<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-11T01:24:04.480651+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/b4c18e0a-fcf8-4858-af50-486814ccaf95/export</id>
    <title>b4c18e0a-fcf8-4858-af50-486814ccaf95</title>
    <updated>2026-05-11T01:24:04.818473+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b4c18e0a-fcf8-4858-af50-486814ccaf95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30990", "type": "seen", "source": "https://t.me/thebugbountyhunter/7486", "content": "Technical Details of CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service\n\nhttps://blog.silentsignal.eu/2023/07/03/ibm-i-dde-vulnerability-cve-2023-30990/", "creation_timestamp": "2023-07-03T15:45:35.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b4c18e0a-fcf8-4858-af50-486814ccaf95/export"/>
    <published>2023-07-03T15:45:35+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/addf3c57-50f1-458c-97ad-d5e43dcfca96/export</id>
    <title>addf3c57-50f1-458c-97ad-d5e43dcfca96</title>
    <updated>2026-05-11T01:24:04.818418+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "addf3c57-50f1-458c-97ad-d5e43dcfca96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30990", "type": "seen", "source": "https://t.me/cibsecurity/65916", "content": "\u203c CVE-2023-30990 \u203c\n\nIBM i 7.2, 7.3, 7.4, and 7.5 could allow a remote attacker to execute CL commands as QUSER, caused by an exploitation of DDM architecture. IBM X-Force ID: 254036.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-04T07:28:25.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/addf3c57-50f1-458c-97ad-d5e43dcfca96/export"/>
    <published>2023-07-04T07:28:25+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f162b955-fcf7-4a2a-b0c6-63394636435e/export</id>
    <title>f162b955-fcf7-4a2a-b0c6-63394636435e</title>
    <updated>2026-05-11T01:24:04.818351+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f162b955-fcf7-4a2a-b0c6-63394636435e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30995", "type": "seen", "source": "https://t.me/cibsecurity/70169", "content": "\u203c CVE-2023-30995 \u203c\n\nIBM Aspera Faspex 5.0.5 could allow a malicious actor to bypass IP whitelist restrictions using a specially crafted HTTP request. IBM X-Force ID: 254268.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-09T00:20:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f162b955-fcf7-4a2a-b0c6-63394636435e/export"/>
    <published>2023-09-09T00:20:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8be89773-7879-4476-ac2a-82a74a4e9a72/export</id>
    <title>8be89773-7879-4476-ac2a-82a74a4e9a72</title>
    <updated>2026-05-11T01:24:04.818297+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8be89773-7879-4476-ac2a-82a74a4e9a72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30991", "type": "seen", "source": "https://t.me/cibsecurity/72385", "content": "\u203c CVE-2023-30991 \u203c\n\nIBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 is vulnerable to denial of service with a specially crafted query. IBM X-Force ID: 254037.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-17T02:37:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8be89773-7879-4476-ac2a-82a74a4e9a72/export"/>
    <published>2023-10-17T02:37:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5313372d-e907-4075-808f-3b0b20301bc7/export</id>
    <title>5313372d-e907-4075-808f-3b0b20301bc7</title>
    <updated>2026-05-11T01:24:04.818249+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5313372d-e907-4075-808f-3b0b20301bc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30999", "type": "seen", "source": "https://t.me/ctinow/178350", "content": "https://ift.tt/4sPqwCL\nCVE-2023-30999", "creation_timestamp": "2024-02-03T02:26:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5313372d-e907-4075-808f-3b0b20301bc7/export"/>
    <published>2024-02-03T02:26:44+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/748480fb-017b-4dc4-be52-8ec4a2979eb4/export</id>
    <title>748480fb-017b-4dc4-be52-8ec4a2979eb4</title>
    <updated>2026-05-11T01:24:04.818195+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "748480fb-017b-4dc4-be52-8ec4a2979eb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30996", "type": "seen", "source": "https://t.me/ctinow/207415", "content": "https://ift.tt/Vdz3QH8\nCVE-2023-30996 | IBM Cognos Analytics 11.1.7/11.2.4/12.0.0 Message origin validation (XFDB-254290)", "creation_timestamp": "2024-03-14T04:16:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/748480fb-017b-4dc4-be52-8ec4a2979eb4/export"/>
    <published>2024-03-14T04:16:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/18735df4-f706-4aae-8112-d4a2dd9c6685/export</id>
    <title>18735df4-f706-4aae-8112-d4a2dd9c6685</title>
    <updated>2026-05-11T01:24:04.818134+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "18735df4-f706-4aae-8112-d4a2dd9c6685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30990", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8634", "content": "#exploit\n1. CVE-2023-31248:\nLinux Kernel nftables UAF LPE\nhttps://github.com/kungfulon/nf-tables-lpe\n\n2. CVE-2023-30990:\nUnauthenticated RCE in IBM i DDM Service\nhttps://blog.silentsignal.eu/2023/07/03/ibm-i-dde-vulnerability-cve-2023-30990\n\n3. CVE-2020-0911:\nWindows Installer arbitrary content manipulation EoP\nhttps://offsec.almond.consulting/windows-msiexec-eop-cve-2020-0911.html", "creation_timestamp": "2024-10-31T15:27:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/18735df4-f706-4aae-8112-d4a2dd9c6685/export"/>
    <published>2024-10-31T15:27:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/85ecba76-3b82-43d1-9ec1-5959cea933f3/export</id>
    <title>85ecba76-3b82-43d1-9ec1-5959cea933f3</title>
    <updated>2026-05-11T01:24:04.818080+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "85ecba76-3b82-43d1-9ec1-5959cea933f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30990", "type": "seen", "source": "https://bsky.app/profile/silentsignal.bsky.social/post/3lxz373qngs2n", "content": "", "creation_timestamp": "2025-09-04T11:47:46.002489Z"}</content>
    <link href="https://db.gcve.eu/sighting/85ecba76-3b82-43d1-9ec1-5959cea933f3/export"/>
    <published>2025-09-04T11:47:46.002489+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6d9d77da-6a1e-43ea-b7b2-4035546a9cf6/export</id>
    <title>6d9d77da-6a1e-43ea-b7b2-4035546a9cf6</title>
    <updated>2026-05-11T01:24:04.818000+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6d9d77da-6a1e-43ea-b7b2-4035546a9cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30990", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lxzjkb6esi2g", "content": "", "creation_timestamp": "2025-09-04T16:04:32.653579Z"}</content>
    <link href="https://db.gcve.eu/sighting/6d9d77da-6a1e-43ea-b7b2-4035546a9cf6/export"/>
    <published>2025-09-04T16:04:32.653579+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ca3f4c78-4c21-42ff-9f66-67ef03b65714/export</id>
    <title>ca3f4c78-4c21-42ff-9f66-67ef03b65714</title>
    <updated>2026-05-11T01:24:04.816899+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ca3f4c78-4c21-42ff-9f66-67ef03b65714", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-30990", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ly734pf7wk2k", "content": "", "creation_timestamp": "2025-09-06T21:02:24.621554Z"}</content>
    <link href="https://db.gcve.eu/sighting/ca3f4c78-4c21-42ff-9f66-67ef03b65714/export"/>
    <published>2025-09-06T21:02:24.621554+00:00</published>
  </entry>
</feed>
