<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 03:22:32 +0000</lastBuildDate>
    <item>
      <title>1ee58fe3-c9cb-480d-bc30-82938767dc55</title>
      <link>https://db.gcve.eu/sighting/1ee58fe3-c9cb-480d-bc30-82938767dc55/export</link>
      <description>{"uuid": "1ee58fe3-c9cb-480d-bc30-82938767dc55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31497", "type": "seen", "source": "https://t.me/cvedetector/23008", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31497 - TEIGarage XXE Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31497 \nPublished : April 15, 2025, 8:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : TEIGarage is a webservice and RESTful service to transform, convert and validate various formats, focussing on the TEI format. The Document Conversion Service contains a critical XML External Entity (XXE) Injection vulnerability in its document conversion functionality. The service processes XML files during the conversion process but fails to disable external entity processing, allowing an attacker to read arbitrary files from the server's filesystem. This vulnerability could allow attackers to read sensitive files from the server's filesystem, potentially exposing configuration files, credentials, or other confidential information. Additionally, depending on the server configuration, this could potentially be used to perform server-side request forgery (SSRF) attacks by making the server connect to internal services. This issue is patched in version 1.2.4. A workaround for this vulnerability includes disabling external entity processing in the XML parser by setting the appropriate security features (e.g., XMLConstants.FEATURE_SECURE_PROCESSING). \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T00:08:26.000000Z"}</description>
      <content:encoded>{"uuid": "1ee58fe3-c9cb-480d-bc30-82938767dc55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31497", "type": "seen", "source": "https://t.me/cvedetector/23008", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31497 - TEIGarage XXE Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31497 \nPublished : April 15, 2025, 8:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : TEIGarage is a webservice and RESTful service to transform, convert and validate various formats, focussing on the TEI format. The Document Conversion Service contains a critical XML External Entity (XXE) Injection vulnerability in its document conversion functionality. The service processes XML files during the conversion process but fails to disable external entity processing, allowing an attacker to read arbitrary files from the server's filesystem. This vulnerability could allow attackers to read sensitive files from the server's filesystem, potentially exposing configuration files, credentials, or other confidential information. Additionally, depending on the server configuration, this could potentially be used to perform server-side request forgery (SSRF) attacks by making the server connect to internal services. This issue is patched in version 1.2.4. A workaround for this vulnerability includes disabling external entity processing in the XML parser by setting the appropriate security features (e.g., XMLConstants.FEATURE_SECURE_PROCESSING). \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T00:08:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1ee58fe3-c9cb-480d-bc30-82938767dc55/export</guid>
      <pubDate>Wed, 16 Apr 2025 00:08:26 +0000</pubDate>
    </item>
    <item>
      <title>2eb66aa2-161b-4d83-8abc-ecdd1faac5ec</title>
      <link>https://db.gcve.eu/sighting/2eb66aa2-161b-4d83-8abc-ecdd1faac5ec/export</link>
      <description>{"uuid": "2eb66aa2-161b-4d83-8abc-ecdd1faac5ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3loh6o6hjes27", "content": "", "creation_timestamp": "2025-05-05T20:15:15.405489Z"}</description>
      <content:encoded>{"uuid": "2eb66aa2-161b-4d83-8abc-ecdd1faac5ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3loh6o6hjes27", "content": "", "creation_timestamp": "2025-05-05T20:15:15.405489Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2eb66aa2-161b-4d83-8abc-ecdd1faac5ec/export</guid>
      <pubDate>Mon, 05 May 2025 20:15:15 +0000</pubDate>
    </item>
    <item>
      <title>177b00b4-0bbb-4ba9-80e8-62db2703e007</title>
      <link>https://db.gcve.eu/sighting/177b00b4-0bbb-4ba9-80e8-62db2703e007/export</link>
