<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T17:49:51.758464+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ec6ed68e-7f25-417f-8b12-5fadf3ed0a93/export</id>
    <title>ec6ed68e-7f25-417f-8b12-5fadf3ed0a93</title>
    <updated>2026-05-08T17:49:52.149216+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ec6ed68e-7f25-417f-8b12-5fadf3ed0a93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5052", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aThis repository is to provide a write-up and PoC for CVE-2023-41717.\nURL\uff1ahttps://github.com/federella/CVE-2023-41717\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-31T09:24:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ec6ed68e-7f25-417f-8b12-5fadf3ed0a93/export"/>
    <published>2023-08-31T09:24:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b67f8335-0395-4bac-b294-b40727c35920/export</id>
    <title>b67f8335-0395-4bac-b294-b40727c35920</title>
    <updated>2026-05-08T17:49:52.149147+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b67f8335-0395-4bac-b294-b40727c35920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "seen", "source": "https://t.me/cibsecurity/69561", "content": "\u203c CVE-2023-41717 \u203c\n\nInappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-31T20:13:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b67f8335-0395-4bac-b294-b40727c35920/export"/>
    <published>2023-08-31T20:13:13+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/13343ee6-cbc4-4139-9748-8eb42b27590a/export</id>
    <title>13343ee6-cbc4-4139-9748-8eb42b27590a</title>
    <updated>2026-05-08T17:49:52.149096+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "13343ee6-cbc4-4139-9748-8eb42b27590a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "published-proof-of-concept", "source": "https://t.me/cKure/11477", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2023-41717: Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions.\n\nhttps://github.com/federella/CVE-2023-41717", "creation_timestamp": "2023-09-01T07:30:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/13343ee6-cbc4-4139-9748-8eb42b27590a/export"/>
    <published>2023-09-01T07:30:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c34ce7f9-71dc-4130-ad6c-74d93d472df1/export</id>
    <title>c34ce7f9-71dc-4130-ad6c-74d93d472df1</title>
    <updated>2026-05-08T17:49:52.149043+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c34ce7f9-71dc-4130-ad6c-74d93d472df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8948", "content": "#exploit\n1. CVE-2023-41717:\nInappropriate file type control in Zscaler Proxy\nhttps://github.com/federella/CVE-2023-41717\n\n2. CVE-2023-30943:\nMoodle Vulnerabilities Exploits\nhttps://github.com/d0rb/CVE-2023-30943", "creation_timestamp": "2023-09-01T11:00:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c34ce7f9-71dc-4130-ad6c-74d93d472df1/export"/>
    <published>2023-09-01T11:00:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4ef194d7-ed24-41ba-b229-bb419fadebed/export</id>
    <title>4ef194d7-ed24-41ba-b229-bb419fadebed</title>
    <updated>2026-05-08T17:49:52.148986+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4ef194d7-ed24-41ba-b229-bb419fadebed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3174", "content": "Hackers Factory \n\nA modern tool written in Python that automates your xss findings.\n\nhttps://github.com/faiyazahmad07/xss_vibes\n\nThis repository is to provide a write-up and PoC for CVE-2023-41717.\n\nhttps://github.com/federella/CVE-2023-41717\n\nExploring the Ingenious Utilization of Overwolf's Overlay Framework While Preserving its Native Window Flags. Employing SetWindowsHookEx for Acquiring Keyboard and Mouse Inputs.\n\nhttps://github.com/SurgeGotTappedAgain/Window-Hijack\n\nReal fucking shellcode encryption tool.