<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 23 May 2026 20:31:27 +0000</lastBuildDate>
    <item>
      <title>293d51e5-bcea-4a89-aabb-470779d99c63</title>
      <link>https://db.gcve.eu/sighting/293d51e5-bcea-4a89-aabb-470779d99c63/export</link>
      <description>{"uuid": "293d51e5-bcea-4a89-aabb-470779d99c63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1306", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-32099\nURL\uff1ahttps://github.com/ibnuuby/CVE-2021-32099", "creation_timestamp": "2022-01-12T11:52:29.000000Z"}</description>
      <content:encoded>{"uuid": "293d51e5-bcea-4a89-aabb-470779d99c63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1306", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-32099\nURL\uff1ahttps://github.com/ibnuuby/CVE-2021-32099", "creation_timestamp": "2022-01-12T11:52:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/293d51e5-bcea-4a89-aabb-470779d99c63/export</guid>
      <pubDate>Wed, 12 Jan 2022 11:52:29 +0000</pubDate>
    </item>
    <item>
      <title>dcea44b2-4539-40ad-b75b-bb0f76f45a92</title>
      <link>https://db.gcve.eu/sighting/dcea44b2-4539-40ad-b75b-bb0f76f45a92/export</link>
      <description>{"uuid": "dcea44b2-4539-40ad-b75b-bb0f76f45a92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1361", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aExploit for CVE-2021-32099 \nURL\uff1ahttps://github.com/nikn0laty/CVE-2021-32099_exploit", "creation_timestamp": "2022-01-18T19:32:02.000000Z"}</description>
      <content:encoded>{"uuid": "dcea44b2-4539-40ad-b75b-bb0f76f45a92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1361", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aExploit for CVE-2021-32099 \nURL\uff1ahttps://github.com/nikn0laty/CVE-2021-32099_exploit", "creation_timestamp": "2022-01-18T19:32:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dcea44b2-4539-40ad-b75b-bb0f76f45a92/export</guid>
      <pubDate>Tue, 18 Jan 2022 19:32:02 +0000</pubDate>
    </item>
    <item>
      <title>861f0349-cb82-465c-aeda-7b312855f4d0</title>
      <link>https://db.gcve.eu/sighting/861f0349-cb82-465c-aeda-7b312855f4d0/export</link>
      <description>{"uuid": "861f0349-cb82-465c-aeda-7b312855f4d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1372", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-32099 SQLi allow attacker bypass login\nURL\uff1ahttps://github.com/l3eol3eo/CVE-2021-32099_SQLi", "creation_timestamp": "2022-01-21T02:48:52.000000Z"}</description>
      <content:encoded>{"uuid": "861f0349-cb82-465c-aeda-7b312855f4d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1372", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-32099 SQLi allow attacker bypass login\nURL\uff1ahttps://github.com/l3eol3eo/CVE-2021-32099_SQLi", "creation_timestamp": "2022-01-21T02:48:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/861f0349-cb82-465c-aeda-7b312855f4d0/export</guid>
      <pubDate>Fri, 21 Jan 2022 02:48:52 +0000</pubDate>
    </item>
    <item>
      <title>483635db-2107-45d9-945d-71a31b60428d</title>
      <link>https://db.gcve.eu/sighting/483635db-2107-45d9-945d-71a31b60428d/export</link>
