<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 15 May 2026 09:10:33 +0000</lastBuildDate>
    <item>
      <title>6ebd4858-25fd-4e2e-8212-ae99b50458b9</title>
      <link>https://db.gcve.eu/sighting/6ebd4858-25fd-4e2e-8212-ae99b50458b9/export</link>
      <description>{"uuid": "6ebd4858-25fd-4e2e-8212-ae99b50458b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-G84X-G96G-RCJC", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2077", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23201\n\ud83d\udd39 Description: librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to Cross-site Scripting (XSS) on the parameters:`/addhost` -&amp;gt; param: community. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-16T22:18:51.754Z\n\ud83d\udccf Modified: 2025-01-16T22:18:51.754Z\n\ud83d\udd17 References:\n1. https://github.com/librenms/librenms/security/advisories/GHSA-g84x-g96g-rcjc", "creation_timestamp": "2025-01-16T22:56:33.000000Z"}</description>
      <content:encoded>{"uuid": "6ebd4858-25fd-4e2e-8212-ae99b50458b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-G84X-G96G-RCJC", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2077", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23201\n\ud83d\udd39 Description: librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to Cross-site Scripting (XSS) on the parameters:`/addhost` -&amp;gt; param: community. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-16T22:18:51.754Z\n\ud83d\udccf Modified: 2025-01-16T22:18:51.754Z\n\ud83d\udd17 References:\n1. https://github.com/librenms/librenms/security/advisories/GHSA-g84x-g96g-rcjc", "creation_timestamp": "2025-01-16T22:56:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6ebd4858-25fd-4e2e-8212-ae99b50458b9/export</guid>
      <pubDate>Thu, 16 Jan 2025 22:56:33 +0000</pubDate>
    </item>
  </channel>
</rss>
