<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 18:43:14 +0000</lastBuildDate>
    <item>
      <title>00134d37-9afc-4fac-8f3f-cc55d256bb74</title>
      <link>https://db.gcve.eu/sighting/00134d37-9afc-4fac-8f3f-cc55d256bb74/export</link>
      <description>{"uuid": "00134d37-9afc-4fac-8f3f-cc55d256bb74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CM7W-99V2-PRRQ", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2211", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23202\n\ud83d\udd39 Description: Bible Module is a tool designed for ROBLOX developers to integrate Bible functionality into their games. The `FetchVerse` and `FetchPassage` functions in the Bible Module are susceptible to injection attacks due to the absence of input validation. This vulnerability could allow an attacker to manipulate the API request URLs, potentially leading to unauthorized access or data tampering. This issue has been addressed in version 0.0.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-17T20:18:20.352Z\n\ud83d\udccf Modified: 2025-01-17T20:18:20.352Z\n\ud83d\udd17 References:\n1. https://github.com/devycreates/Bible-Module/security/advisories/GHSA-cm7w-99v2-prrq\n2. https://github.com/devycreates/Bible-Module/commit/5b783855fc3285be2da8639c97ac37af28f8c55a", "creation_timestamp": "2025-01-17T20:57:56.000000Z"}</description>
      <content:encoded>{"uuid": "00134d37-9afc-4fac-8f3f-cc55d256bb74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-CM7W-99V2-PRRQ", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2211", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23202\n\ud83d\udd39 Description: Bible Module is a tool designed for ROBLOX developers to integrate Bible functionality into their games. The `FetchVerse` and `FetchPassage` functions in the Bible Module are susceptible to injection attacks due to the absence of input validation. This vulnerability could allow an attacker to manipulate the API request URLs, potentially leading to unauthorized access or data tampering. This issue has been addressed in version 0.0.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-17T20:18:20.352Z\n\ud83d\udccf Modified: 2025-01-17T20:18:20.352Z\n\ud83d\udd17 References:\n1. https://github.com/devycreates/Bible-Module/security/advisories/GHSA-cm7w-99v2-prrq\n2. https://github.com/devycreates/Bible-Module/commit/5b783855fc3285be2da8639c97ac37af28f8c55a", "creation_timestamp": "2025-01-17T20:57:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/00134d37-9afc-4fac-8f3f-cc55d256bb74/export</guid>
      <pubDate>Fri, 17 Jan 2025 20:57:56 +0000</pubDate>
    </item>
    <item>
      <title>ee6dd9a8-96d6-401e-84c6-6e5059f4fc4a</title>
      <link>https://db.gcve.eu/sighting/ee6dd9a8-96d6-401e-84c6-6e5059f4fc4a/export</link>
      <description>{"uuid": "ee6dd9a8-96d6-401e-84c6-6e5059f4fc4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-cm7w-99v2-prrq", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113845775391436167", "content": "", "creation_timestamp": "2025-01-17T21:17:52.856031Z"}</description>
      <content:encoded>{"uuid": "ee6dd9a8-96d6-401e-84c6-6e5059f4fc4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-cm7w-99v2-prrq", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113845775391436167", "content": "", "creation_timestamp": "2025-01-17T21:17:52.856031Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ee6dd9a8-96d6-401e-84c6-6e5059f4fc4a/export</guid>
      <pubDate>Fri, 17 Jan 2025 21:17:52 +0000</pubDate>
    </item>
  </channel>
</rss>
