hour, 30\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in fumiao opencms up to a0fafa5cff58719e9b27c2a2eec204cc165ce14f. Affected is an unknown function of the file opencms-dev/src/main/webapp/view/admin/document/dataPage.jsp. The manipulation of the argument path leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-06T15:59:01.000000Z"}</description>
      <content:encoded>{"uuid": "5b343678-56d2-4d1c-b772-55b93933a502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3317", "type": "seen", "source": "https://t.me/cvedetector/22221", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3317 - Fumiao OpenCms Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3317 \nPublished : April 6, 2025, 12:15 p.m. | 1\u00a0hour, 30\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in fumiao opencms up to a0fafa5cff58719e9b27c2a2eec204cc165ce14f. Affected is an unknown function of the file opencms-dev/src/main/webapp/view/admin/document/dataPage.jsp. The manipulation of the argument path leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-06T15:59:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5b343678-56d2-4d1c-b772-55b93933a502/export</guid>
      <pubDate>Sun, 06 Apr 2025 15:59:01 +0000</pubDate>
    </item>
    <item>
      <title>ef7c32ec-e4ed-4a17-ba46-f01fe55a9d22</title>
      <link>https://db.gcve.eu/sighting/ef7c32ec-e4ed-4a17-ba46-f01fe55a9d22/export</link>
      <description>{"uuid": "ef7c32ec-e4ed-4a17-ba46-f01fe55a9d22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-33177", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m3h5vggl7c2l", "content": "", "creation_timestamp": "2025-10-18T06:28:54.788893Z"}</description>
      <content:encoded>{"uuid": "ef7c32ec-e4ed-4a17-ba46-f01fe55a9d22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-33177", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m3h5vggl7c2l", "content": "", "creation_timestamp": "2025-10-18T06:28:54.788893Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ef7c32ec-e4ed-4a17-ba46-f01fe55a9d22/export</guid>
      <pubDate>Sat, 18 Oct 2025 06:28:54 +0000</pubDate>
    </item>
    <item>
      <title>cef7217f-af5d-456c-beaf-a2c22de0490a</title>
      <link>https://db.gcve.eu/sighting/cef7217f-af5d-456c-beaf-a2c22de0490a/export</link>
      <description>{"uuid": "cef7217f-af5d-456c-beaf-a2c22de0490a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-33176", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m4th3sgccd32", "content": "", "creation_timestamp": "2025-11-04T21:11:21.106756Z"}</description>
      <content:encoded>{"uuid": "cef7217f-af5d-456c-beaf-a2c22de0490a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-33176", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m4th3sgccd32", "content": "", "creation_timestamp": "2025-11-04T21:11:21.106756Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cef7217f-af5d-456c-beaf-a2c22de0490a/export</guid>
      <pubDate>Tue, 04 Nov 2025 21:11:21 +0000</pubDate>
    </item>
    <item>
      <title>0170be72-a438-45fc-be6b-6c98d861f6d9</title>
      <link>https://db.gcve.eu/sighting/0170be72-a438-45fc-be6b-6c98d861f6d9/export</link>
      <description>{"uuid": "0170be72-a438-45fc-be6b-6c98d861f6d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-33176", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4tjw7n54u2n", "content": "", "creation_timestamp": "2025-11-04T22:01:13.479285Z"}</description>
      <content:encoded>{"uuid": "0170be72-a438-45fc-be6b-6c98d861f6d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-33176", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4tjw7n54u2n", "content": "", "creation_timestamp": "2025-11-04T22:01:13.479285Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0170be72-a438-45fc-be6b-6c98d861f6d9/export</guid>
      <pubDate>Tue, 04 Nov 2025 22:01:13 +0000</pubDate>
    </item>
    <item>
      <title>cc027394-5c96-4896-8d33-7cdf459d5353</title>
      <link>https://db.gcve.eu/sighting/cc027394-5c96-4896-8d33-7cdf459d5353/export</link>
      <description>{"uuid": "cc027394-5c96-4896-8d33-7cdf459d5353", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfmyypxslg2d", "content": "", "creation_timestamp": "2026-02-24T20:29:10.562676Z"}</description>
