<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T17:19:46.349882+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/1946d72b-06a2-458d-8bd5-957ac319adfb/export</id>
    <title>1946d72b-06a2-458d-8bd5-957ac319adfb</title>
    <updated>2026-05-07T17:19:46.716171+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1946d72b-06a2-458d-8bd5-957ac319adfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28017", "type": "seen", "source": "https://t.me/cKure/5153", "content": "\u25a0\u25a1\u25a1\u25a1\u25a1 CVE-2020-28017: An integer overflow in receive_add_recipient() has been found in Exim before version 4.94.2.\n\nhttps://security.archlinux.org/CVE-2020-28017", "creation_timestamp": "2021-05-04T14:50:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1946d72b-06a2-458d-8bd5-957ac319adfb/export"/>
    <published>2021-05-04T14:50:41+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/860e7137-27fb-444b-8f91-4cd867f36e9b/export</id>
    <title>860e7137-27fb-444b-8f91-4cd867f36e9b</title>
    <updated>2026-05-07T17:19:46.716112+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "860e7137-27fb-444b-8f91-4cd867f36e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28018", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3379", "content": "#Threat_Research\n1. From theory to practice: analysis and PoC development for CVE-2020-28018 (Use-After-Free in Exim)\nhttps://adepts.of0x.cc/exim-cve-2020-28018\n2. Stealing secrets with Rust Macros PoC via VSCode\nhttps://github.com/lucky/bad_actor_poc", "creation_timestamp": "2021-05-16T13:07:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/860e7137-27fb-444b-8f91-4cd867f36e9b/export"/>
    <published>2021-05-16T13:07:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/61eaf6c2-ad47-42f9-a2db-8f357bb4ed8a/export</id>
    <title>61eaf6c2-ad47-42f9-a2db-8f357bb4ed8a</title>
    <updated>2026-05-07T17:19:46.716060+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "61eaf6c2-ad47-42f9-a2db-8f357bb4ed8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28018", "type": "published-proof-of-concept", "source": "Telegram/RunQ6C-wdh1CdujsWSMBG_b9rRp9KM1dCcRlmkPgCQHIUw", "content": "", "creation_timestamp": "2021-05-16T13:08:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/61eaf6c2-ad47-42f9-a2db-8f357bb4ed8a/export"/>
    <published>2021-05-16T13:08:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f343bc77-368f-49dd-bd05-9a51df23cc5c/export</id>
    <title>f343bc77-368f-49dd-bd05-9a51df23cc5c</title>
    <updated>2026-05-07T17:19:46.716002+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f343bc77-368f-49dd-bd05-9a51df23cc5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28018", "type": "published-proof-of-concept", "source": "https://t.me/someSecurityNotes/78", "content": "#exploit #exim #guide\n\u2014\u2014\n\n\u0412 \u0441\u0442\u0430\u0442\u044c\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442\u0441\u044f \u043f\u043e\u043b\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043f\u043e\u0438\u0441\u043a\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u0434\u043b\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 exim (CVE-2020-28018).\n\u2014\u2014\n\nhttps://adepts.of0x.cc/exim-cve-2020-28018/", "creation_timestamp": "2021-05-20T02:41:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f343bc77-368f-49dd-bd05-9a51df23cc5c/export"/>
    <published>2021-05-20T02:41:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/99516bea-ae77-490c-af43-890e3a6b4065/export</id>
    <title>99516bea-ae77-490c-af43-890e3a6b4065</title>
    <updated>2026-05-07T17:19:46.715947+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "99516bea-ae77-490c-af43-890e3a6b4065", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2801", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7921", "content": "#exploit\n1. CVE-2020-2546, CVE-2020-2915,\nCVE-2020-2801, CVE-2020-2798,\nCVE-2020-2883, CVE-2020-2884,\nCVE-2020-2950:\nWebLogic T3 payload exploit PoC python3\nhttps://github.com/hktalent/CVE_2020_2546\n\n2. Tips, Tricks, and Scripts for Linux Post Exploitation\nhttps://github.com/regorsec/Linux-Post-Exploitation\n\n3. CVE-2023-23488:\nUnauthenticated SQL Injection - Paid Memberships Pro &amp;lt; 2.9.8 (WordPress Plugin)\nhttps://github.com/r3nt0n/CVE-2023-23488-PoC", "creation_timestamp": "2023-03-13T22:21:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/99516bea-ae77-490c-af43-890e3a6b4065/export"/>