\n\nhttps://github.com/nickvourd/Supernova\n\nSome of my rough notes for Docker threat detection\n\nhttps://github.com/Antonlovesdnb/DockerDetectionNotes\n\nDigital Forensics Incident Response and Detection engineering\n\nhttps://github.com/adrianlois/DFIR-Detection-Engineering\n\nMaking Favicon.ico based Recon Great again \n\nhttps://github.com/devanshbatham/FavFreak\n\nCVE-2023-36874 PoC\n\nhttps://github.com/d0rb/CVE-2023-36874\n\nA tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks\n\nhttps://github.com/CCob/gssapi-abuse\n\nA collection of companies that disclose adversary TTPs after they have been breached\n\nhttps://github.com/BushidoUK/Breach-Report-Collection\n\nGenerate Live Verizon Phone Numbers from carrier.\n\nhttps://github.com/cyboghost/Numgen-Ultimate\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-01T11:58:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/4ef194d7-ed24-41ba-b229-bb419fadebed/export"/>
    <published>2023-09-01T11:58:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d4f2c5b9-a1ae-4f8c-98f1-1076f53cea1d/export</id>
    <title>d4f2c5b9-a1ae-4f8c-98f1-1076f53cea1d</title>
    <updated>2026-05-08T17:49:52.148936+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d4f2c5b9-a1ae-4f8c-98f1-1076f53cea1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "published-proof-of-concept", "source": "Telegram/E5rIyo4yL4A8Cl6ljSa_CCU0uFuGXhuvUe-Dy3r702CaxA", "content": "", "creation_timestamp": "2023-09-02T04:07:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d4f2c5b9-a1ae-4f8c-98f1-1076f53cea1d/export"/>
    <published>2023-09-02T04:07:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1d18c904-788f-430e-90f9-d8b9ec948996/export</id>
    <title>1d18c904-788f-430e-90f9-d8b9ec948996</title>
    <updated>2026-05-08T17:49:52.148877+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1d18c904-788f-430e-90f9-d8b9ec948996", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4240", "content": "\ud83d\udd78Department of Defence South African (DARPA) Data Leak : Download\n\n\ud83c\udfe5Canadian Nurses Association Data Leak : Download\n\n\ud83d\udc7eHackBot \u2013 AI Cybersecurity Chatbot : Download\n\n\ud83e\uddeeCVE-2023-30943 Moodle Exploit : Download\n\n\ud83d\udc32CVE-2023-41717 Zscaler Proxy Exploit : Download\n\n\ud83d\udcdfB(l)utter \u2013 Flutter Mobile Application Reverse Engineering Tool : Download\n\n\ud83e\udeacGreenBot : Download", "creation_timestamp": "2023-09-02T04:30:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1d18c904-788f-430e-90f9-d8b9ec948996/export"/>
    <published>2023-09-02T04:30:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6a963604-336a-4e23-955d-668a1953a0eb/export</id>
    <title>6a963604-336a-4e23-955d-668a1953a0eb</title>
    <updated>2026-05-08T17:49:52.148796+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6a963604-336a-4e23-955d-668a1953a0eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "published-proof-of-concept", "source": "Telegram/md5Pwtve7jVTx3xy8D8J1lcevEgfzLM_a_lPeb-uR2QiMQ", "content": "", "creation_timestamp": "2023-09-04T06:54:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6a963604-336a-4e23-955d-668a1953a0eb/export"/>
    <published>2023-09-04T06:54:35+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/90a94322-ac80-4c5f-8f96-fdc7000275e1/export</id>
    <title>90a94322-ac80-4c5f-8f96-fdc7000275e1</title>
    <updated>2026-05-08T17:49:52.147597+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "90a94322-ac80-4c5f-8f96-fdc7000275e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4258", "content": "\ud83d\udd78Department of Defence South African (DARPA) Data Leak : Download\n\n\ud83c\udfe5Canadian Nurses Association Data Leak : Download\n\n\ud83d\udc7eHackBot \u2013 AI Cybersecurity Chatbot : Download\n\n\ud83e\uddeeCVE-2023-30943 Moodle Exploit : Download\n\n\ud83d\udc32CVE-2023-41717 Zscaler Proxy Exploit : Download\n\n\ud83d\udcdfB(l)utter \u2013 Flutter Mobile Application Reverse Engineering Tool : Download\n\n\ud83e\udeacGreenBot : Download", "creation_timestamp": "2023-09-04T07:05:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/90a94322-ac80-4c5f-8f96-fdc7000275e1/export"/>
    <published>2023-09-04T07:05:29+00:00</published>
  </entry>
</feed>
