<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T00:21:15.347675+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/dc03b93a-29c9-4009-bcdb-02d648e0e53e/export</id>
    <title>dc03b93a-29c9-4009-bcdb-02d648e0e53e</title>
    <updated>2026-05-11T00:21:15.652637+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dc03b93a-29c9-4009-bcdb-02d648e0e53e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34835", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3093", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bDao-Exploit\n\nCryptanalysis of the DAO exploit &amp;amp; Multi-Stage Attack.\n\nhttps://github.com/demining/Dao-Exploit\n\n#cybersecurity #infosec\n\n\u200b\u200bSLOOTH\n\nSlooth is an advanced vulnerability management system designed to help organizations stay ahead of security threats. By leveraging the Python NVD API wrapper and a REST API, Slooth fetches and organizes data about Common Vulnerabilities and Exposures (CVEs). It provides a unique identifier, the CVE ID, for stakeholders to discuss and research specific vulnerabilities.\n\nhttps://github.com/TheAxumite/SLOOTH-Security-Vulnerability-Search-and-Management\n\n#cve #cybersecurity #infosec\n\n\u200b\u200b\ud83d\udee1 VineShield\n\nObfuscation tool for all executing files and scripts written on python3\n\nhttps://github.com/Nick-Vinesmoke/VineShield\n\n#cybersecurity #infosec\n\n\u200b\u200bX-osint\n\nThis is an #OSINT tool which gathers useful and yet credible valid information about a phone number, user's email address and ip address and more to come in feature updates.\n\nhttps://github.com/TermuxHackz/X-osint\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34835\n\nCross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary JavaScript code via a vulnerable delete_file parameter.\n\nhttps://github.com/sahiloj/CVE-2023-34835\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bThoth\n\nCairo/Starknet security toolkit (bytecode analyzer, disassembler, decompiler, symbolic execution, SBMC)\n\nhttps://github.com/FuzzingLabs/thoth\n\n#cybersecurity #infosec\n\n\u200b\u200bPROFILEGPT\n\nA tool for analyzing profiles and hashtags on Twitter. The application exploits various technologies and APIs to collect data and generate information for users.\n\nhttps://github.com/odiks/PROFILEGPT\n\n#OSINT #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34599\n\nMultiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code.\n\nhttps://github.com/maddsec/CVE-2023-34599\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bDaProfiler\n\n#OSINT tool allowing you to collect certain information about yourself in order to rectify by rgpd requests the traces you may have left on the net. DaProfiler is indeed able to recover: Addresses, Social media accounts, e-mail addresses, mobile / landline number, jobs. On a specified subject in a limited time. \n\nhttps://github.com/daprofiler/DaProfiler\n\n#cybersecurity #infosec\n\n\u200b\u200bJormungandr \n\nA kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.\n\nhttps://github.com/Idov31/Jormungandr\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-06-26T23:00:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dc03b93a-29c9-4009-bcdb-02d648e0e53e/export"/>
    <published>2023-06-26T23:00:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fc0b664e-f498-45ad-a6c9-3c73c8a5d17a/export</id>
    <title>fc0b664e-f498-45ad-a6c9-3c73c8a5d17a</title>
    <updated>2026-05-11T00:21:15.652499+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fc0b664e-f498-45ad-a6c9-3c73c8a5d17a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34835", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3743", "content": "\ud83d\udda5Exploits:\n\n\ud83d\udd31Dao-Exploit : https://www.system32.ink/2023/06/dao-exploit.html\n\n\ud83d\udd31CVE-2023-34835 XSS Exploit - eScan Management Console 14.0.1400.2281 : https://www.system32.ink/2023/06/cve-2023-34835-xss-exploit-escan.html\n\n\ud83d\udda5DataLeaks:\n\n\ud83d\udd31Viva Air Columbia Data Leak : https://www.system32.ink/2023/06/viva-air-columbia-data-leak.html\n\n\ud83d\udd31CITI Bank Leaks : https://www.system32.ink/2023/06/citi-bank-leaks.html\n\n\ud83d\udda5Tools:\n\n\ud83d\udd31Acunetix v15.7 - 09 May 2023 : https://www.system32.ink/2023/06/acunetix-v157-09-may-2023-download.html\n\n\ud83d\udd31PROFILEGPT - Tool for analyzing profiles and hashtags on Twitter : https://www.system32.ink/2023/06/profilegpt.html\n\n\ud83d\udda5Keylogger:\n\n\ud83d\udd31AutoLOG V1 Keylogger : https://www.system32.ink/2023/06/autolog-v1.html\n\n@crackcodes | System32.ink | Crackcodes.in", "creation_timestamp": "2023-06-27T03:12:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fc0b664e-f498-45ad-a6c9-3c73c8a5d17a/export"/>
