<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 02:44:43 +0000</lastBuildDate>
    <item>
      <title>57f9d3b4-5899-4881-a28a-cd8cc9a84bec</title>
      <link>https://db.gcve.eu/sighting/57f9d3b4-5899-4881-a28a-cd8cc9a84bec/export</link>
      <description>{"uuid": "57f9d3b4-5899-4881-a28a-cd8cc9a84bec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "exploited", "source": "https://t.me/thehackernews/3967", "content": "\ud83d\udea8 Alert: CISA flags active exploits. Two recent vulnerabilities come under the scanner: \n \n\u2014 CVE-2023-42793: TeamCity Auth Bypass \n\u2014 CVE-2023-28229: Win CNG Flaw \n \nRead details here: https://thehackernews.com/2023/10/cisa-warns-of-active-exploitation-of.html \n \nAct fast, secure your networks\u2014patch by Oct 25!", "creation_timestamp": "2023-10-05T11:35:50.000000Z"}</description>
      <content:encoded>{"uuid": "57f9d3b4-5899-4881-a28a-cd8cc9a84bec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "exploited", "source": "https://t.me/thehackernews/3967", "content": "\ud83d\udea8 Alert: CISA flags active exploits. Two recent vulnerabilities come under the scanner: \n \n\u2014 CVE-2023-42793: TeamCity Auth Bypass \n\u2014 CVE-2023-28229: Win CNG Flaw \n \nRead details here: https://thehackernews.com/2023/10/cisa-warns-of-active-exploitation-of.html \n \nAct fast, secure your networks\u2014patch by Oct 25!", "creation_timestamp": "2023-10-05T11:35:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/57f9d3b4-5899-4881-a28a-cd8cc9a84bec/export</guid>
      <pubDate>Thu, 05 Oct 2023 11:35:50 +0000</pubDate>
    </item>
    <item>
      <title>9219aba4-12e1-42ba-9743-8de7008e1ee4</title>
      <link>https://db.gcve.eu/sighting/9219aba4-12e1-42ba-9743-8de7008e1ee4/export</link>
      <description>{"uuid": "9219aba4-12e1-42ba-9743-8de7008e1ee4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1270", "content": "https://github.com/Y3A/CVE-2023-28229\n#github", "creation_timestamp": "2023-10-13T05:10:10.000000Z"}</description>
      <content:encoded>{"uuid": "9219aba4-12e1-42ba-9743-8de7008e1ee4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1270", "content": "https://github.com/Y3A/CVE-2023-28229\n#github", "creation_timestamp": "2023-10-13T05:10:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9219aba4-12e1-42ba-9743-8de7008e1ee4/export</guid>
      <pubDate>Fri, 13 Oct 2023 05:10:10 +0000</pubDate>
    </item>
    <item>
      <title>bee14cfc-6093-43d5-a0d6-06d5b1bdef3d</title>
      <link>https://db.gcve.eu/sighting/bee14cfc-6093-43d5-a0d6-06d5b1bdef3d/export</link>
      <description>{"uuid": "bee14cfc-6093-43d5-a0d6-06d5b1bdef3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3427", "content": "https://github.com/Y3A/CVE-2023-28229", "creation_timestamp": "2023-10-13T05:12:38.000000Z"}</description>
      <content:encoded>{"uuid": "bee14cfc-6093-43d5-a0d6-06d5b1bdef3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3427", "content": "https://github.com/Y3A/CVE-2023-28229", "creation_timestamp": "2023-10-13T05:12:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bee14cfc-6093-43d5-a0d6-06d5b1bdef3d/export</guid>
      <pubDate>Fri, 13 Oct 2023 05:12:38 +0000</pubDate>
    </item>
    <item>
      <title>44abe608-544c-42a7-ba09-5195e6a8c52f</title>
      <link>https://db.gcve.eu/sighting/44abe608-544c-42a7-ba09-5195e6a8c52f/export</link>
