<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T01:48:14.754111+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/8181746c-a97a-4a44-81af-23300f42d857/export</id>
    <title>8181746c-a97a-4a44-81af-23300f42d857</title>
    <updated>2026-05-05T01:48:15.517032+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8181746c-a97a-4a44-81af-23300f42d857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30347", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3716", "content": "\ud83d\udda5Data Leaks :\n\n\ud83d\udd31Bombardier Recreational Products (brp.com) Leak : https://www.system32.ink/2023/06/bombardier-recreational-products-brpcom.html\n\nf\ud83d\udd31nde_gov_br Database leak :  https://www.system32.ink/2023/06/fndegovbr-database-leak-national-fund.html\n\n\ud83d\udd31Leak Sim\u00f3n Bol\u00edvar Adventist School (casb.edu.co) Database : https://www.system32.ink/2023/06/leak-simon-bolivar-adventist-school.html\n\n\ud83d\udda5Tools: \n\n\ud83d\udd31HCL AppScan Standard v10.2.1  : https://www.system32.ink/2023/06/hcl-appscan-standard-v1021.html\n\n\ud83d\udd31Qualcomm baseband scripts (reverse Engineering) : https://www.system32.ink/2023/06/qualcomm-baseband-scripts.html\n\n\ud83d\udd31The Deepfake Offensive Toolkit : https://www.system32.ink/2023/06/the-deepfake-offensive-toolkit.html\n\n\ud83d\udda5Exploits:\n\n\ud83d\udd31CVE-2023-1454 Jeecg-Boot-qurestSql-SQLvuln Exploit : https://www.system32.ink/2023/06/cve-2023-1454-jeecg-boot-qurestsql.html\n\n\ud83d\udd31CVE-2023-30347 Exploit : Reflected Cross-Site-Scripting in Neox Contact Center : https://www.system32.ink/2023/06/cve-2023-30347-exploit-reflected-cross.html\n\n\ud83d\udda5ScamPages:\n\nJ\ud83d\udd31PMorgan Chase Bank Phishing Page : https://www.system32.ink/2023/06/jpmorgan-chase-bank-phishing-page.html\n\n@crackcodes | crackcodes.in | system32.ink", "creation_timestamp": "2023-06-22T09:44:11.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8181746c-a97a-4a44-81af-23300f42d857/export"/>
    <published>2023-06-22T09:44:11+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/31fbf870-9b10-4f61-a6c2-f300698d6d12/export</id>
    <title>31fbf870-9b10-4f61-a6c2-f300698d6d12</title>
    <updated>2026-05-05T01:48:15.516935+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "31fbf870-9b10-4f61-a6c2-f300698d6d12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30347", "type": "published-proof-of-concept", "source": "Telegram/oHP8R6rQpO8E4nEBBBMmcV3PiuGU9AfrSsjxuqFDC6WptA", "content": "", "creation_timestamp": "2023-06-22T10:11:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/31fbf870-9b10-4f61-a6c2-f300698d6d12/export"/>
    <published>2023-06-22T10:11:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/294c0c07-be4d-484d-b5e6-9050fa568e9c/export</id>
    <title>294c0c07-be4d-484d-b5e6-9050fa568e9c</title>
    <updated>2026-05-05T01:48:15.516786+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "294c0c07-be4d-484d-b5e6-9050fa568e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30347", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8535", "content": "#exploit\n1. CVE-2023-30347:\nReflected Cross-Site-Scripting in Neox Contact Center\nhttps://github.com/huzefa2212/CVE-2023-30347\n\n2. CVE-2023-1454:\nJeecg Boot qurestSql SQL vuln\nhttps://github.com/Sweelg/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln", "creation_timestamp": "2023-06-22T11:01:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/294c0c07-be4d-484d-b5e6-9050fa568e9c/export"/>
    <published>2023-06-22T11:01:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d4e043f2-d2b1-4dbe-84e3-73dc0344a0fa/export</id>
    <title>d4e043f2-d2b1-4dbe-84e3-73dc0344a0fa</title>