      <description>{"uuid": "483635db-2107-45d9-945d-71a31b60428d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/arm1tage/129", "content": "HackTheBox:\n\n\u2014Easy Machines\u2014\n\nDriver - WinRM (evil-winrm), printnightmare CVE-2021-1675 (https://habr.com/ru/sandbox/156538/)\nhttps://0xdf.gitlab.io/2022/02/26/htb-driver.html\n\nSecret - JWT, Git source (tig), crush-dumps\nhttps://0xdf.gitlab.io/2022/03/26/htb-secret.html\n\nBackDoor - Wordpress eBook Dir Trav (https://www.exploit-db.com/exploits/39575), gdb exploit (https://www.exploit-db.com/exploits/50539, https://www.rapid7.com/db/modules/exploit/multi/gdb/gdb_server_exec/) \nhttps://0xdf.gitlab.io/2022/04/23/htb-backdoor.html\n\nPrevise - Backup, Site Reverse Shell, low-encrypted passwords\nhttps://0xdf.gitlab.io/2022/01/08/htb-previse.html\n\nBountyHunter - XXE, (root) NOPASSWD python code\nhttps://0xdf.gitlab.io/2021/11/20/htb-bountyhunter.html\n\nHorizontal - Strapi CMS 3.0.0 CVE-2019-18818/CVE-2019-19609 (https://www.exploit-db.com/exploits/50239, https://github.com/diego-tella/CVE-2019-19609-EXPLOIT), Laravel v8 (https://www.exploit-db.com/exploits/49424)\nhttps://0xdf.gitlab.io/2022/02/05/htb-horizontall.html\n\nOptimum - Windows 2012 (https://www.rapid7.com/db/modules/exploit/windows/http/rejetto_hfs_exec/, https://www.rapid7.com/db/modules/exploit/windows/local/ms16_032_secondary_logon_handle_privesc/)\nhttps://0xdf.gitlab.io/2021/03/17/htb-optimum.html\n\nLame - FTP Anonymous, SAMBA exploit (https://github.com/amriunix/CVE-2007-2447)\nhttps://0xdf.gitlab.io/2020/04/07/htb-lame.html\n\nJerry - Tomcat Default Cred, shell via .WAR\nhttps://0xdf.gitlab.io/2018/11/17/htb-jerry.html\n\nBlue - Win7 eternalblue (https://www.rapid7.com/db/modules/exploit/windows/smb/ms17_010_eternalblue/)\nhttps://0xdf.gitlab.io/2021/05/11/htb-blue.html\n\nDevel - Microsoft IIS httpd 7.5 reverse shell via .ASPX, MS11-046 or ms10_015_kitrap0d (https://github.com/abatchy17/WindowsExploits/tree/master/MS11-046)\nhttps://0xdf.gitlab.io/2019/03/05/htb-devel.html\n\nNetmon - PRTG Network Monitor 18.1.37.13946, Backup credentials, CVE-2018-9276 (https://github.com/A1vinSmith/CVE-2018-9276) / (https://www.exploit-db.com/exploits/46527) + evil-winrm\nhttps://0xdf.gitlab.io/2019/06/29/htb-netmon.html\n\nExplore (Android) - 59777 port CVE-2019-6447 (https://www.exploit-db.com/exploits/50070), SSH Creds on Photo, adb shell\nhttps://0xdf.gitlab.io/2021/10/30/htb-explore.html\n\nAntique - Telnet password via snmpget (https://www.irongeek.com/i.php?page=security/networkprinterhacking#JetDirect%20password%20notes), CUPS 1.6.1 (https://github.com/jpillora/chisel) \nhttps://0xdf.gitlab.io/2022/05/03/htb-antique.html\n\nReturn - evil-winrm, Server Operators in net user svc-printer /domain, sc.exe\nhttps://0xdf.gitlab.io/2022/05/05/htb-return.html\n\nGrandpa - CVE-2017-7269 (https://www.rapid7.com/db/modules/exploit/windows/iis/iis_webdav_scstoragepathfromurl/), SEImpersonalPrivilege Churrasco (https://github.com/Re4son/Churrasco/)\nhttps://0xdf.gitlab.io/2020/05/28/htb-grandpa.html\n\nBeep - ShellShock or Elastix 2.2.0 - 'graph.php' Local File Inclusion, (root) NOPASSWD nmap\nhttps://0xdf.gitlab.io/2021/02/23/htb-beep.html\n\nPandora - snmpwalk creds, CVE-2021-32099, Site Reverse Shell\nhttps://0xdf.gitlab.io/2022/05/21/htb-pandora.html\n\nPaper - WPS 5.2.3 - Cve-2019-17671 (https://www.exploit-db.com/exploits/47690, https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/), Chat Bot Dir Trav, CVE-2021-3560 (https://github.com/Almorabea/Polkit-exploit/blob/main/CVE-2021-3560.py)\nhttps://0xjin.medium.com/paper-hackthebox-write-up-2abca22d3b54\n\n\n#hackthebox #ctf", "creation_timestamp": "2022-06-18T10:22:36.000000Z"}</description>
