<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T07:30:58.347622+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/3bb28078-906f-4299-9bb7-cdf093ae5ca5/export</id>
    <title>3bb28078-906f-4299-9bb7-cdf093ae5ca5</title>
    <updated>2026-05-04T07:30:58.883271+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3bb28078-906f-4299-9bb7-cdf093ae5ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "Telegram/Ro8t_vwt7AQYmnMRxlCmXGb8FIuOnTPoeQgd1Ea_p3ddcg", "content": "", "creation_timestamp": "2023-09-15T03:38:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3bb28078-906f-4299-9bb7-cdf093ae5ca5/export"/>
    <published>2023-09-15T03:38:09+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8a7b3450-9776-4abb-a493-f74c1cc64869/export</id>
    <title>8a7b3450-9776-4abb-a493-f74c1cc64869</title>
    <updated>2026-05-04T07:30:58.883221+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8a7b3450-9776-4abb-a493-f74c1cc64869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4299", "content": "\ud83d\udcccRCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download\n\n\ud83e\ude85Pocket Access \u2013 Telegram Bot For Remote Access To Computer Files : Download\n\n\ud83d\udc38International Civil Defense Organization Data Leak : Download\n\n\ud83e\udd16CVE-2023-40930 POC: Skyworth 3.0 (Android) \u2013 Directory Traversal : Explore\n\n\ud83d\udd78Invicti Standard v23.9.0.42095 Crack : Download\n\n\ud83d\udcefSartrouville Company France Data Leak : Download\n\n\ud83c\udf1aAranui Cruises Data Leak : Download\n\n\ud83d\udc00Craxs Rat V6.7 : DOwnload\n\n\ud83e\udeacURL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore\n\n\ud83e\uddeeCVE-2023-41362 \u2013 MyBB ACP RCE Exploit : Explore\n  \n\ud83d\udc7eCVE-2023-3244 POC: WordPress Missing Authorization: Explore\n\n\ud83d\udccdOpenText EnCase Forensic Tool : Download\n\n\ud83d\udc32Telegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check", "creation_timestamp": "2023-09-16T11:16:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8a7b3450-9776-4abb-a493-f74c1cc64869/export"/>
    <published>2023-09-16T11:16:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b7c3dff4-d3ab-41c2-bd39-c7a31bba80db/export</id>
    <title>b7c3dff4-d3ab-41c2-bd39-c7a31bba80db</title>
    <updated>2026-05-04T07:30:58.883171+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b7c3dff4-d3ab-41c2-bd39-c7a31bba80db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "Telegram/UG6oSddx2bwhG_QTebEnBYG2SK7WVcpFXH_OXoX525gYMA", "content": "", "creation_timestamp": "2023-09-16T11:17:24.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b7c3dff4-d3ab-41c2-bd39-c7a31bba80db/export"/>
    <published>2023-09-16T11:17:24+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/47c26010-7526-4a9a-ad88-876e740f5eb1/export</id>
    <title>47c26010-7526-4a9a-ad88-876e740f5eb1</title>
    <updated>2026-05-04T07:30:58.883104+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "47c26010-7526-4a9a-ad88-876e740f5eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3201", "content": "Hackers Factory \n\nA collection of resources for linux reverse engineering\n\nhttps://github.com/michalmalik/linux-re-101\n\nA tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nA tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.\n\nhttps://github.com/ShorSec/ShadowSpray\n\nEXP for CVE-2023-28434 MinIO unauthorized to RCE\n\nhttps://github.com/AbelChe/evil_minio\n\nThis is a Proof of Concept (PoC) for CVE-2023-3244, a vulnerability in comment-like-dislike. The PoC demonstrates the exploitability of this vulnerability and serves as a reference for security researchers and developers to better understand and mitigate the risk associated with this issue.\n\nhttps://github.com/drnull03/POC-CVE-2023-3244\n\nNextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix\n\nhttps://github.com/Nextdoor/cspm_evaluation_matrix\n\nMass Exploit - CVE-2023-1698 &amp;lt; Unauthenticated Remote Command Execution\n\nhttps://github.com/codeb0ss/CVE-2023-1698-PoC\n\nPassive subdomain continous monitoring tool\n\nhttps://github.com/e1abrador/sub.Monitor\n\nAn exploit for OpenTSDB &amp;lt;= 2.4.1 cmd injection (CVE-2023-36812/CVE-2023-25826) written in Fortran\n\nhttps://github.com/ErikWynter/opentsdb_key_cmd_injection\n\nA collection of awesome one-liners for bug bounty hunting.\n\nhttps://github.com/0xPugazh/One-Liners\n\nThis is a useful Python script for extracting bug bounty.\n\nhttps://github.com/St74nger/writeup-miner\n\nThis repository serves as a comprehensive collection of essential wordlists utilized by bug hunters, penetration testers, and security enthusiasts during their reconnaissance and vulnerability assessment processes.\n\nhttps://github.com/bhavesh-pardhi/Wordlist-Hub\n\nKQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules &amp;amp; Hunting Rules.\n\nhttps://github.com/Bert-JanP/Hunting-Queries-Detection-Rules\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-10-23T21:34:09.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/47c26010-7526-4a9a-ad88-876e740f5eb1/export"/>
    <published>2023-10-23T21:34:09+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/53db7aa7-2b45-45ee-b7a3-3b9c333de139/export</id>
    <title>53db7aa7-2b45-45ee-b7a3-3b9c333de139</title>
