<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 03:55:02 +0000</lastBuildDate>
    <item>
      <title>57af1477-94cd-4a7a-a6b2-c2f975c0a1b0</title>
      <link>https://db.gcve.eu/sighting/57af1477-94cd-4a7a-a6b2-c2f975c0a1b0/export</link>
      <description>{"uuid": "57af1477-94cd-4a7a-a6b2-c2f975c0a1b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3413", "type": "seen", "source": "https://t.me/cvedetector/22394", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3413 - Opplus Springboot-Admin Remote Deserialization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3413 \nPublished : April 8, 2025, 6:15 a.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : A vulnerability has been found in opplus springboot-admin up to a2d5310f44fd46780a8686456cf2f9001ab8f024 and classified as critical. Affected by this vulnerability is the function code of the file SysGeneratorController.java. The manipulation of the argument Tables leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T09:48:28.000000Z"}</description>
      <content:encoded>{"uuid": "57af1477-94cd-4a7a-a6b2-c2f975c0a1b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3413", "type": "seen", "source": "https://t.me/cvedetector/22394", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3413 - Opplus Springboot-Admin Remote Deserialization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3413 \nPublished : April 8, 2025, 6:15 a.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : A vulnerability has been found in opplus springboot-admin up to a2d5310f44fd46780a8686456cf2f9001ab8f024 and classified as critical. Affected by this vulnerability is the function code of the file SysGeneratorController.java. The manipulation of the argument Tables leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T09:48:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/57af1477-94cd-4a7a-a6b2-c2f975c0a1b0/export</guid>
      <pubDate>Tue, 08 Apr 2025 09:48:28 +0000</pubDate>
    </item>
    <item>
      <title>c7e0affd-a323-49ec-a37a-c271e7e5489c</title>
      <link>https://db.gcve.eu/sighting/c7e0affd-a323-49ec-a37a-c271e7e5489c/export</link>
      <description>{"uuid": "c7e0affd-a323-49ec-a37a-c271e7e5489c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34130", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lu4lp2763j2e", "content": "", "creation_timestamp": "2025-07-16T23:40:13.263220Z"}</description>
      <content:encoded>{"uuid": "c7e0affd-a323-49ec-a37a-c271e7e5489c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34130", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lu4lp2763j2e", "content": "", "creation_timestamp": "2025-07-16T23:40:13.263220Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c7e0affd-a323-49ec-a37a-c271e7e5489c/export</guid>
      <pubDate>Wed, 16 Jul 2025 23:40:13 +0000</pubDate>
    </item>
    <item>
      <title>c48e47c3-fc51-4881-b871-079c4791a8f9</title>
      <link>https://db.gcve.eu/sighting/c48e47c3-fc51-4881-b871-079c4791a8f9/export</link>
      <description>{"uuid": "c48e47c3-fc51-4881-b871-079c4791a8f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34130", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lu6tdle7o32z", "content": "", "creation_timestamp": "2025-07-17T21:02:20.395143Z"}</description>
      <content:encoded>{"uuid": "c48e47c3-fc51-4881-b871-079c4791a8f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34130", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lu6tdle7o32z", "content": "", "creation_timestamp": "2025-07-17T21:02:20.395143Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c48e47c3-fc51-4881-b871-079c4791a8f9/export</guid>
      <pubDate>Thu, 17 Jul 2025 21:02:20 +0000</pubDate>
    </item>
    <item>
      <title>4cb4041c-9acf-4ead-a5d3-56f7eaadc997</title>
      <link>https://db.gcve.eu/sighting/4cb4041c-9acf-4ead-a5d3-56f7eaadc997/export</link>
      <description>{"uuid": "4cb4041c-9acf-4ead-a5d3-56f7eaadc997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34132", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lu6tdlgqwg2c", "content": "", "creation_timestamp": "2025-07-17T21:02:21.219726Z"}</description>
      <content:encoded>{"uuid": "4cb4041c-9acf-4ead-a5d3-56f7eaadc997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34132", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lu6tdlgqwg2c", "content": "", "creation_timestamp": "2025-07-17T21:02:21.219726Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4cb4041c-9acf-4ead-a5d3-56f7eaadc997/export</guid>