    <published>2023-06-27T03:12:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/65ee25c4-f8d8-42f2-9d55-5b6403a4ec5e/export</id>
    <title>65ee25c4-f8d8-42f2-9d55-5b6403a4ec5e</title>
    <updated>2026-05-11T00:21:15.652365+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "65ee25c4-f8d8-42f2-9d55-5b6403a4ec5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34830", "type": "seen", "source": "https://t.me/cibsecurity/65580", "content": "\u203c CVE-2023-34830 \u203c\n\ni-doit Open v24 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the timeout parameter on the login page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T20:12:10.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/65ee25c4-f8d8-42f2-9d55-5b6403a4ec5e/export"/>
    <published>2023-06-27T20:12:10+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a3b56a7f-ef93-4001-af7f-c01ffdc647fc/export</id>
    <title>a3b56a7f-ef93-4001-af7f-c01ffdc647fc</title>
    <updated>2026-05-11T00:21:15.652227+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a3b56a7f-ef93-4001-af7f-c01ffdc647fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34835", "type": "seen", "source": "https://t.me/cibsecurity/65585", "content": "\u203c CVE-2023-34835 \u203c\n\nA Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary JavaScript code via a vulnerable delete_file parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T22:12:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a3b56a7f-ef93-4001-af7f-c01ffdc647fc/export"/>
    <published>2023-06-27T22:12:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c1148bd4-b682-465c-98fb-5449c8b5e176/export</id>
    <title>c1148bd4-b682-465c-98fb-5449c8b5e176</title>
    <updated>2026-05-11T00:21:15.652089+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c1148bd4-b682-465c-98fb-5449c8b5e176", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34838", "type": "published-proof-of-concept", "source": "https://t.me/kasraone_com/330", "content": "CVE-2023-34838\n\nGithub: https://github.com/sahiloj/CVE-2023-34838", "creation_timestamp": "2023-06-29T10:33:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c1148bd4-b682-465c-98fb-5449c8b5e176/export"/>
    <published>2023-06-29T10:33:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0a18d923-8a06-4577-8fe0-ef8f9bfcec4d/export</id>
    <title>0a18d923-8a06-4577-8fe0-ef8f9bfcec4d</title>
    <updated>2026-05-11T00:21:15.651955+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0a18d923-8a06-4577-8fe0-ef8f9bfcec4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34839", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8619", "content": "#exploit\n1.CVE-2022-43684:\nServiceNow Insecure Access Control leading to Administrator Account Takeover\nhttps://github.com/lolminerxmrig/CVE-2022-43684\n\n2. CVE-2023-34839:\nissabel-pbx 4.0.0-6 - CSRF to Privilege Escalation\nhttps://github.com/sahiloj/CVE-2023-34839", "creation_timestamp": "2023-07-06T12:19:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0a18d923-8a06-4577-8fe0-ef8f9bfcec4d/export"/>
    <published>2023-07-06T12:19:09+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ba2123e2-4047-41bb-98c7-9727fa18b062/export</id>
    <title>ba2123e2-4047-41bb-98c7-9727fa18b062</title>
    <updated>2026-05-11T00:21:15.651776+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ba2123e2-4047-41bb-98c7-9727fa18b062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34839", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3117", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bCVE-2023-24488\n\nThe provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.\n\nhttps://github.com/Abo5/CVE-2023-24488\n\n#cve #cybersecurity #infosec\n\nrusty-radamsa\n\nRusty Radamsa is a general purpose fuzzer. It modifies given sample data in ways, which might expose errors in programs intended to process the data.\n\nhttps://github.com/microsoft/rusty-radamsa\n\n#cybersecurity #infosec\n\n\u200b\u200bInvoke-Pre2kSpray\n\nModified DomainPasswordSpray version to enumerate machine accounts and perform a pre2k password spray.\n\nhttps://github.com/eversinc33/Invoke-Pre2kSpray\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2022-43684\n\nServicenow insecure access control leading to administrator account takeover.