<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-19T08:27:23.702364+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/52e92f0e-6e30-41bb-866c-6b7b40d7a7dc/export</id>
    <title>52e92f0e-6e30-41bb-866c-6b7b40d7a7dc</title>
    <updated>2026-05-19T08:27:23.976334+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "52e92f0e-6e30-41bb-866c-6b7b40d7a7dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "exploited", "source": "https://t.me/SecLabNews/15454", "content": "Specula: \u043a\u0430\u043a \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 Outlook \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\n\n\u26a0\ufe0f \u041d\u0430 \u0434\u043d\u044f\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f TrustedSec \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043d\u043e\u0432\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 Microsoft Outlook, \u043d\u0430\u0437\u0432\u0430\u043d\u043d\u044b\u0439 \u00abSpecula\u00bb. \u042d\u0442\u043e\u0442 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f Outlook \u043a\u0430\u043a \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0443 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f (C2). \n\n\ud83d\udee1 \u041e\u0441\u043d\u043e\u0432\u043e\u0439 \u0434\u043b\u044f \u0440\u0430\u0431\u043e\u0442\u044b Specula \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2017-11774, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 Microsoft \u0432 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 2017 \u0433\u043e\u0434\u0430. \u0414\u0430\u043d\u043d\u044b\u0439 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0431\u043e\u0439\u0442\u0438 \u0437\u0430\u0449\u0438\u0442\u043d\u044b\u0435 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b Outlook \u0438 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u043a\u0430\u0441\u0442\u043e\u043c\u043d\u0443\u044e \u0434\u043e\u043c\u0430\u0448\u043d\u044e\u044e \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f WebView. \n\n\ud83d\udcc4 \u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0434\u0430\u043d\u043d\u044b\u043c Microsoft, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u044b, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c. \u041e\u0442\u043a\u0440\u044b\u0442\u0438\u0435 \u0442\u0430\u043a\u0438\u0445 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \n\n#cybersecurity #Outlook #Specula #Microsoft @SecLabNews", "creation_timestamp": "2024-07-31T12:33:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/52e92f0e-6e30-41bb-866c-6b7b40d7a7dc/export"/>
    <published>2024-07-31T12:33:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e3ac44c0-24e1-4e26-b6b0-04b51c6da415/export</id>
    <title>e3ac44c0-24e1-4e26-b6b0-04b51c6da415</title>
    <updated>2026-05-19T08:27:23.976231+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e3ac44c0-24e1-4e26-b6b0-04b51c6da415", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "seen", "source": "https://t.me/CyberBulletin/226", "content": "\u26a1Specula\u2019s effectiveness lies in its exploitation of a known vulnerability (CVE-2017-11774). This vulnerability allows attackers to bypass Outlook\u2019s security measures and create custom homepages within the application. By modifying specific registry keys, these malicious homepages can be used to trigger the execution of VBScript files, granting attackers unauthorized access and control over your system.\n\n#CyberBulletin", "creation_timestamp": "2024-07-31T17:33:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e3ac44c0-24e1-4e26-b6b0-04b51c6da415/export"/>
    <published>2024-07-31T17:33:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/18874d5f-3407-469e-94d9-5738db2b31b0/export</id>
    <title>18874d5f-3407-469e-94d9-5738db2b31b0</title>
    <updated>2026-05-19T08:27:23.976133+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "18874d5f-3407-469e-94d9-5738db2b31b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "seen", "source": "https://t.me/GrayHatsHack/8429", "content": "\u26a1Specula\u2019s effectiveness lies in its exploitation of a known vulnerability (CVE-2017-11774). This vulnerability allows attackers to bypass Outlook\u2019s security measures and create custom homepages within the application. By modifying specific registry keys, these malicious homepages can be used to trigger the execution of VBScript files, granting attackers unauthorized access and control over your system.\n\n#CyberBulletin", "creation_timestamp": "2024-07-31T17:44:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/18874d5f-3407-469e-94d9-5738db2b31b0/export"/>
    <published>2024-07-31T17:44:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/761c7e02-5bbe-4d20-9523-8c9514965b6a/export</id>
    <title>761c7e02-5bbe-4d20-9523-8c9514965b6a</title>