    <updated>2026-05-05T01:48:15.515289+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d4e043f2-d2b1-4dbe-84e3-73dc0344a0fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30347", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3090", "content": "25 Tools \ud83d\udd27 \ud83d\udd28\ud83d\udd27\ud83d\udd28-  Hackers Factory \n\n\u200b\u200bCVE-2023-27997u\n\nSafely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing.\n\nhttps://github.com/BishopFox/CVE-2023-27997-check\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bServer-Side Prototype Pollution\n\nThis repository contains a collection of Server-Side Prototype Pollution gadgets in Node.js core code and 3rd party NPM packages.\n\nhttps://github.com/yuske/server-side-prototype-pollution\n\n#cybersecurity #infosec\n\n\u200b\u200bRIDS - Remote ID Spoofer\n\nAn ESP8266/NodeMCU Drone RemoteID Spoofer. This spawns 16 different fake drones broadcasting RemoteID, with them all flying in random directions around a particular GPS location. \n\nhttps://github.com/jjshoots/RemoteIDSpoofer\n\n#cybersecurity #infosec\n\n\u200b\u200bSteganim\n\nNim implementation of storing a payload into the least significant bit of each byte of an image. Using this technique to remotely fetch shellcode or other secrets at runtime can help into removing some IOCs like payload entropy.\n\nhttps://github.com/OffenseTeacher/Steganim\n\n#infosec #pentesting #redteam\n\n\u200b\u200bqualcomm_baseband_scripts\n\nCollection of scripts for reversing Qualcomm Hexagon baseband / modem firmware.\n\nhttps://github.com/mzakocs/qualcomm_baseband_scripts\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-1454\n\nJeecg Boot qurestSql SQL vuln\n\nhttps://github.com/Sweelg/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bSilent Spring\n\nPrototype Pollution Leads to Remote Code Execution in Node.js\n\nhttps://github.com/yuske/silent-spring\n\n#cybersecurity #infosec\n\n\u200b\u200bSemgrep Rules for Android Application Security\n\nA collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.\n\nhttps://github.com/mindedsecurity/semgrep-rules-android-security\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-30347\n\nReflected Cross-Site-Scripting in Neox Contact Center\n\nhttps://github.com/huzefa2212/CVE-2023-30347\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bEFI Resolver\n\nA Binary Ninja plugin that automatically resolves type information for EFI protocol usage.\n\nhttps://github.com/Vector35/efi-resolver\n\n#cybersecurity #infosec\n\n\u200b\u200bGhostFart\n\nUnhooking is performed via indirect syscalls Leveraging NTAPI to grab NTDLL for unhooking without triggering \"PspCreateProcessNotifyRoutine\"\n\nhttps://github.com/mansk1es/GhostFart\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-27372\n\nSPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.\n\nhttps://github.com/nuts7/CVE-2023-27372\n\ncve #cybersecurity #infosec\n\n\u200b\u200bkbtls\n\nKey-Based TLS - Mutually Trusted TLS Connections Based on a Pre-Shared Connection Key.\n\nhttps://github.com/RedTeamPentesting/kbtls\n\n#infosec #pentesting #redteam\n\n\u200b\u200bArtemis\n\nA modular web reconnaissance tool and vulnerability scanner based on Karton.\n\nhttps://github.com/CERT-Polska/Artemis\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bRS-Shell\n\nA dirty PoC for a reverse shell with cool features in Rust.\n\nhttps://github.com/BlWasp/rs-shell\n\n#infosec #pentesting #redteam\n\n\u200b\u200bInvoke-PowerExtract\n\nThis tool is able to parse memory dumps of the LSASS process without any additional tools (e.g. Debuggers) or additional sideloading of mimikatz. It is a pure PowerShell implementation for parsing and extracting secrets (LSA / MSV and Kerberos) of the LSASS process.\n\nhttps://github.com/powerseb/PowerExtract\n\n#infosec #pentesting #redteam\n\nRPC Firewall\n\nCheck out our RPC Firewall blog post or our BlackHat talk to gain better understanding of RPC, RPC attacks and the solution: the RPC Firewall.\n\nhttps://github.com/zeronetworks/rpcfirewall\n\n#cybersecurity #infosec\n\n\u200b\u200bGooFuzz \n\nA tool to perform fuzzing with an #OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).\n\nhttps://github.com/m3n0sd0n4ld/GooFuzz\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200b1/2", "creation_timestamp": "2023-06-24T16:00:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/d4e043f2-d2b1-4dbe-84e3-73dc0344a0fa/export"/>
    <published>2023-06-24T16:00:44+00:00</published>
  </entry>
</feed>
