<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-02T03:22:37.063236+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/91e7b453-31e1-421d-96d8-708626d105f7/export</id>
    <title>91e7b453-31e1-421d-96d8-708626d105f7</title>
    <updated>2026-05-02T03:22:37.477876+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "91e7b453-31e1-421d-96d8-708626d105f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4986", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPOC of the CVE-2023-39063\nURL\uff1ahttps://github.com/AndreGNogueira/CVE-2023-39063\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-25T08:48:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/91e7b453-31e1-421d-96d8-708626d105f7/export"/>
    <published>2023-08-25T08:48:34+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/020f42ec-5fad-42f3-9ae7-f0255dc7673b/export</id>
    <title>020f42ec-5fad-42f3-9ae7-f0255dc7673b</title>
    <updated>2026-05-02T03:22:37.477823+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "020f42ec-5fad-42f3-9ae7-f0255dc7673b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8921", "content": "#exploit\n1. CVE-2023-36844, CVE-2023-36845,\nCVE-2023-36846, CVE-2023-36847:\nRCE in Juniper JunOS within SRX/EX Series products\nhttps://github.com/watchtowrlabs/juniper-rce_cve-2023-36844\n\n2. CVE-2023-41080:\nApache Tomcat FORM Authentication redirect\nhttps://github.com/shiomiyan/CVE-2023-41080\n\n3. CVE-2023-39063:\nRaidenFTPD Buffer Overflow\nhttps://github.com/AndreGNogueira/CVE-2023-39063", "creation_timestamp": "2023-08-27T15:11:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/020f42ec-5fad-42f3-9ae7-f0255dc7673b/export"/>
    <published>2023-08-27T15:11:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5e296c21-a326-4764-a683-b31b43a0626a/export</id>
    <title>5e296c21-a326-4764-a683-b31b43a0626a</title>
    <updated>2026-05-02T03:22:37.477775+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5e296c21-a326-4764-a683-b31b43a0626a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "Telegram/4_4xyXQTaUbA-YsFB59E5SAxyU6CIetp1U4BNxeizjZ9FQ", "content": "", "creation_timestamp": "2023-08-28T07:37:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5e296c21-a326-4764-a683-b31b43a0626a/export"/>
    <published>2023-08-28T07:37:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/23094527-0e2a-45e5-b8f2-e95f26c18748/export</id>
    <title>23094527-0e2a-45e5-b8f2-e95f26c18748</title>
    <updated>2026-05-02T03:22:37.477724+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "23094527-0e2a-45e5-b8f2-e95f26c18748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4212", "content": "\ud83e\ude85MIDHCO Data Leak : https://system32.ink/midhco-data-leak/\n\n\ud83d\udcdfNtRemoteLoad \u2013 Remote Shellcode Injector : https://system32.ink/ntremoteload-remote-shellcode-injector/\n\n\ud83d\udc00TelegramRAT : https://system32.ink/telegramrat/\n\n\ud83e\uddeeCVE-2023-38831 Winrar Exploit Generator : https://system32.ink/cve-2023-38831-winrar-exploit-generator/\n\n\ud83d\udc7eCVE-2023-39063 Poc : https://system32.ink/cve-2023-39063-poc/\n\n\ud83e\udeacJupiterX Core Premium Plugin Mass Exploit \u2013 CVE-2023-38388 : https://system32.ink/jupiterx-core-premium-plugin-mass-exploit-cve-2023-38388/\n\n\ud83d\udcefJDK CVE-2023-21939 POC : https://system32.ink/jdk-cve-2023-21939-poc/", "creation_timestamp": "2023-08-28T07:49:18.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/23094527-0e2a-45e5-b8f2-e95f26c18748/export"/>
    <published>2023-08-28T07:49:18+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/31a24990-80a2-4b3f-9a66-b4ff0025a52f/export</id>
    <title>31a24990-80a2-4b3f-9a66-b4ff0025a52f</title>
    <updated>2026-05-02T03:22:37.477669+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "31a24990-80a2-4b3f-9a66-b4ff0025a52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3170", "content": "Hackers Factory \n\nOSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines\n\nhttps://github.com/rodolfomarianocy/OSCP-Tricks-2023\n\nAwesome list of keywords for Threat Hunting sessions\n\nhttps://github.com/mthcht/ThreatHunting-Keywords\n\nA Curated list of Awesome Python Scripts that Automate Stuffs.\n\nhttps://github.com/hastagAB/Awesome-Python-Scripts\n\nCVE-2023-38389 &amp;lt; Wordpress &amp;lt; JupiterX Core &amp;lt; Unauthenticated Account Takeover\n\nhttps://github.com/codeb0ss/CVE-2023-38389-PoC\n\nSimple EDR that injects a DLL into a process to place a hook on specific Windows API\n\nhttps://github.com/Helixo32/SimpleEDR\n\nCobalt Strike Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique\n\nhttps://github.com/ewby/Mockingjay_BOF\n\nRemote Shellcode Injector\n\nhttps://github.com/florylsk/NtRemoteLoad\n\nA Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.\n\nhttps://github.com/almandin/krbjack\n\nDebugAmsi\n\nDebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.\n\ngithub.com/MzHmO/DebugAmsi\n\nPOC of the CVE-2023-39063\n\nhttps://github.com/AndreGNogueira/CVE-2023-39063 \n\nICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode\n\nhttps://github.com/Tricker-z/CoFuzz\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-08-28T18:21:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/31a24990-80a2-4b3f-9a66-b4ff0025a52f/export"/>
