<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 19:06:23 +0000</lastBuildDate>
    <item>
      <title>1d473ecd-1679-43ee-a8b4-7c61ef533441</title>
      <link>https://db.gcve.eu/sighting/1d473ecd-1679-43ee-a8b4-7c61ef533441/export</link>
      <description>{"uuid": "1d473ecd-1679-43ee-a8b4-7c61ef533441", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-xwgg-m7fx-83wx", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114535847071295088", "content": "", "creation_timestamp": "2025-05-19T18:12:11.232282Z"}</description>
      <content:encoded>{"uuid": "1d473ecd-1679-43ee-a8b4-7c61ef533441", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-xwgg-m7fx-83wx", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114535847071295088", "content": "", "creation_timestamp": "2025-05-19T18:12:11.232282Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1d473ecd-1679-43ee-a8b4-7c61ef533441/export</guid>
      <pubDate>Mon, 19 May 2025 18:12:11 +0000</pubDate>
    </item>
    <item>
      <title>ae24ccc7-ac1c-48f0-88dc-f1d7483a075c</title>
      <link>https://db.gcve.eu/sighting/ae24ccc7-ac1c-48f0-88dc-f1d7483a075c/export</link>
      <description>{"uuid": "ae24ccc7-ac1c-48f0-88dc-f1d7483a075c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-xwgg-m7fx-83wx", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lpk6dyaf5q2d", "content": "", "creation_timestamp": "2025-05-19T18:12:42.113858Z"}</description>
      <content:encoded>{"uuid": "ae24ccc7-ac1c-48f0-88dc-f1d7483a075c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-xwgg-m7fx-83wx", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lpk6dyaf5q2d", "content": "", "creation_timestamp": "2025-05-19T18:12:42.113858Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ae24ccc7-ac1c-48f0-88dc-f1d7483a075c/export</guid>
      <pubDate>Mon, 19 May 2025 18:12:42 +0000</pubDate>
    </item>
    <item>
      <title>27c1229f-5988-4d4b-a89a-e3f75c5dfcea</title>
      <link>https://db.gcve.eu/sighting/27c1229f-5988-4d4b-a89a-e3f75c5dfcea/export</link>
      <description>{"uuid": "27c1229f-5988-4d4b-a89a-e3f75c5dfcea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-XWGG-M7FX-83WX", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16971", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47282\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Gardener External DNS Management is an environment to manage external DNS entries for a kubernetes cluster. A security vulnerability was discovered in Gardener's External DNS Management prior to version 0.23.6 that could allow a user with administrative privileges for a Gardener project or a user with administrative privileges for a shoot cluster, including administrative privileges for a single namespace of the shoot cluster, to obtain control over the seed cluster where the shoot cluster is managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. The affected component is `gardener/external-dns-management`. The `external-dns-management` component may also be deployed on the seeds by the `gardener/gardener-extension-shoot-dns-service` extension when the extension is enabled. In this case, all versions of the `shoot-dns-service` extension `&amp;lt;= v1.60.0` are affected by this vulnerability. Version 0.23.6 of Gardener External DNS Management fixes the issue.\n\ud83d\udccf Published: 2025-05-19T17:53:28.412Z\n\ud83d\udccf Modified: 2025-05-20T13:10:56.740Z\n\ud83d\udd17 References:\n1. https://github.com/gardener/external-dns-management/security/advisories/GHSA-xwgg-m7fx-83wx", "creation_timestamp": "2025-05-20T13:40:26.000000Z"}</description>
      <content:encoded>{"uuid": "27c1229f-5988-4d4b-a89a-e3f75c5dfcea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-XWGG-M7FX-83WX", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16971", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47282\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Gardener External DNS Management is an environment to manage external DNS entries for a kubernetes cluster. A security vulnerability was discovered in Gardener's External DNS Management prior to version 0.23.6 that could allow a user with administrative privileges for a Gardener project or a user with administrative privileges for a shoot cluster, including administrative privileges for a single namespace of the shoot cluster, to obtain control over the seed cluster where the shoot cluster is managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. The affected component is `gardener/external-dns-management`. The `external-dns-management` component may also be deployed on the seeds by the `gardener/gardener-extension-shoot-dns-service` extension when the extension is enabled. In this case, all versions of the `shoot-dns-service` extension `&amp;lt;= v1.60.0` are affected by this vulnerability. Version 0.23.6 of Gardener External DNS Management fixes the issue.\n\ud83d\udccf Published: 2025-05-19T17:53:28.412Z\n\ud83d\udccf Modified: 2025-05-20T13:10:56.740Z\n\ud83d\udd17 References:\n1. https://github.com/gardener/external-dns-management/security/advisories/GHSA-xwgg-m7fx-83wx", "creation_timestamp": "2025-05-20T13:40:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/27c1229f-5988-4d4b-a89a-e3f75c5dfcea/export</guid>
      <pubDate>Tue, 20 May 2025 13:40:26 +0000</pubDate>
    </item>
  </channel>
</rss>