      <description>{"uuid": "177b00b4-0bbb-4ba9-80e8-62db2703e007", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31493", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2vixor7zr2", "content": "", "creation_timestamp": "2025-05-13T16:31:44.149698Z"}</description>
      <content:encoded>{"uuid": "177b00b4-0bbb-4ba9-80e8-62db2703e007", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31493", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2vixor7zr2", "content": "", "creation_timestamp": "2025-05-13T16:31:44.149698Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/177b00b4-0bbb-4ba9-80e8-62db2703e007/export</guid>
      <pubDate>Tue, 13 May 2025 16:31:44 +0000</pubDate>
    </item>
    <item>
      <title>96343e51-e941-4687-a2a3-529470fbb106</title>
      <link>https://db.gcve.eu/sighting/96343e51-e941-4687-a2a3-529470fbb106/export</link>
      <description>{"uuid": "96343e51-e941-4687-a2a3-529470fbb106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31493", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp2wsu7f3c2h", "content": "", "creation_timestamp": "2025-05-13T16:48:02.771574Z"}</description>
      <content:encoded>{"uuid": "96343e51-e941-4687-a2a3-529470fbb106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31493", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp2wsu7f3c2h", "content": "", "creation_timestamp": "2025-05-13T16:48:02.771574Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/96343e51-e941-4687-a2a3-529470fbb106/export</guid>
      <pubDate>Tue, 13 May 2025 16:48:02 +0000</pubDate>
    </item>
    <item>
      <title>3b7570c8-059a-4e2d-a6d6-ed7d2e6afbe1</title>
      <link>https://db.gcve.eu/sighting/3b7570c8-059a-4e2d-a6d6-ed7d2e6afbe1/export</link>
      <description>{"uuid": "3b7570c8-059a-4e2d-a6d6-ed7d2e6afbe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31493", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16214", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31493\n\ud83d\udd25 CVSS Score: 6.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: Kirby is an open-source content management system. A vulnerability in versions prior to 3.9.8.3, 3.10.1.2, and 4.7.1 affects all Kirby sites that use the `collection()` helper or `$kirby-&amp;gt;collection()` method with a dynamic collection name (such as a collection name that depends on request or user data). Sites that only use fixed calls to the `collection()` helper/`$kirby-&amp;gt;collection()` method (i.e. calls with a simple string for the collection name) are *not* affected. A missing path traversal check allowed attackers to navigate and access all files on the server that were accessible to the PHP process, including files outside of the collections root or even outside of the Kirby installation. PHP code within such files was executed. Such attacks first require an attack vector in the site code that is caused by dynamic collection names, such as `collection('tags-' . get('tags'))`. It generally also requires knowledge of the site structure and the server's file system by the attacker, although it can be possible to find vulnerable setups through automated methods such as fuzzing. In a vulnerable setup, this could cause damage to the confidentiality and integrity of the server. The problem has been patched in Kirby 3.9.8.3, Kirby 3.10.1.2, and Kirby 4.7.1. In all of the mentioned releases, the maintainers of Kirby have added a check for the collection path that ensures that the resulting path is contained within the configured collections root. Collection paths that point outside of the collections root will not be loaded.\n\ud83d\udccf Published: 2025-05-13T15:24:40.178Z\n\ud83d\udccf Modified: 2025-05-13T19:08:37.490Z\n\ud83d\udd17 References:\n1. https://github.com/getkirby/kirby/security/advisories/GHSA-x275-h9j4-7p4h\n2. https://github.com/getkirby/kirby/releases/tag/3.10.1.2\n3. https://github.com/getkirby/kirby/releases/tag/3.9.8.3\n4. https://github.com/getkirby/kirby/releases/tag/4.7.1", "creation_timestamp": "2025-05-13T19:31:11.000000Z"}</description>