\n\nhttps://github.com/lolminerxmrig/CVE-2022-43684\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34839\n\nCross Site Request Forgery vulnerability in Issabel issabel-pbx v.4.0.0-6 allows a remote attacker to gain privileges via the a Custom CSRF exploit to create new user function in that application.\n\nhttps://github.com/sahiloj/CVE-2023-34839\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bBackdoor-exploit-python\n\nBackdoor exploit program which helps an user to get information from any user when deployed to the target machine.\n\nhttps://github.com/vaibhavbais007/Backdoor-exploit-python-program\n\n#infosec #pentesting #redteam\n\n\u200b\u200bbouheki\n\nKRSI (eBPF+LSM) based Linux security auditing tool. Security events can be audited and blocked based on the container of the process, and restrictions can be applied to container environments.\n\nhttps://github.com/mrtc0/bouheki\n\n#cybersecurity #infosec\n\n\u200b\u200bgoogleSearcher\n\nA custom Google search (to bypass some limitations on Google with regards to timeouts, vpns etc).\n\nhttps://github.com/AssassinUKG/googleSearcher\n\n#infosec #pentesting #bugbounty\n\nFind GraphQL API vulnerabilities, with Burp Suite Professional\n\nhttps://portswigger.net/blog/find-graphql-api-vulnerabilities-with-burp-suite-professional\n\nGraphQL Portswigger Challenges Writeups\n\nhttps://axon-xerox.medium.com/graphql-portswigger-challenges-writeups-4ed15c832483\n\nBest free AI Image Editing Tools\n\nLEDITS https://huggingface.co/spaces/editing-images/ledits\nUNCROP https://clipdrop.co/uncrop\nMicrosoft Designer https://designer.microsoft.com/\nStable Diffusion Inpainting https://huggingface.co/spaces/runwayml/stable-diffusion-inpainting\nAdobe Firefly AI https://firefly.adobe.com/generate/inpaint\nDragGAN  https://huggingface.co/spaces/radames/DragGan\n\n#infosec #cybersecurity \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-07T10:44:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ba2123e2-4047-41bb-98c7-9727fa18b062/export"/>
    <published>2023-07-07T10:44:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dbed9994-a35f-4d68-844a-5b153b6cb381/export</id>
    <title>dbed9994-a35f-4d68-844a-5b153b6cb381</title>
    <updated>2026-05-11T00:21:15.651635+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dbed9994-a35f-4d68-844a-5b153b6cb381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34835", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8550", "content": "#exploit\n1. FortiNAC - Just a few more RCEs\nhttps://frycos.github.io/vulns4free/2023/06/18/fortinac.html\n\n2. CVE-2023-34835, CVE-2023-34836:\neScan Management Console 14.0.14 - Reflected Cross Site Scripting\nhttps://github.com/sahiloj/CVE-2023-34836\nhttps://github.com/sahiloj/CVE-2023-34835\n\n3. Flickr Stored XSS in photos_user_map.gne\nhttps://keerok.github.io/2022/12/22/Flickr-Stored-XSS", "creation_timestamp": "2023-11-11T01:56:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dbed9994-a35f-4d68-844a-5b153b6cb381/export"/>
    <published>2023-11-11T01:56:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/86252650-2243-4c8e-976f-2300d830b78f/export</id>
    <title>86252650-2243-4c8e-976f-2300d830b78f</title>
    <updated>2026-05-11T00:21:15.651429+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "86252650-2243-4c8e-976f-2300d830b78f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34836", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8550", "content": "#exploit\n1. FortiNAC - Just a few more RCEs\nhttps://frycos.github.io/vulns4free/2023/06/18/fortinac.html\n\n2. CVE-2023-34835, CVE-2023-34836:\neScan Management Console 14.0.14 - Reflected Cross Site Scripting\nhttps://github.com/sahiloj/CVE-2023-34836\nhttps://github.com/sahiloj/CVE-2023-34835\n\n3. Flickr Stored XSS in photos_user_map.gne\nhttps://keerok.github.io/2022/12/22/Flickr-Stored-XSS", "creation_timestamp": "2023-11-11T01:56:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/86252650-2243-4c8e-976f-2300d830b78f/export"/>
    <published>2023-11-11T01:56:00+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/538a09d6-21e7-4eda-8ca2-22d32f368e1e/export</id>
    <title>538a09d6-21e7-4eda-8ca2-22d32f368e1e</title>
    <updated>2026-05-11T00:21:15.649511+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "538a09d6-21e7-4eda-8ca2-22d32f368e1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3483", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhulolkjhz2z", "content": "", "creation_timestamp": "2025-02-11T02:16:20.953914Z"}</content>
    <link href="https://db.gcve.eu/sighting/538a09d6-21e7-4eda-8ca2-22d32f368e1e/export"/>
    <published>2025-02-11T02:16:20.953914+00:00</published>
  </entry>
</feed>