    <updated>2026-05-19T08:27:23.976035+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "761c7e02-5bbe-4d20-9523-8c9514965b6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "seen", "source": "https://t.me/GrayHatsHack/7117", "content": "\u26a1Specula\u2019s effectiveness lies in its exploitation of a known vulnerability (CVE-2017-11774). This vulnerability allows attackers to bypass Outlook\u2019s security measures and create custom homepages within the application. By modifying specific registry keys, these malicious homepages can be used to trigger the execution of VBScript files, granting attackers unauthorized access and control over your system.\n\n#CyberBulletin", "creation_timestamp": "2024-07-31T17:44:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/761c7e02-5bbe-4d20-9523-8c9514965b6a/export"/>
    <published>2024-07-31T17:44:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5011274f-7d29-4fe6-b881-fb359c94d05c/export</id>
    <title>5011274f-7d29-4fe6-b881-fb359c94d05c</title>
    <updated>2026-05-19T08:27:23.975892+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5011274f-7d29-4fe6-b881-fb359c94d05c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "exploited", "source": "https://t.me/haccking/11099", "content": "\u041d\u043e\u0432\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 Specula \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 Outlook \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 Windows\n\n#Outlook #C2 #RedTeam\n\nMicrosoft Outlook \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u0435\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0432 C2 (\u043a\u043e\u043c\u0430\u043d\u0434\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440) \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430. \u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b TrustedSec \u0434\u0430\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a Specula, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u0440\u0438\u0433\u043e\u0434\u0438\u0442\u0441\u044f \u0434\u043b\u044f Red\u00a0Teaming.\n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, Specula \u0441\u043e\u0437\u0434\u0430\u0451\u0442 \u043a\u0430\u0441\u0442\u043e\u043c\u043d\u0443\u044e \u0434\u043e\u043c\u0430\u0448\u043d\u044e\u044e \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443 WebView \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2017-11774, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u043e\u0431\u043e\u0439\u0442\u0438 \u0437\u0430\u0449\u0438\u0442\u043d\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Outlook. \u042d\u0442\u0443 \u0431\u0440\u0435\u0448\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0438 \u0435\u0449\u0451 \u0432 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 2017 \u0433\u043e\u0434\u0430.\n\n\u00ab\u0414\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0436\u0435\u0440\u0442\u0432\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442 \u0438 \u0443\u0431\u0435\u0434\u0438\u0442\u044c \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u0435\u0433\u043e\u00bb, \u2014 \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u043b\u0430 CVE-2017-11774 Microsoft.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e \u0447\u0442\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0443\u0441\u043b\u043e\u0432\u043d\u044b\u0439 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u043c\u043e\u0436\u0435\u0442 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0434\u043e\u043c\u0430\u0448\u043d\u044e\u044e \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0439 \u0432 \u0440\u0435\u0435\u0441\u0442\u0440\u0435 Windows. \u042d\u0442\u043e \u0441\u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0434\u0430\u0436\u0435 \u0441 \u0442\u0435\u043c\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438, \u0433\u0434\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u044b \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0441\u0431\u043e\u0440\u043a\u0438 Office 365.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 TrustedSec, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u0432\u0448\u0438\u0435 \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a Specula, \u043e\u0431\u044a\u044f\u0441\u043d\u044f\u044e\u0442, \u0447\u0442\u043e \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 Outlook. \u0414\u043b\u044f \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u043a\u0430\u0441\u0442\u043e\u043c\u043d\u043e\u0439 \u0434\u043e\u043c\u0430\u0448\u043d\u0435\u0439 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b Specula \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043a\u043b\u044e\u0447\u0438 \u0440\u0435\u0435\u0441\u0442\u0440\u0430, \u043e\u0431\u0440\u0430\u0449\u0430\u044e\u0449\u0438\u0435\u0441\u044f \u043a \u0438\u043d\u0442\u0435\u0440\u0430\u043a\u0442\u0438\u0432\u043d\u043e\u043c\u0443 \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0443 Python.