      <content:encoded>{"uuid": "3b7570c8-059a-4e2d-a6d6-ed7d2e6afbe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31493", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16214", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31493\n\ud83d\udd25 CVSS Score: 6.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: Kirby is an open-source content management system. A vulnerability in versions prior to 3.9.8.3, 3.10.1.2, and 4.7.1 affects all Kirby sites that use the `collection()` helper or `$kirby-&amp;gt;collection()` method with a dynamic collection name (such as a collection name that depends on request or user data). Sites that only use fixed calls to the `collection()` helper/`$kirby-&amp;gt;collection()` method (i.e. calls with a simple string for the collection name) are *not* affected. A missing path traversal check allowed attackers to navigate and access all files on the server that were accessible to the PHP process, including files outside of the collections root or even outside of the Kirby installation. PHP code within such files was executed. Such attacks first require an attack vector in the site code that is caused by dynamic collection names, such as `collection('tags-' . get('tags'))`. It generally also requires knowledge of the site structure and the server's file system by the attacker, although it can be possible to find vulnerable setups through automated methods such as fuzzing. In a vulnerable setup, this could cause damage to the confidentiality and integrity of the server. The problem has been patched in Kirby 3.9.8.3, Kirby 3.10.1.2, and Kirby 4.7.1. In all of the mentioned releases, the maintainers of Kirby have added a check for the collection path that ensures that the resulting path is contained within the configured collections root. Collection paths that point outside of the collections root will not be loaded.\n\ud83d\udccf Published: 2025-05-13T15:24:40.178Z\n\ud83d\udccf Modified: 2025-05-13T19:08:37.490Z\n\ud83d\udd17 References:\n1. https://github.com/getkirby/kirby/security/advisories/GHSA-x275-h9j4-7p4h\n2. https://github.com/getkirby/kirby/releases/tag/3.10.1.2\n3. https://github.com/getkirby/kirby/releases/tag/3.9.8.3\n4. https://github.com/getkirby/kirby/releases/tag/4.7.1", "creation_timestamp": "2025-05-13T19:31:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3b7570c8-059a-4e2d-a6d6-ed7d2e6afbe1/export</guid>
      <pubDate>Tue, 13 May 2025 19:31:11 +0000</pubDate>
    </item>
    <item>
      <title>110c39ba-e19b-4df0-8c16-8bc744d1b79f</title>
      <link>https://db.gcve.eu/sighting/110c39ba-e19b-4df0-8c16-8bc744d1b79f/export</link>
      <description>{"uuid": "110c39ba-e19b-4df0-8c16-8bc744d1b79f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31493", "type": "seen", "source": "https://t.me/cvedetector/25205", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31493 - Kirby Path Traversal and Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31493 \nPublished : May 13, 2025, 4:15 p.m. | 59\u00a0minutes ago \nDescription : Kirby is an open-source content management system. A vulnerability in versions prior to 3.9.8.3, 3.10.1.2, and 4.7.1 affects all Kirby sites that use the `collection()` helper or `$kirby-&amp;gt;collection()` method with a dynamic collection name (such as a collection name that depends on request or user data). Sites that only use fixed calls to the `collection()` helper/`$kirby-&amp;gt;collection()` method (i.e. calls with a simple string for the collection name) are *not* affected. A missing path traversal check allowed attackers to navigate and access all files on the server that were accessible to the PHP process, including files outside of the collections root or even outside of the Kirby installation. PHP code within such files was executed. Such attacks first require an attack vector in the site code that is caused by dynamic collection names, such as `collection('tags-' . get('tags'))`. It generally also requires knowledge of the site structure and the server's file system by the attacker, although it can be possible to find vulnerable setups through automated methods such as fuzzing. In a vulnerable setup, this could cause damage to the confidentiality and integrity of the server. The problem has been patched in Kirby 3.9.8.3, Kirby 3.10.1.2, and Kirby 4.7.1. In all of the mentioned releases, the maintainers of Kirby have added a check for the collection path that ensures that the resulting path is contained within the configured collections root. Collection paths that point outside of the collections root will not be loaded. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T19:43:48.000000Z"}</description>