      <content:encoded>{"uuid": "cc027394-5c96-4896-8d33-7cdf459d5353", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfmyypxslg2d", "content": "", "creation_timestamp": "2026-02-24T20:29:10.562676Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cc027394-5c96-4896-8d33-7cdf459d5353/export</guid>
      <pubDate>Tue, 24 Feb 2026 20:29:10 +0000</pubDate>
    </item>
    <item>
      <title>d8051a13-abb7-4d2b-9a74-cd06a71090c3</title>
      <link>https://db.gcve.eu/sighting/d8051a13-abb7-4d2b-9a74-cd06a71090c3/export</link>
      <description>{"uuid": "d8051a13-abb7-4d2b-9a74-cd06a71090c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfmyzijpzr2s", "content": "", "creation_timestamp": "2026-02-24T20:29:36.377424Z"}</description>
      <content:encoded>{"uuid": "d8051a13-abb7-4d2b-9a74-cd06a71090c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfmyzijpzr2s", "content": "", "creation_timestamp": "2026-02-24T20:29:36.377424Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d8051a13-abb7-4d2b-9a74-cd06a71090c3/export</guid>
      <pubDate>Tue, 24 Feb 2026 20:29:36 +0000</pubDate>
    </item>
    <item>
      <title>c76d290a-7b5f-46eb-b619-40e2a7c1cdbd</title>
      <link>https://db.gcve.eu/sighting/c76d290a-7b5f-46eb-b619-40e2a7c1cdbd/export</link>
      <description>{"uuid": "c76d290a-7b5f-46eb-b619-40e2a7c1cdbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mfn3p2nuw72y", "content": "", "creation_timestamp": "2026-02-24T21:17:27.267503Z"}</description>
      <content:encoded>{"uuid": "c76d290a-7b5f-46eb-b619-40e2a7c1cdbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mfn3p2nuw72y", "content": "", "creation_timestamp": "2026-02-24T21:17:27.267503Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c76d290a-7b5f-46eb-b619-40e2a7c1cdbd/export</guid>
      <pubDate>Tue, 24 Feb 2026 21:17:27 +0000</pubDate>
    </item>
    <item>
      <title>4384bfc7-895a-435e-8953-a6f9519be9bb</title>
      <link>https://db.gcve.eu/sighting/4384bfc7-895a-435e-8953-a6f9519be9bb/export</link>
      <description>{"uuid": "4384bfc7-895a-435e-8953-a6f9519be9bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mfurppk35c2i", "content": "", "creation_timestamp": "2026-02-27T22:40:10.192210Z"}</description>
      <content:encoded>{"uuid": "4384bfc7-895a-435e-8953-a6f9519be9bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mfurppk35c2i", "content": "", "creation_timestamp": "2026-02-27T22:40:10.192210Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4384bfc7-895a-435e-8953-a6f9519be9bb/export</guid>
      <pubDate>Fri, 27 Feb 2026 22:40:10 +0000</pubDate>
    </item>
    <item>
      <title>4a8a487b-9db5-472a-b358-e7c1faaed9e0</title>
      <link>https://db.gcve.eu/sighting/4a8a487b-9db5-472a-b358-e7c1faaed9e0/export</link>
      <description>{"uuid": "4a8a487b-9db5-472a-b358-e7c1faaed9e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/volk149.bsky.social/post/3mgb6t7ncrk26", "content": "", "creation_timestamp": "2026-03-04T21:06:44.387475Z"}</description>
      <content:encoded>{"uuid": "4a8a487b-9db5-472a-b358-e7c1faaed9e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/volk149.bsky.social/post/3mgb6t7ncrk26", "content": "", "creation_timestamp": "2026-03-04T21:06:44.387475Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4a8a487b-9db5-472a-b358-e7c1faaed9e0/export</guid>
      <pubDate>Wed, 04 Mar 2026 21:06:44 +0000</pubDate>
    </item>
    <item>
      <title>b57e2a81-2638-4299-b972-1057663d811d</title>
      <link>https://db.gcve.eu/sighting/b57e2a81-2638-4299-b972-1057663d811d/export</link>
      <description>{"uuid": "b57e2a81-2638-4299-b972-1057663d811d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mgixgugjdk2l", "content": "", "creation_timestamp": "2026-03-07T23:15:51.229433Z"}</description>
      <content:encoded>{"uuid": "b57e2a81-2638-4299-b972-1057663d811d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-33179", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mgixgugjdk2l", "content": "", "creation_timestamp": "2026-03-07T23:15:51.229433Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b57e2a81-2638-4299-b972-1057663d811d/export</guid>
      <pubDate>Sat, 07 Mar 2026 23:15:51 +0000</pubDate>
    </item>
  </channel>
</rss>