      <content:encoded>{"uuid": "483635db-2107-45d9-945d-71a31b60428d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "https://t.me/arm1tage/129", "content": "HackTheBox:\n\n\u2014Easy Machines\u2014\n\nDriver - WinRM (evil-winrm), printnightmare CVE-2021-1675 (https://habr.com/ru/sandbox/156538/)\nhttps://0xdf.gitlab.io/2022/02/26/htb-driver.html\n\nSecret - JWT, Git source (tig), crush-dumps\nhttps://0xdf.gitlab.io/2022/03/26/htb-secret.html\n\nBackDoor - Wordpress eBook Dir Trav (https://www.exploit-db.com/exploits/39575), gdb exploit (https://www.exploit-db.com/exploits/50539, https://www.rapid7.com/db/modules/exploit/multi/gdb/gdb_server_exec/) \nhttps://0xdf.gitlab.io/2022/04/23/htb-backdoor.html\n\nPrevise - Backup, Site Reverse Shell, low-encrypted passwords\nhttps://0xdf.gitlab.io/2022/01/08/htb-previse.html\n\nBountyHunter - XXE, (root) NOPASSWD python code\nhttps://0xdf.gitlab.io/2021/11/20/htb-bountyhunter.html\n\nHorizontal - Strapi CMS 3.0.0 CVE-2019-18818/CVE-2019-19609 (https://www.exploit-db.com/exploits/50239, https://github.com/diego-tella/CVE-2019-19609-EXPLOIT), Laravel v8 (https://www.exploit-db.com/exploits/49424)\nhttps://0xdf.gitlab.io/2022/02/05/htb-horizontall.html\n\nOptimum - Windows 2012 (https://www.rapid7.com/db/modules/exploit/windows/http/rejetto_hfs_exec/, https://www.rapid7.com/db/modules/exploit/windows/local/ms16_032_secondary_logon_handle_privesc/)\nhttps://0xdf.gitlab.io/2021/03/17/htb-optimum.html\n\nLame - FTP Anonymous, SAMBA exploit (https://github.com/amriunix/CVE-2007-2447)\nhttps://0xdf.gitlab.io/2020/04/07/htb-lame.html\n\nJerry - Tomcat Default Cred, shell via .WAR\nhttps://0xdf.gitlab.io/2018/11/17/htb-jerry.html\n\nBlue - Win7 eternalblue (https://www.rapid7.com/db/modules/exploit/windows/smb/ms17_010_eternalblue/)\nhttps://0xdf.gitlab.io/2021/05/11/htb-blue.html\n\nDevel - Microsoft IIS httpd 7.5 reverse shell via .ASPX, MS11-046 or ms10_015_kitrap0d (https://github.com/abatchy17/WindowsExploits/tree/master/MS11-046)\nhttps://0xdf.gitlab.io/2019/03/05/htb-devel.html\n\nNetmon - PRTG Network Monitor 18.1.37.13946, Backup credentials, CVE-2018-9276 (https://github.com/A1vinSmith/CVE-2018-9276) / (https://www.exploit-db.com/exploits/46527) + evil-winrm\nhttps://0xdf.gitlab.io/2019/06/29/htb-netmon.html\n\nExplore (Android) - 59777 port CVE-2019-6447 (https://www.exploit-db.com/exploits/50070), SSH Creds on Photo, adb shell\nhttps://0xdf.gitlab.io/2021/10/30/htb-explore.html\n\nAntique - Telnet password via snmpget (https://www.irongeek.com/i.php?page=security/networkprinterhacking#JetDirect%20password%20notes), CUPS 1.6.1 (https://github.com/jpillora/chisel) \nhttps://0xdf.gitlab.io/2022/05/03/htb-antique.html\n\nReturn - evil-winrm, Server