    <published>2023-03-13T22:21:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ba345610-1a71-4828-bb90-0400ff6d66c6/export</id>
    <title>ba345610-1a71-4828-bb90-0400ff6d66c6</title>
    <updated>2026-05-07T17:19:46.715889+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ba345610-1a71-4828-bb90-0400ff6d66c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2801", "type": "published-proof-of-concept", "source": "Telegram/5T9p9Zashh8_t2QaMEcrWCxGmV69ND__6VmH0ET2CJ3Gp-A", "content": "", "creation_timestamp": "2023-03-14T09:24:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ba345610-1a71-4828-bb90-0400ff6d66c6/export"/>
    <published>2023-03-14T09:24:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a1c4d929-a100-4357-97aa-b5dbc7df2255/export</id>
    <title>a1c4d929-a100-4357-97aa-b5dbc7df2255</title>
    <updated>2026-05-07T17:19:46.715824+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a1c4d929-a100-4357-97aa-b5dbc7df2255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28010", "type": "seen", "source": "https://t.me/irananonymous_officialf/559", "content": "\u06cc\u0627\u062f\u06cc \u06a9\u0646\u06cc\u0645 \u0627\u0632 \u0633\u0627\u06cc\u0628\u0631\u0628\u0627\u0646 \u0648 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc 50 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 \u0647\u0645\u0686\u0646\u0627\u0646 \u0641\u0639\u0627\u0644\u0646 \n\n\u0628\u062e\u0648\u0627\u06cc\u0645 \u0627\u0634\u0627\u0631\u0647 \u06a9\u0646\u06cc\u0645 \u0628\u0647 \nCVE-2017-3142\n\nCVE-2023-42119\n\nCVE-2020-28010", "creation_timestamp": "2024-11-04T16:25:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a1c4d929-a100-4357-97aa-b5dbc7df2255/export"/>
    <published>2024-11-04T16:25:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0ba1ccb7-536d-49e5-8da0-9fbeef2afa56/export</id>
    <title>0ba1ccb7-536d-49e5-8da0-9fbeef2afa56</title>
    <updated>2026-05-07T17:19:46.715738+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0ba1ccb7-536d-49e5-8da0-9fbeef2afa56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28010", "type": "seen", "source": "https://t.me/iranAnonymous_Ko/2713", "content": "\u06cc\u0627\u062f\u06cc \u06a9\u0646\u06cc\u0645 \u0627\u0632 \u0633\u0627\u06cc\u0628\u0631\u0628\u0627\u0646 \u0648 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc 50 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 \u0647\u0645\u0686\u0646\u0627\u0646 \u0641\u0639\u0627\u0644\u0646 \n\n\u0628\u062e\u0648\u0627\u06cc\u0645 \u0627\u0634\u0627\u0631\u0647 \u06a9\u0646\u06cc\u0645 \u0628\u0647 \nCVE-2017-3142\n\nCVE-2023-42119\n\nCVE-2020-28010", "creation_timestamp": "2024-11-04T16:27:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0ba1ccb7-536d-49e5-8da0-9fbeef2afa56/export"/>
    <published>2024-11-04T16:27:07+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/eb95dfd2-402f-4c8c-9591-21f7dc596a55/export</id>
    <title>eb95dfd2-402f-4c8c-9591-21f7dc596a55</title>
    <updated>2026-05-07T17:19:46.713295+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "eb95dfd2-402f-4c8c-9591-21f7dc596a55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28010", "type": "seen", "source": "https://t.me/GhostsIranOfficial/114", "content": "\u06cc\u0627\u062f\u06cc \u06a9\u0646\u06cc\u0645 \u0627\u0632 \u0633\u0627\u06cc\u0628\u0631\u0628\u0627\u0646 \u0648 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc 50 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 \u0647\u0645\u0686\u0646\u0627\u0646 \u0641\u0639\u0627\u0644\u0646 \n\n\u0628\u062e\u0648\u0627\u06cc\u0645 \u0627\u0634\u0627\u0631\u0647 \u06a9\u0646\u06cc\u0645 \u0628\u0647 \nCVE-2017-3142\n\nCVE-2023-42119\n\nCVE-2020-28010", "creation_timestamp": "2024-11-04T16:27:07.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/eb95dfd2-402f-4c8c-9591-21f7dc596a55/export"/>
    <published>2024-11-04T16:27:07+00:00</published>
  </entry>
</feed>
