<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T10:11:47.767771+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/445275ca-5083-418c-99b3-6216c1eaaf76/export</id>
    <title>445275ca-5083-418c-99b3-6216c1eaaf76</title>
    <updated>2026-05-08T10:11:48.194694+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "445275ca-5083-418c-99b3-6216c1eaaf76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34843", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4637", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPublic disclosure for CVE-2023-34843.\nURL\uff1ahttps://github.com/rootd4ddy/CVE-2023-34843\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-28T07:44:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/445275ca-5083-418c-99b3-6216c1eaaf76/export"/>
    <published>2023-06-28T07:44:18+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/434e7e35-b797-4355-b07a-dcb7b08d2e69/export</id>
    <title>434e7e35-b797-4355-b07a-dcb7b08d2e69</title>
    <updated>2026-05-08T10:11:48.194632+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "434e7e35-b797-4355-b07a-dcb7b08d2e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34843", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8578", "content": "#exploit\n1. CVE-2023-26258:\nRCE in ArcServe UDP Backup\nhttps://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup\n\n2. CVE-2023-34843:\ntraggo/server ver. 0.3 - directory traversal\nhttps://github.com/rootd4ddy/CVE-2023-34843\n\n3. A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk\nhttps://github.com/adhikara13/CVE-2022-4510-WalkingPath", "creation_timestamp": "2023-06-29T11:03:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/434e7e35-b797-4355-b07a-dcb7b08d2e69/export"/>
    <published>2023-06-29T11:03:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ab31e7c3-743e-4e08-8168-b43496d01334/export</id>
    <title>ab31e7c3-743e-4e08-8168-b43496d01334</title>
    <updated>2026-05-08T10:11:48.194533+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ab31e7c3-743e-4e08-8168-b43496d01334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34843", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3780", "content": "\ud83d\udd10DATALEAKS:\n\n\ud83d\udcccSocial Security Administration USA (SSA.gov) Leak : https://www.system32.ink/2023/06/social-security-administration-usa.html\n\n\ud83d\udcccElectrical4all (electrical4all.co.uk) UK Data Leak : https://www.system32.ink/2023/06/electrical4all-electrical4allcouk-uk.html\n\n\ud83d\udcccAuraXR (Mexican 'extended reality' company) DATA Leak : https://www.system32.ink/2023/06/auraxr-mexican-extended-reality-company.html\n\n\ud83d\udcccQWERT SYSTEM (South Korean POS systems) Leak : https://www.system32.ink/2023/06/qwert-system-south-korean-pos-systems.html\n\n\ud83d\udcccTelstra MyRewards (Australian rewards/coupon service) Data Leak : https://www.system32.ink/2023/06/telstra-myrewards-australian.html\n\n\ud83d\udcccDoctorAki (Colombian health website) Data Leak : https://www.system32.ink/2023/06/doctoraki-colombian-health-website-data.html\n\n\ud83d\udcccNovaPay data leak : https://www.system32.ink/2023/06/novapay-data-leak.html\n\n\ud83d\udccc3S Castle Real Estate (3skalegayrimenkul.com.tr) Data Leak : https://www.system32.ink/2023/06/3s-castle-real-estate.html\n\n\ud83e\uddeeExploits: \n\n\ud83d\udcccCVE-2023-34843 POC Traggo/server : https://www.system32.ink/2023/06/cve-2023-34843-poc-traggoserver.html\n\n\ud83d\udcccCVE-2023-2982 Exploit WordPress Social Login and Register Plugin : https://www.system32.ink/2023/06/cve-2023-2982-exploit-wordpress-social.html\n\n\ud83d\udee0Tools:\n\n\ud83d\udcccATSCAN SCANNER - Advanced dork Search &amp;amp; Mass Exploit Scanner : https://www.system32.ink/2023/06/atscan-scanner-advanced-dork-search.html\n\n\ud83d\udcccDecrypt FortiManager configuration secrets (CVE-2020-9289) : https://www.system32.ink/2023/06/decrypt-fortimanager-configuration.html\n\n\ud83d\udcccNoMoreCookies - Browser Protector against various Stealers : https://www.system32.ink/2023/06/nomorecookies-browser-protector-against.html\n\n\ud83d\udc00RAT:\n\n\ud83d\udcccEverspy v1.1 Rat : https://www.system32.ink/2023/06/everspy-v11-rat-cracked-download.html\n\n\ud83e\udee5SCAMPAGE:\n\n\ud83d\udcccBellco Credit Union Scampage : https://www.system32.ink/2023/06/bellco-credit-union-phishing-page.html", "creation_timestamp": "2023-06-30T15:51:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ab31e7c3-743e-4e08-8168-b43496d01334/export"/>
    <published>2023-06-30T15:51:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0f3b9437-437c-401c-b55e-03f4f7440aa4/export</id>
    <title>0f3b9437-437c-401c-b55e-03f4f7440aa4</title>
    <updated>2026-05-08T10:11:48.192578+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0f3b9437-437c-401c-b55e-03f4f7440aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34843", "type": "published-proof-of-concept", "source": "Telegram/rQMVu4dwJRh1-j8AkvL2ouV19FMmA1TDUkwtOokmEHAkfA", "content": "", "creation_timestamp": "2023-07-01T09:06:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0f3b9437-437c-401c-b55e-03f4f7440aa4/export"/>
    <published>2023-07-01T09:06:39+00:00</published>
  </entry>
</feed>
