<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 21:30:47 +0000</lastBuildDate>
    <item>
      <title>03f0b300-47af-45f1-97b2-6bce61e1b8f9</title>
      <link>https://db.gcve.eu/sighting/03f0b300-47af-45f1-97b2-6bce61e1b8f9/export</link>
      <description>{"uuid": "03f0b300-47af-45f1-97b2-6bce61e1b8f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114196115958327030", "content": "", "creation_timestamp": "2025-03-20T18:14:06.134221Z"}</description>
      <content:encoded>{"uuid": "03f0b300-47af-45f1-97b2-6bce61e1b8f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114196115958327030", "content": "", "creation_timestamp": "2025-03-20T18:14:06.134221Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/03f0b300-47af-45f1-97b2-6bce61e1b8f9/export</guid>
      <pubDate>Thu, 20 Mar 2025 18:14:06 +0000</pubDate>
    </item>
    <item>
      <title>3d9c1544-3560-4e6f-8d29-a2261a6e5a0f</title>
      <link>https://db.gcve.eu/sighting/3d9c1544-3560-4e6f-8d29-a2261a6e5a0f/export</link>
      <description>{"uuid": "3d9c1544-3560-4e6f-8d29-a2261a6e5a0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-Q9F5-625G-XM39", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8257", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29914\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.\n\ud83d\udccf Published: 2025-03-20T17:44:59.024Z\n\ud83d\udccf Modified: 2025-03-20T17:44:59.024Z\n\ud83d\udd17 References:\n1. https://github.com/corazawaf/coraza/security/advisories/GHSA-q9f5-625g-xm39\n2. https://github.com/corazawaf/coraza/commit/4722c9ad0d502abd56b8d6733c6b47eb4111742d", "creation_timestamp": "2025-03-20T18:20:54.000000Z"}</description>
      <content:encoded>{"uuid": "3d9c1544-3560-4e6f-8d29-a2261a6e5a0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-Q9F5-625G-XM39", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8257", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29914\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.\n\ud83d\udccf Published: 2025-03-20T17:44:59.024Z\n\ud83d\udccf Modified: 2025-03-20T17:44:59.024Z\n\ud83d\udd17 References:\n1. https://github.com/corazawaf/coraza/security/advisories/GHSA-q9f5-625g-xm39\n2. https://github.com/corazawaf/coraza/commit/4722c9ad0d502abd56b8d6733c6b47eb4111742d", "creation_timestamp": "2025-03-20T18:20:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3d9c1544-3560-4e6f-8d29-a2261a6e5a0f/export</guid>
      <pubDate>Thu, 20 Mar 2025 18:20:54 +0000</pubDate>
    </item>
    <item>
      <title>5eb5948f-a5a3-4b2e-90f6-994c6372f31e</title>
      <link>https://db.gcve.eu/sighting/5eb5948f-a5a3-4b2e-90f6-994c6372f31e/export</link>
      <description>{"uuid": "5eb5948f-a5a3-4b2e-90f6-994c6372f31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/19367fed712521a1833c7c1711d66e07", "content": "", "creation_timestamp": "2026-01-24T21:30:35.000000Z"}</description>
      <content:encoded>{"uuid": "5eb5948f-a5a3-4b2e-90f6-994c6372f31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/19367fed712521a1833c7c1711d66e07", "content": "", "creation_timestamp": "2026-01-24T21:30:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5eb5948f-a5a3-4b2e-90f6-994c6372f31e/export</guid>
      <pubDate>Sat, 24 Jan 2026 21:30:35 +0000</pubDate>
    </item>
    <item>
      <title>5b1380bb-0785-44ba-a4e5-10c047781be2</title>
      <link>https://db.gcve.eu/sighting/5b1380bb-0785-44ba-a4e5-10c047781be2/export</link>
      <description>{"uuid": "5b1380bb-0785-44ba-a4e5-10c047781be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/c2368f00bd72d41149f54bfc49fec47c", "content": "", "creation_timestamp": "2026-01-24T21:30:36.000000Z"}</description>
      <content:encoded>{"uuid": "5b1380bb-0785-44ba-a4e5-10c047781be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/c2368f00bd72d41149f54bfc49fec47c", "content": "", "creation_timestamp": "2026-01-24T21:30:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5b1380bb-0785-44ba-a4e5-10c047781be2/export</guid>
      <pubDate>Sat, 24 Jan 2026 21:30:36 +0000</pubDate>
    </item>
    <item>
      <title>1ac8f174-2e8f-49dc-b49b-c3899f753f09</title>
      <link>https://db.gcve.eu/sighting/1ac8f174-2e8f-49dc-b49b-c3899f753f09/export</link>
      <description>{"uuid": "1ac8f174-2e8f-49dc-b49b-c3899f753f09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/d47e577d192090116b68a7b27e69bca4", "content": "", "creation_timestamp": "2026-01-24T22:42:37.000000Z"}</description>
      <content:encoded>{"uuid": "1ac8f174-2e8f-49dc-b49b-c3899f753f09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-q9f5-625g-xm39", "type": "seen", "source": "https://gist.github.com/alon710/d47e577d192090116b68a7b27e69bca4", "content": "", "creation_timestamp": "2026-01-24T22:42:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1ac8f174-2e8f-49dc-b49b-c3899f753f09/export</guid>
      <pubDate>Sat, 24 Jan 2026 22:42:37 +0000</pubDate>
    </item>
  </channel>
</rss>
