<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 22 May 2026 17:12:12 +0000</lastBuildDate>
    <item>
      <title>d7626a97-49ee-449d-ae77-3ce6699fb3a2</title>
      <link>https://db.gcve.eu/sighting/d7626a97-49ee-449d-ae77-3ce6699fb3a2/export</link>
      <description>{"uuid": "d7626a97-49ee-449d-ae77-3ce6699fb3a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-93QR-H8PR-4593", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6558", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27497\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: OpenDJ is an LDAPv3 compliant directory service. OpenDJ prior to 4.9.3 contains a denial-of-service (DoS) vulnerability that causes the server to become unresponsive to all LDAP requests without crashing or restarting. This issue occurs when an alias loop exists in the LDAP database. If an ldapsearch request is executed with alias dereferencing set to \"always\" on this alias entry, the server stops responding to all future requests. Fortunately, the server can be restarted without data corruption. This vulnerability is fixed in 4.9.3.\n\ud83d\udccf Published: 2025-03-05T15:59:01.702Z\n\ud83d\udccf Modified: 2025-03-05T16:16:49.762Z\n\ud83d\udd17 References:\n1. https://github.com/OpenIdentityPlatform/OpenDJ/security/advisories/GHSA-93qr-h8pr-4593\n2. https://github.com/OpenIdentityPlatform/OpenDJ/commit/08aee4724608e4a32baa3c7d7499ec913a275aaf", "creation_timestamp": "2025-03-05T16:32:22.000000Z"}</description>
      <content:encoded>{"uuid": "d7626a97-49ee-449d-ae77-3ce6699fb3a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-93QR-H8PR-4593", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6558", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27497\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: OpenDJ is an LDAPv3 compliant directory service. OpenDJ prior to 4.9.3 contains a denial-of-service (DoS) vulnerability that causes the server to become unresponsive to all LDAP requests without crashing or restarting. This issue occurs when an alias loop exists in the LDAP database. If an ldapsearch request is executed with alias dereferencing set to \"always\" on this alias entry, the server stops responding to all future requests. Fortunately, the server can be restarted without data corruption. This vulnerability is fixed in 4.9.3.\n\ud83d\udccf Published: 2025-03-05T15:59:01.702Z\n\ud83d\udccf Modified: 2025-03-05T16:16:49.762Z\n\ud83d\udd17 References:\n1. https://github.com/OpenIdentityPlatform/OpenDJ/security/advisories/GHSA-93qr-h8pr-4593\n2. https://github.com/OpenIdentityPlatform/OpenDJ/commit/08aee4724608e4a32baa3c7d7499ec913a275aaf", "creation_timestamp": "2025-03-05T16:32:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d7626a97-49ee-449d-ae77-3ce6699fb3a2/export</guid>
      <pubDate>Wed, 05 Mar 2025 16:32:22 +0000</pubDate>
    </item>
  </channel>
</rss>