      <content:encoded>{"uuid": "110c39ba-e19b-4df0-8c16-8bc744d1b79f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31493", "type": "seen", "source": "https://t.me/cvedetector/25205", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31493 - Kirby Path Traversal and Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31493 \nPublished : May 13, 2025, 4:15 p.m. | 59\u00a0minutes ago \nDescription : Kirby is an open-source content management system. A vulnerability in versions prior to 3.9.8.3, 3.10.1.2, and 4.7.1 affects all Kirby sites that use the `collection()` helper or `$kirby-&amp;gt;collection()` method with a dynamic collection name (such as a collection name that depends on request or user data). Sites that only use fixed calls to the `collection()` helper/`$kirby-&amp;gt;collection()` method (i.e. calls with a simple string for the collection name) are *not* affected. A missing path traversal check allowed attackers to navigate and access all files on the server that were accessible to the PHP process, including files outside of the collections root or even outside of the Kirby installation. PHP code within such files was executed. Such attacks first require an attack vector in the site code that is caused by dynamic collection names, such as `collection('tags-' . get('tags'))`. It generally also requires knowledge of the site structure and the server's file system by the attacker, although it can be possible to find vulnerable setups through automated methods such as fuzzing. In a vulnerable setup, this could cause damage to the confidentiality and integrity of the server. The problem has been patched in Kirby 3.9.8.3, Kirby 3.10.1.2, and Kirby 4.7.1. In all of the mentioned releases, the maintainers of Kirby have added a check for the collection path that ensures that the resulting path is contained within the configured collections root. Collection paths that point outside of the collections root will not be loaded. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T19:43:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/110c39ba-e19b-4df0-8c16-8bc744d1b79f/export</guid>
      <pubDate>Tue, 13 May 2025 19:43:48 +0000</pubDate>
    </item>
    <item>
      <title>1d3ff249-24fa-4c73-8bdb-8d7acc7712b8</title>
      <link>https://db.gcve.eu/sighting/1d3ff249-24fa-4c73-8bdb-8d7acc7712b8/export</link>
      <description>{"uuid": "1d3ff249-24fa-4c73-8bdb-8d7acc7712b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:37.000000Z"}</description>
      <content:encoded>{"uuid": "1d3ff249-24fa-4c73-8bdb-8d7acc7712b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1d3ff249-24fa-4c73-8bdb-8d7acc7712b8/export</guid>
      <pubDate>Sat, 09 Aug 2025 17:25:37 +0000</pubDate>
    </item>
    <item>
      <title>24ac1d6f-0418-43f3-b556-7fc235d93619</title>
      <link>https://db.gcve.eu/sighting/24ac1d6f-0418-43f3-b556-7fc235d93619/export</link>
      <description>{"uuid": "24ac1d6f-0418-43f3-b556-7fc235d93619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:38.000000Z"}</description>
      <content:encoded>{"uuid": "24ac1d6f-0418-43f3-b556-7fc235d93619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/24ac1d6f-0418-43f3-b556-7fc235d93619/export</guid>
      <pubDate>Wed, 10 Sep 2025 07:00:38 +0000</pubDate>
    </item>
    <item>
      <title>701b35b1-dda5-4a88-af86-5778e54b4fe8</title>
      <link>https://db.gcve.eu/sighting/701b35b1-dda5-4a88-af86-5778e54b4fe8/export</link>
      <description>{"uuid": "701b35b1-dda5-4a88-af86-5778e54b4fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lyvqzxkfzs2x", "content": "", "creation_timestamp": "2025-09-15T21:33:08.208339Z"}</description>
      <content:encoded>{"uuid": "701b35b1-dda5-4a88-af86-5778e54b4fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lyvqzxkfzs2x", "content": "", "creation_timestamp": "2025-09-15T21:33:08.208339Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/701b35b1-dda5-4a88-af86-5778e54b4fe8/export</guid>
      <pubDate>Mon, 15 Sep 2025 21:33:08 +0000</pubDate>
    </item>
    <item>
      <title>e3a3cb93-22c6-46cd-88ff-974f45b5911f</title>
      <link>https://db.gcve.eu/sighting/e3a3cb93-22c6-46cd-88ff-974f45b5911f/export</link>
      <description>{"uuid": "e3a3cb93-22c6-46cd-88ff-974f45b5911f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/253", "content": "", "creation_timestamp": "2025-12-08T16:04:49.000000Z"}</description>
      <content:encoded>{"uuid": "e3a3cb93-22c6-46cd-88ff-974f45b5911f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31498", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/253", "content": "", "creation_timestamp": "2025-12-08T16:04:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e3a3cb93-22c6-46cd-88ff-974f45b5911f/export</guid>
      <pubDate>Mon, 08 Dec 2025 16:04:49 +0000</pubDate>
    </item>
  </channel>
</rss>