Operators in net user svc-printer /domain, sc.exe\nhttps://0xdf.gitlab.io/2022/05/05/htb-return.html\n\nGrandpa - CVE-2017-7269 (https://www.rapid7.com/db/modules/exploit/windows/iis/iis_webdav_scstoragepathfromurl/), SEImpersonalPrivilege Churrasco (https://github.com/Re4son/Churrasco/)\nhttps://0xdf.gitlab.io/2020/05/28/htb-grandpa.html\n\nBeep - ShellShock or Elastix 2.2.0 - 'graph.php' Local File Inclusion, (root) NOPASSWD nmap\nhttps://0xdf.gitlab.io/2021/02/23/htb-beep.html\n\nPandora - snmpwalk creds, CVE-2021-32099, Site Reverse Shell\nhttps://0xdf.gitlab.io/2022/05/21/htb-pandora.html\n\nPaper - WPS 5.2.3 - Cve-2019-17671 (https://www.exploit-db.com/exploits/47690, https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/), Chat Bot Dir Trav, CVE-2021-3560 (https://github.com/Almorabea/Polkit-exploit/blob/main/CVE-2021-3560.py)\nhttps://0xjin.medium.com/paper-hackthebox-write-up-2abca22d3b54\n\n\n#hackthebox #ctf", "creation_timestamp": "2022-06-18T10:22:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/483635db-2107-45d9-945d-71a31b60428d/export</guid>
      <pubDate>Sat, 18 Jun 2022 10:22:36 +0000</pubDate>
    </item>
    <item>
      <title>16f5806a-d6fa-4cac-8e60-eafeeafc9265</title>
      <link>https://db.gcve.eu/sighting/16f5806a-d6fa-4cac-8e60-eafeeafc9265/export</link>
      <description>{"uuid": "16f5806a-d6fa-4cac-8e60-eafeeafc9265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "Telegram/-mv-9r5Fuiz_fiqs8bK_eK_PiWqfYGbNPnIRzDzssIknfHA", "content": "", "creation_timestamp": "2025-07-18T21:00:08.000000Z"}</description>
      <content:encoded>{"uuid": "16f5806a-d6fa-4cac-8e60-eafeeafc9265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "published-proof-of-concept", "source": "Telegram/-mv-9r5Fuiz_fiqs8bK_eK_PiWqfYGbNPnIRzDzssIknfHA", "content": "", "creation_timestamp": "2025-07-18T21:00:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/16f5806a-d6fa-4cac-8e60-eafeeafc9265/export</guid>
      <pubDate>Fri, 18 Jul 2025 21:00:08 +0000</pubDate>
    </item>
    <item>
      <title>dcb4940b-0ade-422d-a2a2-991321582314</title>
      <link>https://db.gcve.eu/sighting/dcb4940b-0ade-422d-a2a2-991321582314/export</link>
      <description>{"uuid": "dcb4940b-0ade-422d-a2a2-991321582314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:15.000000Z"}</description>
      <content:encoded>{"uuid": "dcb4940b-0ade-422d-a2a2-991321582314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dcb4940b-0ade-422d-a2a2-991321582314/export</guid>
      <pubDate>Sun, 31 Aug 2025 03:01:15 +0000</pubDate>
    </item>
    <item>
      <title>99aa14d0-b7a2-4277-a8b2-6a730a7ce4c7</title>
      <link>https://db.gcve.eu/sighting/99aa14d0-b7a2-4277-a8b2-6a730a7ce4c7/export</link>
      <description>{"uuid": "99aa14d0-b7a2-4277-a8b2-6a730a7ce4c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:51.000000Z"}</description>
      <content:encoded>{"uuid": "99aa14d0-b7a2-4277-a8b2-6a730a7ce4c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32099", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/99aa14d0-b7a2-4277-a8b2-6a730a7ce4c7/export</guid>
      <pubDate>Sun, 31 Aug 2025 03:12:51 +0000</pubDate>
    </item>
  </channel>
</rss>
