<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-13T19:11:07.561145+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ce05afc3-4abb-40aa-bd6b-0b9d9cb322b9/export</id>
    <title>ce05afc3-4abb-40aa-bd6b-0b9d9cb322b9</title>
    <updated>2026-05-13T19:11:07.614529+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ce05afc3-4abb-40aa-bd6b-0b9d9cb322b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23527", "type": "seen", "source": "https://gist.github.com/alon710/17e792f99dccd4680c23854163faabed", "content": "", "creation_timestamp": "2026-01-24T22:29:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ce05afc3-4abb-40aa-bd6b-0b9d9cb322b9/export"/>
    <published>2026-01-24T22:29:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0abbe8a6-4c60-471e-8902-748b343d7348/export</id>
    <title>0abbe8a6-4c60-471e-8902-748b343d7348</title>
    <updated>2026-05-13T19:11:07.614482+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0abbe8a6-4c60-471e-8902-748b343d7348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23520", "type": "seen", "source": "https://gist.github.com/alon710/e2d870fea5c04d3617a47015ae71e69e", "content": "", "creation_timestamp": "2026-01-24T22:31:38.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0abbe8a6-4c60-471e-8902-748b343d7348/export"/>
    <published>2026-01-24T22:31:38+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7a971066-6c7e-4d57-b267-6d8650a19881/export</id>
    <title>7a971066-6c7e-4d57-b267-6d8650a19881</title>
    <updated>2026-05-13T19:11:07.614427+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "7a971066-6c7e-4d57-b267-6d8650a19881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23520", "type": "seen", "source": "https://gist.github.com/alon710/003daa99d882979583d343b7f15f6842", "content": "", "creation_timestamp": "2026-01-24T22:31:41.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7a971066-6c7e-4d57-b267-6d8650a19881/export"/>
    <published>2026-01-24T22:31:41+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0da695c9-e0f8-4bb4-9e04-80ba9d506986/export</id>
    <title>0da695c9-e0f8-4bb4-9e04-80ba9d506986</title>
    <updated>2026-05-13T19:11:07.614378+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0da695c9-e0f8-4bb4-9e04-80ba9d506986", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23520", "type": "seen", "source": "https://gist.github.com/alon710/00dd7ac49a6b8af284c990fdc91bce1f", "content": "", "creation_timestamp": "2026-01-24T22:31:54.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0da695c9-e0f8-4bb4-9e04-80ba9d506986/export"/>
    <published>2026-01-24T22:31:54+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c050a3ff-9a7a-4a4d-a41e-71a330951902/export</id>
    <title>c050a3ff-9a7a-4a4d-a41e-71a330951902</title>
    <updated>2026-05-13T19:11:07.614316+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "c050a3ff-9a7a-4a4d-a41e-71a330951902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23520", "type": "seen", "source": "https://gist.github.com/alon710/07a5c8a77f23318f1c603daff4d69d1e", "content": "", "creation_timestamp": "2026-01-24T22:31:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c050a3ff-9a7a-4a4d-a41e-71a330951902/export"/>
    <published>2026-01-24T22:31:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/94a07796-71a1-4195-ab0a-f9f628f1f2c0/export</id>
    <title>94a07796-71a1-4195-ab0a-f9f628f1f2c0</title>
    <updated>2026-05-13T19:11:07.613616+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "94a07796-71a1-4195-ab0a-f9f628f1f2c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "cve-2026-23524", "type": "seen", "source": "https://bsky.app/profile/cyberlensai.bsky.social/post/3mfxqtkfumc2t", "content": "", "creation_timestamp": "2026-03-01T03:02:24.092311Z"}</content>
    <link href="https://db.gcve.eu/sighting/94a07796-71a1-4195-ab0a-f9f628f1f2c0/export"/>
    <published>2026-03-01T03:02:24.092311+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/03926c33-5474-4199-840e-98fa0bff4ad7/export</id>
    <title>03926c33-5474-4199-840e-98fa0bff4ad7</title>
    <updated>2026-05-13T19:11:07.613558+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "03926c33-5474-4199-840e-98fa0bff4ad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23520", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/76850", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-23520\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a cypher-21\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-03-23 15:57:09\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCVE-2026-23520 is a critical command injection vulnerability in Arcane, a modern Docker management platform. The flaw exists in the platform's updater service and allows for Remote Code Execution (RCE).\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-03-23T16:00:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/03926c33-5474-4199-840e-98fa0bff4ad7/export"/>
    <published>2026-03-23T16:00:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ae341ebd-e20f-4387-bc8c-02698580adb0/export</id>
    <title>ae341ebd-e20f-4387-bc8c-02698580adb0</title>
    <updated>2026-05-13T19:11:07.613493+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ae341ebd-e20f-4387-bc8c-02698580adb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23524", "type": "seen", "source": "https://t.me/GithubRedTeam/79285", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-23524\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a rockmelodies\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-04-07 15:30:44\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nLaravel Reverb \u4e3a Laravel \u5e94\u7528\u63d0\u4f9b\u5b9e\u65f6 WebSocket \u901a\u4fe1\u540e\u7aef\u3002\u5728 1.6.3 \u53ca\u66f4\u65e9\u7248\u672c\u4e2d\uff0cReverb \u5c06\u6765\u81ea Redis \u901a\u9053\u7684\u6570\u636e\u76f4\u63a5\u4f20\u9012\u7ed9 PHP \u7684 unserialize() \u51fd\u6570\uff0c\u4e14\u672a\u5bf9\u53ef\u5b9e\u4f8b\u5316\u7684\u7c7b\u8fdb\u884c\u9650\u5236\uff0c\u5bfc\u81f4\u7528\u6237\u9762\u4e34\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u98ce\u9669\u3002\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-04-07T16:00:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ae341ebd-e20f-4387-bc8c-02698580adb0/export"/>
    <published>2026-04-07T16:00:04+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a905f442-9517-41b7-8884-3ed169cc29ca/export</id>
    <title>a905f442-9517-41b7-8884-3ed169cc29ca</title>
    <updated>2026-05-13T19:11:07.613417+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a905f442-9517-41b7-8884-3ed169cc29ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23524", "type": "published-proof-of-concept", "source": "Telegram/Wl9CrQOxsQx4KE-BWCuSJcJWoX1uryv_sC7BNGTK9kDjsYQ", "content": "", "creation_timestamp": "2026-04-07T21:00:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a905f442-9517-41b7-8884-3ed169cc29ca/export"/>
    <published>2026-04-07T21:00:05+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/13b8d770-ad91-4d84-ade3-a2cbae3211f3/export</id>
    <title>13b8d770-ad91-4d84-ade3-a2cbae3211f3</title>
    <updated>2026-05-13T19:11:07.610323+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "13b8d770-ad91-4d84-ade3-a2cbae3211f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23520", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/79998", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a HTB\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a secopssite\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 9  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 2\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-04-12 13:45:53\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nHackTheBox (HTB) writeups and exploit kits: Silentium, VariaType, Fries, Garfield, Hercules, Kobold, Pirate, CCTV, DevArea, HiddenPath, LockedAway, Interpreter \u2014 CVE-2025-59528, CVE-2025-8110, CVE-2025-2945, CVE-2026-23520, CVE-2025-66034, CVE-2024-25082\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-04-12T14:00:04.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/13b8d770-ad91-4d84-ade3-a2cbae3211f3/export"/>
    <published>2026-04-12T14:00:04+00:00</published>
  </entry>
</feed>