    <updated>2026-05-04T07:30:58.883054+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "53db7aa7-2b45-45ee-b7a3-3b9c333de139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32443", "type": "seen", "source": "https://t.me/arpsyndicate/74", "content": "#ExploitObserverAlert\n\nCVE-2023-32443\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-32443. An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. Processing a file may lead to a denial-of-service or potentially disclose memory contents.\n\nFIRST-EPSS: 0.000650000\nNVD-IS: 5.2\nNVD-ES: 2.8", "creation_timestamp": "2023-11-11T04:02:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/53db7aa7-2b45-45ee-b7a3-3b9c333de139/export"/>
    <published>2023-11-11T04:02:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f1c81e10-8401-4783-aaa3-f6d381fd3c3e/export</id>
    <title>f1c81e10-8401-4783-aaa3-f6d381fd3c3e</title>
    <updated>2026-05-04T07:30:58.882997+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f1c81e10-8401-4783-aaa3-f6d381fd3c3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4830", "content": "\ud83d\udcccRCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download\n\n\ud83e\ude85Pocket Access \u2013 Telegram Bot For Remote Access To Computer Files : Download\n\n\ud83d\udc38International Civil Defense Organization Data Leak : Download\n\n\ud83e\udd16CVE-2023-40930 POC: Skyworth 3.0 (Android) \u2013 Directory Traversal : Explore\n\n\ud83d\udd78Invicti Standard v23.9.0.42095 Crack : Download\n\n\ud83d\udcefSartrouville Company France Data Leak : Download\n\n\ud83c\udf1aAranui Cruises Data Leak : Download\n\n\ud83d\udc00Craxs Rat V6.7 : DOwnload\n\n\ud83e\udeacURL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore\n\n\ud83e\uddeeCVE-2023-41362 \u2013 MyBB ACP RCE Exploit : Explore\n  \n\ud83d\udc7eCVE-2023-3244 POC: WordPress Missing Authorization: Explore\n\n\ud83d\udccdOpenText EnCase Forensic Tool : Download\n\n\ud83d\udc32Telegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check", "creation_timestamp": "2023-12-20T08:05:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f1c81e10-8401-4783-aaa3-f6d381fd3c3e/export"/>
    <published>2023-12-20T08:05:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/50b92608-eaab-4a83-8ae7-21995b50d108/export</id>
    <title>50b92608-eaab-4a83-8ae7-21995b50d108</title>
    <updated>2026-05-04T07:30:58.882944+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "50b92608-eaab-4a83-8ae7-21995b50d108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "Telegram/kU8an4Go1huFShTvCbdEWGzr-EU9qubcfsgo6U8YbLfS-g", "content": "", "creation_timestamp": "2023-12-20T08:06:02.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/50b92608-eaab-4a83-8ae7-21995b50d108/export"/>
    <published>2023-12-20T08:06:02+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1cd11743-61a0-4678-bf05-1eb6b986e2b5/export</id>
    <title>1cd11743-61a0-4678-bf05-1eb6b986e2b5</title>
    <updated>2026-05-04T07:30:58.882885+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1cd11743-61a0-4678-bf05-1eb6b986e2b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32448", "type": "seen", "source": "https://t.me/arpsyndicate/2431", "content": "#ExploitObserverAlert\n\nCVE-2023-32448\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32448. PowerPath for Windows, versions 7.0, 7.1 &amp;amp; 7.2 contains License Key Stored in Cleartext vulnerability. A local user with access to the installation directory can retrieve the license key of the product and use it to install and license PowerPath on different systems.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2024-01-04T04:35:44.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1cd11743-61a0-4678-bf05-1eb6b986e2b5/export"/>
    <published>2024-01-04T04:35:44+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/db517650-8f0d-4383-b61f-9a395923ffab/export</id>
    <title>db517650-8f0d-4383-b61f-9a395923ffab</title>
    <updated>2026-05-04T07:30:58.882803+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "db517650-8f0d-4383-b61f-9a395923ffab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/968", "content": "#exploit \n1. CVE-2023-3244:\nWordPress Missing Authorization\nhttps://github.com/drnull03/POC-CVE-2023-3244\n\n2. CVE-2023-35671:\nAndroid App Pin Security Issue\nhttps://github.com/MrTiz/CVE-2023-35671", "creation_timestamp": "2024-08-16T08:24:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/db517650-8f0d-4383-b61f-9a395923ffab/export"/>
    <published>2024-08-16T08:24:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3e65bd29-7ff5-4f6d-a471-6d342645ee0e/export</id>
    <title>3e65bd29-7ff5-4f6d-a471-6d342645ee0e</title>
    <updated>2026-05-04T07:30:58.880585+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3e65bd29-7ff5-4f6d-a471-6d342645ee0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32448", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1178", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32448\n\ud83d\udd39 Description: \nPowerPath for Windows, versions 7.0, 7.1 &amp;amp; 7.2 contains License Key Stored in Cleartext vulnerability. A local user with access to the installation directory can retrieve the license key of the product and use it to install and license PowerPath on different systems.\n\n\n\ud83d\udccf Published: 2023-05-30T15:29:19.013Z\n\ud83d\udccf Modified: 2025-01-10T16:37:06.150Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000214248/dsa-2023-154-powerpath-windows-security-update-for-security-update-for-multiple-vulnerabilities", "creation_timestamp": "2025-01-10T17:04:13.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3e65bd29-7ff5-4f6d-a471-6d342645ee0e/export"/>
    <published>2025-01-10T17:04:13+00:00</published>
  </entry>
</feed>