      <pubDate>Thu, 17 Jul 2025 21:02:21 +0000</pubDate>
    </item>
    <item>
      <title>4a0ff63c-ba7a-43a3-a2b2-a22efc7ce575</title>
      <link>https://db.gcve.eu/sighting/4a0ff63c-ba7a-43a3-a2b2-a22efc7ce575/export</link>
      <description>{"uuid": "4a0ff63c-ba7a-43a3-a2b2-a22efc7ce575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34138", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114914742159509500", "content": "", "creation_timestamp": "2025-07-25T16:10:11.599167Z"}</description>
      <content:encoded>{"uuid": "4a0ff63c-ba7a-43a3-a2b2-a22efc7ce575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34138", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114914742159509500", "content": "", "creation_timestamp": "2025-07-25T16:10:11.599167Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4a0ff63c-ba7a-43a3-a2b2-a22efc7ce575/export</guid>
      <pubDate>Fri, 25 Jul 2025 16:10:11 +0000</pubDate>
    </item>
    <item>
      <title>223d9b09-1ab5-4346-9808-2fcc3fb16885</title>
      <link>https://db.gcve.eu/sighting/223d9b09-1ab5-4346-9808-2fcc3fb16885/export</link>
      <description>{"uuid": "223d9b09-1ab5-4346-9808-2fcc3fb16885", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34139", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114914742159509500", "content": "", "creation_timestamp": "2025-07-25T16:10:11.730787Z"}</description>
      <content:encoded>{"uuid": "223d9b09-1ab5-4346-9808-2fcc3fb16885", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34139", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114914742159509500", "content": "", "creation_timestamp": "2025-07-25T16:10:11.730787Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/223d9b09-1ab5-4346-9808-2fcc3fb16885/export</guid>
      <pubDate>Fri, 25 Jul 2025 16:10:11 +0000</pubDate>
    </item>
    <item>
      <title>16aa6e23-76e5-48dd-ba6b-f455348b38ba</title>
      <link>https://db.gcve.eu/sighting/16aa6e23-76e5-48dd-ba6b-f455348b38ba/export</link>
      <description>{"uuid": "16aa6e23-76e5-48dd-ba6b-f455348b38ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34135", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4h4shi4sd2s", "content": "", "creation_timestamp": "2025-10-30T23:34:31.842455Z"}</description>
      <content:encoded>{"uuid": "16aa6e23-76e5-48dd-ba6b-f455348b38ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34135", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4h4shi4sd2s", "content": "", "creation_timestamp": "2025-10-30T23:34:31.842455Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/16aa6e23-76e5-48dd-ba6b-f455348b38ba/export</guid>
      <pubDate>Thu, 30 Oct 2025 23:34:31 +0000</pubDate>
    </item>
    <item>
      <title>d6fbef91-5452-48bd-86f3-26399724a05d</title>
      <link>https://db.gcve.eu/sighting/d6fbef91-5452-48bd-86f3-26399724a05d/export</link>
      <description>{"uuid": "d6fbef91-5452-48bd-86f3-26399724a05d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34134", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4h52grbul2a", "content": "", "creation_timestamp": "2025-10-30T23:38:59.751842Z"}</description>
      <content:encoded>{"uuid": "d6fbef91-5452-48bd-86f3-26399724a05d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-34134", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4h52grbul2a", "content": "", "creation_timestamp": "2025-10-30T23:38:59.751842Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d6fbef91-5452-48bd-86f3-26399724a05d/export</guid>
      <pubDate>Thu, 30 Oct 2025 23:38:59 +0000</pubDate>
    </item>
    <item>
      <title>3cf13777-261b-40c1-911a-a3f9c6b21b3d</title>
      <link>https://db.gcve.eu/sighting/3cf13777-261b-40c1-911a-a3f9c6b21b3d/export</link>
      <description>{"uuid": "3cf13777-261b-40c1-911a-a3f9c6b21b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-34134", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m4hif767f42s", "content": "", "creation_timestamp": "2025-10-31T03:01:52.598653Z"}</description>
      <content:encoded>{"uuid": "3cf13777-261b-40c1-911a-a3f9c6b21b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-34134", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m4hif767f42s", "content": "", "creation_timestamp": "2025-10-31T03:01:52.598653Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3cf13777-261b-40c1-911a-a3f9c6b21b3d/export</guid>
      <pubDate>Fri, 31 Oct 2025 03:01:52 +0000</pubDate>
    </item>
  </channel>
</rss>
