<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T16:09:02.445417+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/dfcd787e-8401-40ce-b156-ab2ac42ab317/export</id>
    <title>dfcd787e-8401-40ce-b156-ab2ac42ab317</title>
    <updated>2026-05-09T16:09:02.853171+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dfcd787e-8401-40ce-b156-ab2ac42ab317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-GW42-F939-FHVM", "type": "published-proof-of-concept", "source": "https://t.me/arvinclub1/271", "content": "\u0648\u0642\u062a\u06cc \u06af\u0641\u062a\u0647 \u0645\u06cc\u0634\u0647 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc \u062c\u0627\u0628\u0631 \u0647\u0645 \u0645\u0634\u06a9\u0644\u0627\u062a \u062e\u0648\u062f\u0634\u0648\u0646 \u0631\u0648 \u062f\u0627\u0631\u0646 \u0627\u06cc\u0646\u0647\nCVE-2023-32315\nhttp://localhost:9090/setup/setup-s/%u002e%u002e/%u002e%u002e/log.jsp\nhttps://github.com/advisories/GHSA-gw42-f939-fhvm", "creation_timestamp": "2023-05-29T11:08:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dfcd787e-8401-40ce-b156-ab2ac42ab317/export"/>
    <published>2023-05-29T11:08:45+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1b661354-7c7b-4180-b003-48370784b5e7/export</id>
    <title>1b661354-7c7b-4180-b003-48370784b5e7</title>
    <updated>2026-05-09T16:09:02.853046+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1b661354-7c7b-4180-b003-48370784b5e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-GW42-F939-FHVM", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3072", "content": "Tools - Hackers Factory \n\nLink-X \n\nA Hack-Via-Link ToolKit. Including: Camera, Voice, Location Etc*4\n\nhttps://github.com/Toxic-Noob/Link-X\n\n#infosec #pentesting #redteam\n\nStorm-Breaker\n\nSocial engineering tool [Access Webcam &amp;amp; Microphone &amp;amp; Location Finder] With Python.\n\nhttps://github.com/ultrasecurity/Storm-Breaker\n\n#infosec #pentesting #redteam\n\njsFinder\n\nA command-line tool written in Go that scans web pages to find JavaScript files linked in the HTML source code. It searches for any attribute that can contain a JavaScript file (e.g., src, href, data-main, etc.) and extracts the URLs of the files to a text file. The tool is designed to be simple to use, and it supports reading URLs from a file or from standard input.\n\nhttps://github.com/kacakb/jsfinder\n\n#infosec #pentesting #bugbounty\n\nCVE-2023-32315\n\nAdministration Console authentication bypass in openfire xmppserver.\n\nhttps://github.com/advisories/GHSA-gw42-f939-fhvm\n\n#cve #cybersecurity #infosec\n\nCrowdSec\n\nThe open-source and participative IPS able to analyze visitor behavior &amp;amp; provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global CTI database to protect the user network.\n\nhttps://github.com/crowdsecurity/crowdsec\n\n#cybersecurity #infosec\n\nLookyloo \n\nLookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.\n\nhttps://github.com/Lookyloo/lookyloo\n\n#cybersecurity #infosec #pentesting\n\n\ud83e\udd96Velociraptor Docker\n\nDocker image for Velocidex Velociraptor.\n\nhttps://github.com/weslambert/velociraptor-docker\n\n#infosec #pentesting #bugbounty\n\nGato\n\nGitHub Attack Toolkit is an enumeration and attack tool that allows both blue teamers and offensive security practitioners to evaluate the blast radius of a compromised personal access token within a GitHub organization.\n\nhttps://github.com/praetorian-inc/gato\n\n#cybersecurity #infosec #pentesting\n\nOSINT QuickStart\n\nIncludes quick start guides for #Shodan and Censys #OSINT search engines.\n\nhttps://github.com/utilsec/osint\n\n#cybersecurity #infosec\n\nCookie-Graber-BOF\n\nC or BOF file to extract WebKit master key to decrypt user cookie. The C code can be used to compile an executable or a bof script for #CobaltStrike.\n\nhttps://github.com/Mr-Un1k0d3r/Cookie-Graber-BOF\n\n#infosec #pentesting #redteam\n\nGeacon\n\nPractice Go programming and implement #CobaltStrike's Beacon in Go\n\nhttps://github.com/darkr4y/geacon\n\n#infosec #pentesting #redteam\n\nRepeaterSearch\n\nThis #burpsuite plugin adds a search bar to Repeater that allows you to search Requests and/or Responses for a string. Regex is also supported.\n\nhttps://github.com/Static-Flow/RepeaterSearch\n\n#infosec #infosec #bugbounty\n\nPractical Windows Forensics\n\nA quick DIY approach for performing a digital forensic analysis on a Windows 10 system.\n\nhttps://github.com/bluecapesecurity/PWF\n\n#cybersecurity #infosec #forensic\n\nOWASP Domain Protect\n\nPrevent subdomain takeover...\n\nhttps://github.com/domain-protect/domain-protect\n\n#cybersecurity #infosec\n\nawesome-oracle-manipulation\n\nAwesome list of all things oracle manipulation. Creating to help spread a better understanding of oracles and oracle manipulation.\n\nhttps://github.com/0xcacti/awesome-oracle-manipulation\n\n#cybersecurity #infosec\n\nCheckov\n\nPrevent #cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.\n\nhttps://github.com/bridgecrewio/checkov\n\n#cybersecurity #infosec\n\namd-lm32-smu-exploit\n\nGeneric #exploit for all version 7 (maybe others) LM32-based AMD SMU's used in APUs (and probably works on GPUs too)\n\nhttps://github.com/jevinskie/amd-lm32-smu-exploit\n\n#cybersecurity #infosec\n\nGretchen\n\nCisco TCL tool to stop Responder attacks.\n\nhttps://github.com/c4s73r/Gretchen\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-05-30T15:18:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1b661354-7c7b-4180-b003-48370784b5e7/export"/>
    <published>2023-05-30T15:18:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b6a81470-ff26-4917-955d-624aaff251b6/export</id>
    <title>b6a81470-ff26-4917-955d-624aaff251b6</title>
    <updated>2026-05-09T16:09:02.850062+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b6a81470-ff26-4917-955d-624aaff251b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-GW42-F939-FHVM", "type": "published-proof-of-concept", "source": "Telegram/lkClufF-GFiKfd1u8hBBFNIpsNZxzvyNF6UElFxMqURbP0g", "content": "", "creation_timestamp": "2023-07-24T16:23:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b6a81470-ff26-4917-955d-624aaff251b6/export"/>
    <published>2023-07-24T16:23:05+00:00</published>
  </entry>
</feed>
