<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 05:49:53 +0000</lastBuildDate>
    <item>
      <title>97cdcfbb-e25c-472d-872f-9087439c990b</title>
      <link>https://db.gcve.eu/sighting/97cdcfbb-e25c-472d-872f-9087439c990b/export</link>
      <description>{"uuid": "97cdcfbb-e25c-472d-872f-9087439c990b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5029", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17118", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5029\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in Kingdee Cloud Galaxy Private Cloud BBC System up to 9.0 Patch April 2025 and classified as critical. Affected by this vulnerability is the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file fileUpload/deleteFileAction.jhtml of the component File Handler. The manipulation of the argument filePath leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.\n\ud83d\udccf Published: 2025-05-21T14:31:09.477Z\n\ud83d\udccf Modified: 2025-05-21T14:31:09.477Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309847\n2. https://vuldb.com/?ctiid.309847\n3. https://vuldb.com/?submit.570956\n4. https://wx.mail.qq.com/s?k=nFbp0U0gSX0QVechIO\n5. https://vip.kingdee.com/knowledge/708656434111770368\n6. https://vip.kingdee.com/school/detail/713028702245944320?productLineId=1&amp;amp;lang=zh-CN", "creation_timestamp": "2025-05-21T14:42:18.000000Z"}</description>
      <content:encoded>{"uuid": "97cdcfbb-e25c-472d-872f-9087439c990b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5029", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17118", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5029\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in Kingdee Cloud Galaxy Private Cloud BBC System up to 9.0 Patch April 2025 and classified as critical. Affected by this vulnerability is the function BaseServiceFactory.getFileUploadService.deleteFileAction of the file fileUpload/deleteFileAction.jhtml of the component File Handler. The manipulation of the argument filePath leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.\n\ud83d\udccf Published: 2025-05-21T14:31:09.477Z\n\ud83d\udccf Modified: 2025-05-21T14:31:09.477Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309847\n2. https://vuldb.com/?ctiid.309847\n3. https://vuldb.com/?submit.570956\n4. https://wx.mail.qq.com/s?k=nFbp0U0gSX0QVechIO\n5. https://vip.kingdee.com/knowledge/708656434111770368\n6. https://vip.kingdee.com/school/detail/713028702245944320?productLineId=1&amp;amp;lang=zh-CN", "creation_timestamp": "2025-05-21T14:42:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/97cdcfbb-e25c-472d-872f-9087439c990b/export</guid>
      <pubDate>Wed, 21 May 2025 14:42:18 +0000</pubDate>
    </item>
    <item>
      <title>4c57621c-3911-444f-9c9e-d14ecfba631f</title>
      <link>https://db.gcve.eu/sighting/4c57621c-3911-444f-9c9e-d14ecfba631f/export</link>
      <description>{"uuid": "4c57621c-3911-444f-9c9e-d14ecfba631f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5029", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpp4amnoce2o", "content": "", "creation_timestamp": "2025-05-21T17:18:20.195836Z"}</description>
      <content:encoded>{"uuid": "4c57621c-3911-444f-9c9e-d14ecfba631f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-5029", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpp4amnoce2o", "content": "", "creation_timestamp": "2025-05-21T17:18:20.195836Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4c57621c-3911-444f-9c9e-d14ecfba631f/export</guid>
      <pubDate>Wed, 21 May 2025 17:18:20 +0000</pubDate>
    </item>
  </channel>
</rss>
