<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T04:13:10.120274+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/4d9dbc84-f664-4fd7-92ca-f879ae8118f7/export</id>
    <title>4d9dbc84-f664-4fd7-92ca-f879ae8118f7</title>
    <updated>2026-05-04T04:13:10.511958+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4d9dbc84-f664-4fd7-92ca-f879ae8118f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-1450", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1639", "content": "https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc\nmp4v2_trackdump_poc\ncve-2023-1450\n#github", "creation_timestamp": "2023-12-03T07:45:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4d9dbc84-f664-4fd7-92ca-f879ae8118f7/export"/>
    <published>2023-12-03T07:45:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c9f19231-b11c-4d61-aec7-cd3fcf6546c7/export</id>
    <title>c9f19231-b11c-4d61-aec7-cd3fcf6546c7</title>
    <updated>2026-05-04T04:13:10.511816+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c9f19231-b11c-4d61-aec7-cd3fcf6546c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-1450", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9510", "content": "#exploit\n1. CVE-2023-1450:\nMP4v2 2.1.2 mp4trackdump.cpp DumpTrack DoS\nhttps://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc\n\n2. CVE-2023-47014:\nSticky Notes App Using PHP with Source Code v1.0 - CSRF to CORS\nhttps://github.com/emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS\n\n3. PicoCTF WebExploits\nhttps://github.com/PlayExploits/PicoCTF-WebExploits-Challenges", "creation_timestamp": "2023-12-03T18:24:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c9f19231-b11c-4d61-aec7-cd3fcf6546c7/export"/>
    <published>2023-12-03T18:24:41+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e84a43e6-12e4-4d3d-aaec-6e118fff9baa/export</id>
    <title>e84a43e6-12e4-4d3d-aaec-6e118fff9baa</title>
    <updated>2026-05-04T04:13:10.511621+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e84a43e6-12e4-4d3d-aaec-6e118fff9baa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-1450", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2179", "content": "#exploit\n1. CVE-2023-1450:\nMP4v2 2.1.2 mp4trackdump.cpp DumpTrack DoS\nhttps://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc\n\n2. CVE-2023-47014:\nSticky Notes App Using PHP with Source Code v1.0 - CSRF to CORS\nhttps://github.com/emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS\n\n3. PicoCTF WebExploits\nhttps://github.com/PlayExploits/PicoCTF-WebExploits-Challenges", "creation_timestamp": "2024-08-16T08:55:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e84a43e6-12e4-4d3d-aaec-6e118fff9baa/export"/>
    <published>2024-08-16T08:55:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/76c32f54-91f4-499d-b055-201f42a15c5b/export</id>
    <title>76c32f54-91f4-499d-b055-201f42a15c5b</title>
    <updated>2026-05-04T04:13:10.509896+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "76c32f54-91f4-499d-b055-201f42a15c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-1450", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5517", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-1450\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A vulnerability was found in MP4v2 2.1.2 and classified as problematic. This issue affects the function DumpTrack of the file mp4trackdump.cpp. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223295.\n\ud83d\udccf Published: 2023-03-17T06:47:51.148Z\n\ud83d\udccf Modified: 2025-02-26T14:48:56.132Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.223295\n2. https://vuldb.com/?ctiid.223295\n3. https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc\n4. https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc/blob/main/id_000005%2Csig_08%2Csrc_000166%2B000357%2Ctime_3137250%2Cexecs_3545598%2Cop_splice%2Crep_16", "creation_timestamp": "2025-02-26T15:26:25.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/76c32f54-91f4-499d-b055-201f42a15c5b/export"/>
    <published>2025-02-26T15:26:25+00:00</published>
  </entry>
</feed>
