<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T07:32:34.833302+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/2dfbed64-992c-42ff-bd35-98df2e157efc/export</id>
    <title>2dfbed64-992c-42ff-bd35-98df2e157efc</title>
    <updated>2026-05-08T07:32:35.352848+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2dfbed64-992c-42ff-bd35-98df2e157efc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34965", "type": "seen", "source": "https://t.me/GithubRedTeam/4545", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aMOVEit CVE-2023-34362\nURL\uff1ahttps://github.com/happy0717/CVE-2023-34965\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-12T12:38:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2dfbed64-992c-42ff-bd35-98df2e157efc/export"/>
    <published>2023-06-12T12:38:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3f96be1b-28fb-4769-8f57-82e610a1de42/export</id>
    <title>3f96be1b-28fb-4769-8f57-82e610a1de42</title>
    <updated>2026-05-08T07:32:35.352789+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3f96be1b-28fb-4769-8f57-82e610a1de42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34965", "type": "seen", "source": "https://t.me/GithubRedTeam/4546", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aMOVEit CVE-2023-34362\nURL\uff1ahttps://github.com/AgentY0/CVE-2023-34965\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-12T12:50:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/3f96be1b-28fb-4769-8f57-82e610a1de42/export"/>
    <published>2023-06-12T12:50:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a15de645-23c9-41ba-8655-4b7bec56b0bc/export</id>
    <title>a15de645-23c9-41ba-8655-4b7bec56b0bc</title>
    <updated>2026-05-08T07:32:35.352711+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a15de645-23c9-41ba-8655-4b7bec56b0bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34965", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8479", "content": "#exploit\n1. CVE-2023-34960:\nChamilo PoC\nhttps://github.com/Aituglo/CVE-2023-34960\n\n2. CVE-2023-34965:\nSSPanel UIM not restrict access to the /link/ interface, which can lead to a leak of user subscription information\nhttps://github.com/AgentY0/CVE-2023-34965\n\n3. Excel-Exploit - MacroExploit use in excel sheet\nhttps://github.com/Mr-Cyb3rgh0st/Excel-Exploit", "creation_timestamp": "2023-06-13T11:01:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a15de645-23c9-41ba-8655-4b7bec56b0bc/export"/>
    <published>2023-06-13T11:01:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9a222715-4bd9-4ea0-96e6-d7daedc1def1/export</id>
    <title>9a222715-4bd9-4ea0-96e6-d7daedc1def1</title>
    <updated>2026-05-08T07:32:35.350813+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9a222715-4bd9-4ea0-96e6-d7daedc1def1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34965", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3084", "content": "Tools \ud83d\udd27 \ud83d\udd28- HackersFactory\n\nCVE-2023-34965\n\nSSPanel UIM is a multi-purpose agency service sales management system specially designed for Shadowsocks / V2Ray / Trojan protocols. SSPanel-Uim version before 2023.3 does not restrict access to the /link/ interface,which can lead to a leak of user subscription information.\n\nhttps://github.com/AgentY0/CVE-2023-34965\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bC2-Hunter\n\nReal-time extraction of C2 traffic.\n\nhttps://github.com/ZeroMemoryEx/C2-Hunter\n\n#infosec #pentesting #redteam\n\n\u200b\u200bpeetch\n\nA collection of tools aimed at experimenting with different aspects of eBPF to bypass TLS protocol protections.\n\nhttps://github.com/quarkslab/peetch\n\n#cybersecurity #infosec #redteam\n\n\u200b\u200bExcel-Exploit \n\nMacroExploit use in excel sheet\n\nhttps://github.com/Mr-Cyb3rgh0st/Excel-Exploit\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2023-34960\n\nChamilo PoC\n\nhttps://github.com/Aituglo/CVE-2023-34960\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34362\n\nPOC for CVE-2023-34362 affecting MOVEit Transfer.\n\nhttps://github.com/horizon3ai/CVE-2023-34362\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34362\n\nMOVEit Transfer Unauthenticated RCE. For a full technical description of the vulnerability and exploitation, please read our AttackerKB Analysis.\n\nhttps://github.com/sfewer-r7/CVE-2023-34362\n\n#cybersecurity #infosec #cve\n\n\u200b\u200bAwesome Intelligence\n\nA collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources.\n\nhttps://github.com/ARPSyndicate/awesome-intelligence\n\n#OSINT #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-2008\n\nProof of concept exploit for CVE-2023-2008, a bug in the udmabuf driver of the Linux kernel fixed in 5.19-rc4.\n\nhttps://github.com/bluefrostsecurity/CVE-2023-2008\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bKillers\n\nExploitation of process killer drivers.\n\nhttps://github.com/xalicex/Killers\n\n#infosec #pentesting #redteam\n\n\u200b\u200bInveigh\n\nA cross-platform .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers. This repo contains the primary C# version as well as the legacy PowerShell version.\n\nhttps://github.com/Kevin-Robertson/Inveigh\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bRusty Bootkit\n\nWindows UEFI Bootkit in Rust (Codename: RedLotus)\n\nhttps://github.com/memN0ps/bootkit-rs\n\n#infosec #pentesting #redteam\n\n\u200b\u200bSharpFtpC2 (PoC)\n\nA Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.\n\nhttps://github.com/DarkCoderSc/SharpFtpC2\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-06-15T12:42:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/9a222715-4bd9-4ea0-96e6-d7daedc1def1/export"/>
    <published>2023-06-15T12:42:57+00:00</published>
  </entry>
</feed>