      <description>{"uuid": "44abe608-544c-42a7-ba09-5195e6a8c52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9190", "content": "#exploit\n1. CVE-2023-28229:\nWindows CNG KeyIso RPC EoP/SBX\nhttps://github.com/Y3A/CVE-2023-28229\n\n2. Polygon Smart Contract Bug\nhttps://blog.chain.link/smart-contract-bug-hunting\n\n3. CVE-2023-36723:\nPoC for arbitrary directory creation bug in Container Manager service\nhttps://github.com/Wh04m1001/CVE-2023-36723", "creation_timestamp": "2023-10-13T10:59:01.000000Z"}</description>
      <content:encoded>{"uuid": "44abe608-544c-42a7-ba09-5195e6a8c52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9190", "content": "#exploit\n1. CVE-2023-28229:\nWindows CNG KeyIso RPC EoP/SBX\nhttps://github.com/Y3A/CVE-2023-28229\n\n2. Polygon Smart Contract Bug\nhttps://blog.chain.link/smart-contract-bug-hunting\n\n3. CVE-2023-36723:\nPoC for arbitrary directory creation bug in Container Manager service\nhttps://github.com/Wh04m1001/CVE-2023-36723", "creation_timestamp": "2023-10-13T10:59:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/44abe608-544c-42a7-ba09-5195e6a8c52f/export</guid>
      <pubDate>Fri, 13 Oct 2023 10:59:01 +0000</pubDate>
    </item>
    <item>
      <title>632747b3-2ae9-440e-8b73-ead6d25240b4</title>
      <link>https://db.gcve.eu/sighting/632747b3-2ae9-440e-8b73-ead6d25240b4/export</link>
      <description>{"uuid": "632747b3-2ae9-440e-8b73-ead6d25240b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1347", "content": "#exploit\n1. CVE-2023-28229:\nWindows CNG KeyIso RPC EoP/SBX\nhttps://github.com/Y3A/CVE-2023-28229\n\n2. Polygon Smart Contract Bug\nhttps://blog.chain.link/smart-contract-bug-hunting\n\n3. CVE-2023-36723:\nPoC for arbitrary directory creation bug in Container Manager service\nhttps://github.com/Wh04m1001/CVE-2023-36723", "creation_timestamp": "2024-08-16T08:33:55.000000Z"}</description>
      <content:encoded>{"uuid": "632747b3-2ae9-440e-8b73-ead6d25240b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1347", "content": "#exploit\n1. CVE-2023-28229:\nWindows CNG KeyIso RPC EoP/SBX\nhttps://github.com/Y3A/CVE-2023-28229\n\n2. Polygon Smart Contract Bug\nhttps://blog.chain.link/smart-contract-bug-hunting\n\n3. CVE-2023-36723:\nPoC for arbitrary directory creation bug in Container Manager service\nhttps://github.com/Wh04m1001/CVE-2023-36723", "creation_timestamp": "2024-08-16T08:33:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/632747b3-2ae9-440e-8b73-ead6d25240b4/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:33:55 +0000</pubDate>
    </item>
    <item>
      <title>7ea6eae0-79ff-4ea3-afb4-c0b8d7982b81</title>
      <link>https://db.gcve.eu/sighting/7ea6eae0-79ff-4ea3-afb4-c0b8d7982b81/export</link>
      <description>{"uuid": "7ea6eae0-79ff-4ea3-afb4-c0b8d7982b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/202", "content": "\ud83d\udc7b Ghost in the PPL Part 2: From BYOVDLL to Arbitrary Code Execution in LSASS\n\nIn this second installment, the author deepens the exploration of techniques for bypassing LSASS protection, focusing on arbitrary code execution by refining the PoC, exploiting vulnerabilities like CVE-2023-28229, and bypassing Control Flow Guard (CFG) through RPC-based process handle duplication.\n\n\ud83d\udd17 Source:\nhttps://itm4n.github.io/ghost-in-the-ppl-part-2/\n\n#lsa #lsass #ppl #dll #maldev", "creation_timestamp": "2024-08-22T18:04:01.000000Z"}</description>