    <published>2023-08-28T18:21:49+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0feef6df-788b-4b48-a6be-c4acf625f82d/export</id>
    <title>0feef6df-788b-4b48-a6be-c4acf625f82d</title>
    <updated>2026-05-02T03:22:37.477615+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0feef6df-788b-4b48-a6be-c4acf625f82d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4217", "content": "\ud83e\ude85MIDHCO Data Leak : https://system32.ink/midhco-data-leak/\n\n\ud83d\udcdfNtRemoteLoad \u2013 Remote Shellcode Injector : https://system32.ink/ntremoteload-remote-shellcode-injector/\n\n\ud83d\udc00TelegramRAT : https://system32.ink/telegramrat/\n\n\ud83e\uddeeCVE-2023-38831 Winrar Exploit Generator : https://system32.ink/cve-2023-38831-winrar-exploit-generator/\n\n\ud83d\udc7eCVE-2023-39063 Poc : https://system32.ink/cve-2023-39063-poc/\n\n\ud83e\udeacJupiterX Core Premium Plugin Mass Exploit \u2013 CVE-2023-38388 : https://system32.ink/jupiterx-core-premium-plugin-mass-exploit-cve-2023-38388/\n\n\ud83d\udcefJDK CVE-2023-21939 POC : https://system32.ink/jdk-cve-2023-21939-poc/", "creation_timestamp": "2023-08-29T06:55:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0feef6df-788b-4b48-a6be-c4acf625f82d/export"/>
    <published>2023-08-29T06:55:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/396a55ad-b16a-4b75-a963-adf623d73852/export</id>
    <title>396a55ad-b16a-4b75-a963-adf623d73852</title>
    <updated>2026-05-02T03:22:37.477565+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "396a55ad-b16a-4b75-a963-adf623d73852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "Telegram/Hl-xhae5gWXK7tw2HlsQ48dSVuT7dVcXsNReL7eVRTh3eA", "content": "", "creation_timestamp": "2023-09-06T15:34:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/396a55ad-b16a-4b75-a963-adf623d73852/export"/>
    <published>2023-09-06T15:34:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5004c5ad-50e6-4446-8e48-5c8f5e253028/export</id>
    <title>5004c5ad-50e6-4446-8e48-5c8f5e253028</title>
    <updated>2026-05-02T03:22:37.477506+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5004c5ad-50e6-4446-8e48-5c8f5e253028", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4263", "content": "\ud83e\ude85MIDHCO Data Leak : https://system32.ink/midhco-data-leak/\n\n\ud83d\udcdfNtRemoteLoad \u2013 Remote Shellcode Injector : https://system32.ink/ntremoteload-remote-shellcode-injector/\n\n\ud83d\udc00TelegramRAT : https://system32.ink/telegramrat/\n\n\ud83e\uddeeCVE-2023-38831 Winrar Exploit Generator : https://system32.ink/cve-2023-38831-winrar-exploit-generator/\n\n\ud83d\udc7eCVE-2023-39063 Poc : https://system32.ink/cve-2023-39063-poc/\n\n\ud83e\udeacJupiterX Core Premium Plugin Mass Exploit \u2013 CVE-2023-38388 : https://system32.ink/jupiterx-core-premium-plugin-mass-exploit-cve-2023-38388/\n\n\ud83d\udcefJDK CVE-2023-21939 POC : https://system32.ink/jdk-cve-2023-21939-poc/", "creation_timestamp": "2023-09-06T18:21:21.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5004c5ad-50e6-4446-8e48-5c8f5e253028/export"/>
    <published>2023-09-06T18:21:21+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e4c81847-7d51-4d56-a596-17875b83b398/export</id>
    <title>e4c81847-7d51-4d56-a596-17875b83b398</title>
    <updated>2026-05-02T03:22:37.477418+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e4c81847-7d51-4d56-a596-17875b83b398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "seen", "source": "https://t.me/cibsecurity/70233", "content": "\u203c CVE-2023-39063 \u203c\n\nBuffer Overflow vulnerability in RaidenFTPD 2.4.4005 allows a local attacker to execute arbitrary code via the Server name field of the Step by step setup wizard.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-11T22:27:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e4c81847-7d51-4d56-a596-17875b83b398/export"/>
    <published>2023-09-11T22:27:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/741f21a5-5f88-4d45-94db-1da7e59afe61/export</id>
    <title>741f21a5-5f88-4d45-94db-1da7e59afe61</title>
    <updated>2026-05-02T03:22:37.476307+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "741f21a5-5f88-4d45-94db-1da7e59afe61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "https://t.me/Shade_Black_Hacker/687", "content": "\ud83e\ude85MIDHCO Data Leak : https://system32.ink/midhco-data-leak/\n\n\ud83d\udcdfNtRemoteLoad \u2013 Remote Shellcode Injector : https://system32.ink/ntremoteload-remote-shellcode-injector/\n\n\ud83d\udc00TelegramRAT : https://system32.ink/telegramrat/\n\n\ud83e\uddeeCVE-2023-38831 Winrar Exploit Generator : https://system32.ink/cve-2023-38831-winrar-exploit-generator/\n\n\ud83d\udc7eCVE-2023-39063 Poc : https://system32.ink/cve-2023-39063-poc/\n\n\ud83e\udeacJupiterX Core Premium Plugin Mass Exploit \u2013 CVE-2023-38388 : https://system32.ink/jupiterx-core-premium-plugin-mass-exploit-cve-2023-38388/\n\n\ud83d\udcefJDK CVE-2023-21939 POC : https://system32.ink/jdk-cve-2023-21939-poc/", "creation_timestamp": "2023-09-30T20:01:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/741f21a5-5f88-4d45-94db-1da7e59afe61/export"/>
    <published>2023-09-30T20:01:41+00:00</published>
  </entry>
</feed>
