<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 15:18:34 +0000</lastBuildDate>
    <item>
      <title>aa4c8ca5-53e8-4b29-8745-beff69a5a8fe</title>
      <link>https://db.gcve.eu/sighting/aa4c8ca5-53e8-4b29-8745-beff69a5a8fe/export</link>
      <description>{"uuid": "aa4c8ca5-53e8-4b29-8745-beff69a5a8fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-5MVM-89C9-9GM5", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5373", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27146\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: matrix-appservice-irc is a Node.js IRC bridge for Matrix. The matrix-appservice-irc bridge up to version 3.0.3 contains a vulnerability which can lead to arbitrary IRC command execution as the puppeted user. The attacker can only inject commands executed as their own IRC user. The vulnerability has been patched in matrix-appservice-irc version 3.0.4.\n\ud83d\udccf Published: 2025-02-25T20:04:40.400Z\n\ud83d\udccf Modified: 2025-02-25T20:04:40.400Z\n\ud83d\udd17 References:\n1. https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-5mvm-89c9-9gm5\n2. https://github.com/matrix-org/matrix-appservice-irc/commit/74f02c8e11f16ed1b355700092c1aa9c036a11bd", "creation_timestamp": "2025-02-25T20:22:59.000000Z"}</description>
      <content:encoded>{"uuid": "aa4c8ca5-53e8-4b29-8745-beff69a5a8fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-5MVM-89C9-9GM5", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5373", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27146\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: matrix-appservice-irc is a Node.js IRC bridge for Matrix. The matrix-appservice-irc bridge up to version 3.0.3 contains a vulnerability which can lead to arbitrary IRC command execution as the puppeted user. The attacker can only inject commands executed as their own IRC user. The vulnerability has been patched in matrix-appservice-irc version 3.0.4.\n\ud83d\udccf Published: 2025-02-25T20:04:40.400Z\n\ud83d\udccf Modified: 2025-02-25T20:04:40.400Z\n\ud83d\udd17 References:\n1. https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-5mvm-89c9-9gm5\n2. https://github.com/matrix-org/matrix-appservice-irc/commit/74f02c8e11f16ed1b355700092c1aa9c036a11bd", "creation_timestamp": "2025-02-25T20:22:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/aa4c8ca5-53e8-4b29-8745-beff69a5a8fe/export</guid>
      <pubDate>Tue, 25 Feb 2025 20:22:59 +0000</pubDate>
    </item>
  </channel>
</rss>
