<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-23T20:31:28.218006+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/293d51e5-bcea-4a89-aabb-470779d99c63/export</id>
    <title>293d51e5-bcea-4a89-aabb-470779d99c63</title>
    <updated>2026-05-23T20:31:28.745530+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "293d51e5-bcea-4a89-aabb-470779d99c63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1306", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-32099\nURL\uff1ahttps://github.com/ibnuuby/CVE-2021-32099", "creation_timestamp": "2022-01-12T11:52:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/293d51e5-bcea-4a89-aabb-470779d99c63/export"/>
    <published>2022-01-12T11:52:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dcea44b2-4539-40ad-b75b-bb0f76f45a92/export</id>
    <title>dcea44b2-4539-40ad-b75b-bb0f76f45a92</title>
    <updated>2026-05-23T20:31:28.745475+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dcea44b2-4539-40ad-b75b-bb0f76f45a92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1361", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aExploit for CVE-2021-32099 \nURL\uff1ahttps://github.com/nikn0laty/CVE-2021-32099_exploit", "creation_timestamp": "2022-01-18T19:32:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dcea44b2-4539-40ad-b75b-bb0f76f45a92/export"/>
    <published>2022-01-18T19:32:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/861f0349-cb82-465c-aeda-7b312855f4d0/export</id>
    <title>861f0349-cb82-465c-aeda-7b312855f4d0</title>
    <updated>2026-05-23T20:31:28.745420+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "861f0349-cb82-465c-aeda-7b312855f4d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1372", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-32099 SQLi allow attacker bypass login\nURL\uff1ahttps://github.com/l3eol3eo/CVE-2021-32099_SQLi", "creation_timestamp": "2022-01-21T02:48:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/861f0349-cb82-465c-aeda-7b312855f4d0/export"/>
    <published>2022-01-21T02:48:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/483635db-2107-45d9-945d-71a31b60428d/export</id>
    <title>483635db-2107-45d9-945d-71a31b60428d</title>
    <updated>2026-05-23T20:31:28.745347+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "483635db-2107-45d9-945d-71a31b60428d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/arm1tage/129", "content": "HackTheBox:\n\n\u2014Easy Machines\u2014\n\nDriver - WinRM (evil-winrm), printnightmare CVE-2021-1675 (https://habr.com/ru/sandbox/156538/)\nhttps://0xdf.gitlab.io/2022/02/26/htb-driver.html\n\nSecret - JWT, Git source (tig), crush-dumps\nhttps://0xdf.gitlab.io/2022/03/26/htb-secret.html\n\nBackDoor - Wordpress eBook Dir Trav (https://www.exploit-db.com/exploits/39575), gdb exploit (https://www.exploit-db.com/exploits/50539, https://www.rapid7.com/db/modules/exploit/multi/gdb/gdb_server_exec/) \nhttps://0xdf.gitlab.io/2022/04/23/htb-backdoor.html\n\nPrevise - Backup, Site Reverse Shell, low-encrypted passwords\nhttps://0xdf.gitlab.io/2022/01/08/htb-previse.html\n\nBountyHunter - XXE, (root) NOPASSWD python code\nhttps://0xdf.gitlab.io/2021/11/20/htb-bountyhunter.html\n\nHorizontal - Strapi CMS 3.0.0 CVE-2019-18818/CVE-2019-19609 (https://www.exploit-db.com/exploits/50239, https://github.com/diego-tella/CVE-2019-19609-EXPLOIT), Laravel v8 (https://www.exploit-db.com/exploits/49424)\nhttps://0xdf.gitlab.io/2022/02/05/htb-horizontall.html\n\nOptimum - Windows 2012 (https://www.rapid7.com/db/modules/exploit/windows/http/rejetto_hfs_exec/, https://www.rapid7.com/db/modules/exploit/windows/local/ms16_032_secondary_logon_handle_privesc/)\nhttps://0xdf.gitlab.io/2021/03/17/htb-optimum.html\n\nLame - FTP Anonymous, SAMBA exploit (https://github.com/amriunix/CVE-2007-2447)\nhttps://0xdf.gitlab.io/2020/04/07/htb-lame.html\n\nJerry - Tomcat Default Cred, shell via .WAR\nhttps://0xdf.gitlab.io/2018/11/17/htb-jerry.html\n\nBlue - Win7 eternalblue (https://www.rapid7.com/db/modules/exploit/windows/smb/ms17_010_eternalblue/)\nhttps://0xdf.gitlab.io/2021/05/11/htb-blue.html\n\nDevel - Microsoft IIS httpd 7.5 reverse shell via .ASPX, MS11-046 or ms10_015_kitrap0d (https://github.com/abatchy17/WindowsExploits/tree/master/MS11-046)\nhttps://0xdf.gitlab.io/2019/03/05/htb-devel.html\n\nNetmon - PRTG Network Monitor 18.1.37.13946, Backup credentials, CVE-2018-9276 (https://github.com/A1vinSmith/CVE-2018-9276) / (https://www.exploit-db.com/exploits/46527) + evil-winrm\nhttps://0xdf.gitlab.io/2019/06/29/htb-netmon.html\n\nExplore (Android) - 59777 port CVE-2019-6447 (https://www.exploit-db.com/exploits/50070), SSH Creds on Photo, adb shell\nhttps://0xdf.gitlab.io/2021/10/30/htb-explore.html\n\nAntique - Telnet password via snmpget (https://www.irongeek.com/i.php?page=security/networkprinterhacking#JetDirect%20password%20notes), CUPS 1.6.1 (https://github.com/jpillora/chisel) \nhttps://0xdf.gitlab.io/2022/05/03/htb-antique.html\n\nReturn - evil-winrm, Server Operators in net user svc-printer /domain, sc.exe\nhttps://0xdf.gitlab.io/2022/05/05/htb-return.html\n\nGrandpa - CVE-2017-7269 (https://www.rapid7.com/db/modules/exploit/windows/iis/iis_webdav_scstoragepathfromurl/), SEImpersonalPrivilege Churrasco (https://github.com/Re4son/Churrasco/)\nhttps://0xdf.gitlab.io/2020/05/28/htb-grandpa.html\n\nBeep - ShellShock or Elastix 2.2.0 - 'graph.php' Local File Inclusion, (root) NOPASSWD nmap\nhttps://0xdf.gitlab.io/2021/02/23/htb-beep.html\n\nPandora - snmpwalk creds, CVE-2021-32099, Site Reverse Shell\nhttps://0xdf.gitlab.io/2022/05/21/htb-pandora.html\n\nPaper - WPS 5.2.3 - Cve-2019-17671 (https://www.exploit-db.com/exploits/47690, https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/), Chat Bot Dir Trav, CVE-2021-3560 (https://github.com/Almorabea/Polkit-exploit/blob/main/CVE-2021-3560.py)\nhttps://0xjin.medium.com/paper-hackthebox-write-up-2abca22d3b54\n\n\n#hackthebox #ctf", "creation_timestamp": "2022-06-18T10:22:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/483635db-2107-45d9-945d-71a31b60428d/export"/>
    <published>2022-06-18T10:22:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/16f5806a-d6fa-4cac-8e60-eafeeafc9265/export</id>
    <title>16f5806a-d6fa-4cac-8e60-eafeeafc9265</title>
    <updated>2026-05-23T20:31:28.745288+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "16f5806a-d6fa-4cac-8e60-eafeeafc9265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "Telegram/-mv-9r5Fuiz_fiqs8bK_eK_PiWqfYGbNPnIRzDzssIknfHA", "content": "", "creation_timestamp": "2025-07-18T21:00:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/16f5806a-d6fa-4cac-8e60-eafeeafc9265/export"/>
    <published>2025-07-18T21:00:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dcb4940b-0ade-422d-a2a2-991321582314/export</id>
    <title>dcb4940b-0ade-422d-a2a2-991321582314</title>
    <updated>2026-05-23T20:31:28.745205+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dcb4940b-0ade-422d-a2a2-991321582314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dcb4940b-0ade-422d-a2a2-991321582314/export"/>
    <published>2025-08-31T03:01:15+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/99aa14d0-b7a2-4277-a8b2-6a730a7ce4c7/export</id>
    <title>99aa14d0-b7a2-4277-a8b2-6a730a7ce4c7</title>
    <updated>2026-05-23T20:31:28.744040+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "99aa14d0-b7a2-4277-a8b2-6a730a7ce4c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/99aa14d0-b7a2-4277-a8b2-6a730a7ce4c7/export"/>
    <published>2025-08-31T03:12:51+00:00</published>
  </entry>
</feed>
