<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-23T19:22:35.830791+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/3952c4c8-1d60-45d8-bde6-c8068f9cf6e1/export</id>
    <title>3952c4c8-1d60-45d8-bde6-c8068f9cf6e1</title>
    <updated>2026-05-23T19:22:36.368396+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3952c4c8-1d60-45d8-bde6-c8068f9cf6e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32112", "type": "seen", "source": "https://t.me/cibsecurity/63556", "content": "\u203c CVE-2023-32112 \u203c\n\nVendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to\u00c2\u00a0access some of its function. This could lead to modification of data impacting the integrity of the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T07:43:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3952c4c8-1d60-45d8-bde6-c8068f9cf6e1/export"/>
    <published>2023-05-09T07:43:08+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c2c6d6cf-e9dd-4c22-bf9c-2a961672cbe4/export</id>
    <title>c2c6d6cf-e9dd-4c22-bf9c-2a961672cbe4</title>
    <updated>2026-05-23T19:22:36.368335+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c2c6d6cf-e9dd-4c22-bf9c-2a961672cbe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32111", "type": "seen", "source": "https://t.me/cibsecurity/63569", "content": "\u203c CVE-2023-32111 \u203c\n\nIn SAP PowerDesigner (Proxy) - version 16.7, an attacker can send a crafted request from a remote host to the proxy machine and crash the proxy server, due to faulty implementation of memory management causing a memory corruption. This leads to a high impact on availability of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T07:43:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c2c6d6cf-e9dd-4c22-bf9c-2a961672cbe4/export"/>
    <published>2023-05-09T07:43:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/100d28b0-465b-4512-8406-6ad99fcadab6/export</id>
    <title>100d28b0-465b-4512-8406-6ad99fcadab6</title>
    <updated>2026-05-23T19:22:36.368273+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "100d28b0-465b-4512-8406-6ad99fcadab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1631", "content": "CVE-2023-32117\nGoogle Drive Plugin, WordPress \u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 via REST API Endpoints\nPOC  CURL )", "creation_timestamp": "2023-07-17T15:47:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/100d28b0-465b-4512-8406-6ad99fcadab6/export"/>
    <published>2023-07-17T15:47:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/042ca3d9-4624-4338-9f40-a685d462f3ef/export</id>
    <title>042ca3d9-4624-4338-9f40-a685d462f3ef</title>
    <updated>2026-05-23T19:22:36.368208+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "042ca3d9-4624-4338-9f40-a685d462f3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8690", "content": "#exploit\n1. CVE-2023-32117:\nIntegrate Google Drive &amp;lt;=1.1.99 - Missing Authorization via REST API Endpoints\nhttps://github.com/RandomRobbieBF/CVE-2023-32117\n\n2. Exploit for UWP roblox\nhttps://github.com/DevXternal/Crinox-Rebooted", "creation_timestamp": "2023-07-18T11:00:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/042ca3d9-4624-4338-9f40-a685d462f3ef/export"/>
    <published>2023-07-18T11:00:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/03e53b13-5d93-452f-b635-86c03d5db91d/export</id>
    <title>03e53b13-5d93-452f-b635-86c03d5db91d</title>
    <updated>2026-05-23T19:22:36.368141+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "03e53b13-5d93-452f-b635-86c03d5db91d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/883", "content": "", "creation_timestamp": "2023-07-19T05:31:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/03e53b13-5d93-452f-b635-86c03d5db91d/export"/>
    <published>2023-07-19T05:31:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0ab4b7c1-2344-444b-9d03-5178fa1b6fb3/export</id>
    <title>0ab4b7c1-2344-444b-9d03-5178fa1b6fb3</title>
    <updated>2026-05-23T19:22:36.368077+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0ab4b7c1-2344-444b-9d03-5178fa1b6fb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32119", "type": "seen", "source": "https://t.me/cibsecurity/69053", "content": "\u203c CVE-2023-32119 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPO365 | Mail Integration for Office 365 / Outlook plugin &amp;lt;=\u00c2\u00a01.9.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-23T16:13:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0ab4b7c1-2344-444b-9d03-5178fa1b6fb3/export"/>
    <published>2023-08-23T16:13:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/55b94e83-e479-4fcc-8604-b54ac2ca0f35/export</id>
    <title>55b94e83-e479-4fcc-8604-b54ac2ca0f35</title>
    <updated>2026-05-23T19:22:36.368015+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "55b94e83-e479-4fcc-8604-b54ac2ca0f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3211", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1198", "content": "", "creation_timestamp": "2023-09-30T07:19:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/55b94e83-e479-4fcc-8604-b54ac2ca0f35/export"/>
    <published>2023-09-30T07:19:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6dd5566c-9d09-4511-b449-f267401a801d/export</id>
    <title>6dd5566c-9d09-4511-b449-f267401a801d</title>
    <updated>2026-05-23T19:22:36.367948+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6dd5566c-9d09-4511-b449-f267401a801d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3211", "type": "seen", "source": "https://t.me/ctinow/168910", "content": "https://ift.tt/dVNRSjG\nCVE-2023-3211", "creation_timestamp": "2024-01-16T17:27:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6dd5566c-9d09-4511-b449-f267401a801d/export"/>
    <published>2024-01-16T17:27:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1a7faf4d-c44a-4a21-a9c0-44d86b962d02/export</id>
    <title>1a7faf4d-c44a-4a21-a9c0-44d86b962d02</title>
    <updated>2026-05-23T19:22:36.367853+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1a7faf4d-c44a-4a21-a9c0-44d86b962d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3211", "type": "seen", "source": "https://t.me/ctinow/171517", "content": "https://ift.tt/OdBvf5n\nCVE-2023-3211 Exploit", "creation_timestamp": "2024-01-22T23:16:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1a7faf4d-c44a-4a21-a9c0-44d86b962d02/export"/>
    <published>2024-01-22T23:16:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/87b8cd34-277f-4108-8f05-ad01f3de05d1/export</id>
    <title>87b8cd34-277f-4108-8f05-ad01f3de05d1</title>
    <updated>2026-05-23T19:22:36.366117+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "87b8cd34-277f-4108-8f05-ad01f3de05d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mdgnthhzca2q", "content": "", "creation_timestamp": "2026-01-27T21:03:03.368236Z"}</content>
    <link href="https://db.gcve.eu/sighting/87b8cd34-277f-4108-8f05-ad01f3de05d1/export"/>
    <published>2026-01-27T21:03:03.368236+00:00</published>
  </entry>
</feed>