\n\n\u0422\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043c\u043e\u0433\u0443\u0442 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0446\u0435\u043b\u0435\u0432\u043e\u0439 URL \u0432 \u043a\u043b\u044e\u0447\u0435 \u0440\u0435\u0435\u0441\u0442\u0440\u0430 Outlook WebView \u2014HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\WebView\\ \u2014 \u0438 \u0443\u043a\u0430\u0437\u0430\u0442\u044c \u0442\u0430\u043c \u0430\u0434\u0440\u0435\u0441 \u0441\u0432\u043e\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430.\n\n\u041d\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0435 \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0431\u0443\u0434\u0443\u0442 \u0440\u0430\u0437\u043c\u0435\u0449\u0430\u0442\u044c\u0441\u044f \u043a\u0430\u0441\u0442\u043e\u043c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b VBscript, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434 \u0432 Windows.\n\n\u00ab\u041d\u0430\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u0432\u0435\u043a\u0442\u043e\u0440 \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c \u0441\u043e\u0442\u0435\u043d \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. \u0418 \u044d\u0442\u043e \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\u00bb, \u2014 \u043f\u0438\u0448\u0435\u0442 TrustedSec.\n\n\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 GitHub.\n\n\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u0441\u0442\u0430\u0442\u044c\u044e.\n\nLH | \u041d\u043e\u0432\u043e\u0441\u0442\u0438 | \u041a\u0443\u0440\u0441\u044b | \u041c\u0435\u043c\u044b", "creation_timestamp": "2024-08-02T18:23:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5011274f-7d29-4fe6-b881-fb359c94d05c/export"/>
    <published>2024-08-02T18:23:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/67b2051c-d84b-45bc-8574-be898672c625/export</id>
    <title>67b2051c-d84b-45bc-8574-be898672c625</title>
    <updated>2026-05-19T08:27:23.975797+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "67b2051c-d84b-45bc-8574-be898672c625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "seen", "source": "MISP/c0d2dd27-7f4a-4fc7-93cd-fff35b40f132", "content": "", "creation_timestamp": "2024-11-14T06:07:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/67b2051c-d84b-45bc-8574-be898672c625/export"/>
    <published>2024-11-14T06:07:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/515cb23c-a708-422b-8126-93958036f4a7/export</id>
    <title>515cb23c-a708-422b-8126-93958036f4a7</title>
    <updated>2026-05-19T08:27:23.975698+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "515cb23c-a708-422b-8126-93958036f4a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970989", "content": "", "creation_timestamp": "2024-12-24T20:22:43.742399Z"}</content>
    <link href="https://db.gcve.eu/sighting/515cb23c-a708-422b-8126-93958036f4a7/export"/>
    <published>2024-12-24T20:22:43.742399+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2da821f1-7a3c-433e-8ddb-2d0b7dbe6a85/export</id>
    <title>2da821f1-7a3c-433e-8ddb-2d0b7dbe6a85</title>
    <updated>2026-05-19T08:27:23.975599+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2da821f1-7a3c-433e-8ddb-2d0b7dbe6a85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2da821f1-7a3c-433e-8ddb-2d0b7dbe6a85/export"/>
    <published>2025-02-23T02:09:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e5b5f936-bc96-402c-add1-9e29d335dfd5/export</id>
    <title>e5b5f936-bc96-402c-add1-9e29d335dfd5</title>
    <updated>2026-05-19T08:27:23.975472+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e5b5f936-bc96-402c-add1-9e29d335dfd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/14286c24-dc69-472b-9819-cb20bbd7793f", "content": "", "creation_timestamp": "2026-02-02T12:28:55.939626Z"}</content>
    <link href="https://db.gcve.eu/sighting/e5b5f936-bc96-402c-add1-9e29d335dfd5/export"/>
    <published>2026-02-02T12:28:55.939626+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e0be3a3c-1e5f-4cd8-adb3-dbb5ed88a903/export</id>
    <title>e0be3a3c-1e5f-4cd8-adb3-dbb5ed88a903</title>
    <updated>2026-05-19T08:27:23.973633+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e0be3a3c-1e5f-4cd8-adb3-dbb5ed88a903", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-11774", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/14286c24-dc69-472b-9819-cb20bbd7793f", "content": "", "creation_timestamp": "2026-02-02T12:28:55.939626Z"}</content>
    <link href="https://db.gcve.eu/sighting/e0be3a3c-1e5f-4cd8-adb3-dbb5ed88a903/export"/>
    <published>2026-02-02T12:28:55.939626+00:00</published>
  </entry>
</feed>
