<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T05:13:47.947379+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/6437a6fa-e9ba-4a3d-9c38-25d1c9af1868/export</id>
    <title>6437a6fa-e9ba-4a3d-9c38-25d1c9af1868</title>
    <updated>2026-05-04T05:13:48.316852+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6437a6fa-e9ba-4a3d-9c38-25d1c9af1868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-JQCX-CCGC-XWHV", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/891", "content": "CVE-2023-3824 : PHP &amp;lt; 8.0.30 Buffer overflow and overread in phar_dir_read()\nSummary : \nBuffer mismanagement in phar_dir_read() causes a buffer overflow and a buffer overread later.\nDetails  : \nhttps://github.com/php/php-src/blob/be71cadc2f899bc39fe27098042139392e2187db/ext/phar/dirstream.c#L89C1-L116\nPOC : https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv", "creation_timestamp": "2023-09-02T23:00:03.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6437a6fa-e9ba-4a3d-9c38-25d1c9af1868/export"/>
    <published>2023-09-02T23:00:03+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0236cb61-fe03-4ad7-90fd-546ced2513c4/export</id>
    <title>0236cb61-fe03-4ad7-90fd-546ced2513c4</title>
    <updated>2026-05-04T05:13:48.316799+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0236cb61-fe03-4ad7-90fd-546ced2513c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-JQCX-CCGC-XWHV", "type": "published-proof-of-concept", "source": "Telegram/xqaS9oQHj19EK8HlDk1UF-Sk0jvrfWjgjfI0LppzJ-gDvVs", "content": "", "creation_timestamp": "2024-03-03T21:29:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0236cb61-fe03-4ad7-90fd-546ced2513c4/export"/>
    <published>2024-03-03T21:29:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/715c1b5b-7f0a-498e-83af-2df9c68d41eb/export</id>
    <title>715c1b5b-7f0a-498e-83af-2df9c68d41eb</title>
    <updated>2026-05-04T05:13:48.316743+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "715c1b5b-7f0a-498e-83af-2df9c68d41eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-JQCX-CCGC-XWHV", "type": "published-proof-of-concept", "source": "https://t.me/LockBitRaasRansomware/16877", "content": "CVE-2023-3824 vulnerability .\n\nMore details: https://nvd.nist.gov/vuln/detail/CVE-2023-3824\n\nExploit: https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv", "creation_timestamp": "2024-04-05T21:43:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/715c1b5b-7f0a-498e-83af-2df9c68d41eb/export"/>
    <published>2024-04-05T21:43:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c812080a-4ee0-45be-bbdd-b48246ad02a7/export</id>
    <title>c812080a-4ee0-45be-bbdd-b48246ad02a7</title>
    <updated>2026-05-04T05:13:48.316693+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c812080a-4ee0-45be-bbdd-b48246ad02a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-JQCX-CCGC-XWHV", "type": "published-proof-of-concept", "source": "Telegram/VWo2h8AbxPmyxGxPyU52gds0kEQ-BSb2QOV1f7kqaK5d0A4", "content": "", "creation_timestamp": "2024-04-05T21:43:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c812080a-4ee0-45be-bbdd-b48246ad02a7/export"/>
    <published>2024-04-05T21:43:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7cc34dfe-9334-4ea2-92ed-5ae96335b750/export</id>
    <title>7cc34dfe-9334-4ea2-92ed-5ae96335b750</title>
    <updated>2026-05-04T05:13:48.316642+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7cc34dfe-9334-4ea2-92ed-5ae96335b750", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-JQCX-CCGC-XWHV", "type": "published-proof-of-concept", "source": "Telegram/gry8yapGlnw-_PuwRwUbmhmR8DlL77eCnsgxUGNwaSEGQQU", "content": "", "creation_timestamp": "2024-04-05T23:16:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7cc34dfe-9334-4ea2-92ed-5ae96335b750/export"/>
    <published>2024-04-05T23:16:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8021c982-28c9-4f9a-aef0-afa05fc1fd11/export</id>
    <title>8021c982-28c9-4f9a-aef0-afa05fc1fd11</title>
    <updated>2026-05-04T05:13:48.316588+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8021c982-28c9-4f9a-aef0-afa05fc1fd11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-JQCX-CCGC-XWHV", "type": "published-proof-of-concept", "source": "Telegram/T8RrVhYocnMnDFdZe3eZtaiEF5y3WBd0rlqr1qdZzfHfTA", "content": "", "creation_timestamp": "2024-04-05T23:16:33.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8021c982-28c9-4f9a-aef0-afa05fc1fd11/export"/>
    <published>2024-04-05T23:16:33+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a3320da3-a28b-4086-bd4d-af59699ee15a/export</id>
    <title>a3320da3-a28b-4086-bd4d-af59699ee15a</title>
    <updated>2026-05-04T05:13:48.316498+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a3320da3-a28b-4086-bd4d-af59699ee15a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-JQCX-CCGC-XWHV", "type": "published-proof-of-concept", "source": "Telegram/fzHn0ebqNr3Xz7uVET6h6k_c0r5fv7H30uJ7EYStbABLkxY", "content": "", "creation_timestamp": "2024-04-07T21:44:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a3320da3-a28b-4086-bd4d-af59699ee15a/export"/>
    <published>2024-04-07T21:44:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0a9ab6ab-5de3-4aee-913b-a1102e2124f8/export</id>
    <title>0a9ab6ab-5de3-4aee-913b-a1102e2124f8</title>
    <updated>2026-05-04T05:13:48.315237+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0a9ab6ab-5de3-4aee-913b-a1102e2124f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-JQCX-CCGC-XWHV", "type": "published-proof-of-concept", "source": "Telegram/1tvljGnqs_gH8ptwRWquPXQ1OnfnrYfZMfH5i0z8ghp7WA", "content": "", "creation_timestamp": "2024-04-07T21:44:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0a9ab6ab-5de3-4aee-913b-a1102e2124f8/export"/>
    <published>2024-04-07T21:44:40+00:00</published>
  </entry>
</feed>