      <content:encoded>{"uuid": "7ea6eae0-79ff-4ea3-afb4-c0b8d7982b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/202", "content": "\ud83d\udc7b Ghost in the PPL Part 2: From BYOVDLL to Arbitrary Code Execution in LSASS\n\nIn this second installment, the author deepens the exploration of techniques for bypassing LSASS protection, focusing on arbitrary code execution by refining the PoC, exploiting vulnerabilities like CVE-2023-28229, and bypassing Control Flow Guard (CFG) through RPC-based process handle duplication.\n\n\ud83d\udd17 Source:\nhttps://itm4n.github.io/ghost-in-the-ppl-part-2/\n\n#lsa #lsass #ppl #dll #maldev", "creation_timestamp": "2024-08-22T18:04:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7ea6eae0-79ff-4ea3-afb4-c0b8d7982b81/export</guid>
      <pubDate>Thu, 22 Aug 2024 18:04:01 +0000</pubDate>
    </item>
    <item>
      <title>1270628c-1629-4185-9a57-544af2712762</title>
      <link>https://db.gcve.eu/sighting/1270628c-1629-4185-9a57-544af2712762/export</link>
      <description>{"uuid": "1270628c-1629-4185-9a57-544af2712762", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971895", "content": "", "creation_timestamp": "2024-12-24T20:35:21.761224Z"}</description>
      <content:encoded>{"uuid": "1270628c-1629-4185-9a57-544af2712762", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971895", "content": "", "creation_timestamp": "2024-12-24T20:35:21.761224Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1270628c-1629-4185-9a57-544af2712762/export</guid>
      <pubDate>Tue, 24 Dec 2024 20:35:21 +0000</pubDate>
    </item>
    <item>
      <title>865e84e9-f366-4135-bcaa-b1a9a4ec0ce2</title>
      <link>https://db.gcve.eu/sighting/865e84e9-f366-4135-bcaa-b1a9a4ec0ce2/export</link>
      <description>{"uuid": "865e84e9-f366-4135-bcaa-b1a9a4ec0ce2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:47.000000Z"}</description>
      <content:encoded>{"uuid": "865e84e9-f366-4135-bcaa-b1a9a4ec0ce2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/865e84e9-f366-4135-bcaa-b1a9a4ec0ce2/export</guid>
      <pubDate>Sun, 23 Feb 2025 02:10:47 +0000</pubDate>
    </item>
    <item>
      <title>f5dd0d3e-cba8-40e2-b535-27826dfbe0e6</title>
      <link>https://db.gcve.eu/sighting/f5dd0d3e-cba8-40e2-b535-27826dfbe0e6/export</link>
      <description>{"uuid": "f5dd0d3e-cba8-40e2-b535-27826dfbe0e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/5b549e4e-a327-4519-b117-70c5c2df9b88", "content": "", "creation_timestamp": "2026-02-02T12:26:49.353924Z"}</description>
      <content:encoded>{"uuid": "f5dd0d3e-cba8-40e2-b535-27826dfbe0e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/5b549e4e-a327-4519-b117-70c5c2df9b88", "content": "", "creation_timestamp": "2026-02-02T12:26:49.353924Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f5dd0d3e-cba8-40e2-b535-27826dfbe0e6/export</guid>
      <pubDate>Mon, 02 Feb 2026 12:26:49 +0000</pubDate>
    </item>
    <item>
      <title>2dfdc9a3-cec9-4ed7-8fa2-604e95b836c4</title>
      <link>https://db.gcve.eu/sighting/2dfdc9a3-cec9-4ed7-8fa2-604e95b836c4/export</link>
      <description>{"uuid": "2dfdc9a3-cec9-4ed7-8fa2-604e95b836c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/5b549e4e-a327-4519-b117-70c5c2df9b88", "content": "", "creation_timestamp": "2026-02-02T12:26:49.353924Z"}</description>
      <content:encoded>{"uuid": "2dfdc9a3-cec9-4ed7-8fa2-604e95b836c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28229", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/5b549e4e-a327-4519-b117-70c5c2df9b88", "content": "", "creation_timestamp": "2026-02-02T12:26:49.353924Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2dfdc9a3-cec9-4ed7-8fa2-604e95b836c4/export</guid>
      <pubDate>Mon, 02 Feb 2026 12:26:49 +0000</pubDate>
    </item>
  </channel>
</rss>
