<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 21:31:07 +0000</lastBuildDate>
    <item>
      <title>3303907e-922c-4360-bc6f-92ecc21da7c6</title>
      <link>https://db.gcve.eu/sighting/3303907e-922c-4360-bc6f-92ecc21da7c6/export</link>
      <description>{"uuid": "3303907e-922c-4360-bc6f-92ecc21da7c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4215", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lo7r4siadrq2", "content": "", "creation_timestamp": "2025-05-02T21:24:20.430622Z"}</description>
      <content:encoded>{"uuid": "3303907e-922c-4360-bc6f-92ecc21da7c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4215", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lo7r4siadrq2", "content": "", "creation_timestamp": "2025-05-02T21:24:20.430622Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3303907e-922c-4360-bc6f-92ecc21da7c6/export</guid>
      <pubDate>Fri, 02 May 2025 21:24:20 +0000</pubDate>
    </item>
    <item>
      <title>1da2b6eb-8f1b-4aac-991d-43531f2e5e9a</title>
      <link>https://db.gcve.eu/sighting/1da2b6eb-8f1b-4aac-991d-43531f2e5e9a/export</link>
      <description>{"uuid": "1da2b6eb-8f1b-4aac-991d-43531f2e5e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4215", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo7zvpbwve2l", "content": "", "creation_timestamp": "2025-05-03T00:01:20.558023Z"}</description>
      <content:encoded>{"uuid": "1da2b6eb-8f1b-4aac-991d-43531f2e5e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4215", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo7zvpbwve2l", "content": "", "creation_timestamp": "2025-05-03T00:01:20.558023Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1da2b6eb-8f1b-4aac-991d-43531f2e5e9a/export</guid>
      <pubDate>Sat, 03 May 2025 00:01:20 +0000</pubDate>
    </item>
    <item>
      <title>a3c4f4f2-b2ae-4ad1-ac6c-bb989e4ef24c</title>
      <link>https://db.gcve.eu/sighting/a3c4f4f2-b2ae-4ad1-ac6c-bb989e4ef24c/export</link>
      <description>{"uuid": "a3c4f4f2-b2ae-4ad1-ac6c-bb989e4ef24c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4215", "type": "seen", "source": "https://t.me/cvedetector/24375", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4215 - \"uBlock Origin Regular Expression Complexity Remote Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-4215 \nPublished : May 2, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as problematic. Affected is the function currentStateChanged of the file src/js/1p-filters.js of the component UI. The manipulation leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.63.3b17 is able to address this issue. The patch is identified as eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c. It is recommended to upgrade the affected component. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-03T00:19:10.000000Z"}</description>
      <content:encoded>{"uuid": "a3c4f4f2-b2ae-4ad1-ac6c-bb989e4ef24c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4215", "type": "seen", "source": "https://t.me/cvedetector/24375", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4215 - \"uBlock Origin Regular Expression Complexity Remote Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-4215 \nPublished : May 2, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as problematic. Affected is the function currentStateChanged of the file src/js/1p-filters.js of the component UI. The manipulation leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.63.3b17 is able to address this issue. The patch is identified as eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c. It is recommended to upgrade the affected component. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-03T00:19:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a3c4f4f2-b2ae-4ad1-ac6c-bb989e4ef24c/export</guid>
      <pubDate>Sat, 03 May 2025 00:19:10 +0000</pubDate>
    </item>
  </channel>
</rss>
