<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 18:11:20 +0000</lastBuildDate>
    <item>
      <title>e2c87aaf-6f4d-4761-b687-b019adecaf1f</title>
      <link>https://db.gcve.eu/sighting/e2c87aaf-6f4d-4761-b687-b019adecaf1f/export</link>
      <description>{"uuid": "e2c87aaf-6f4d-4761-b687-b019adecaf1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "Telegram/Gyrvv86AbWrB1GT84Y-sUOl1kYGUEvQAgiox85A6xDMevbQ", "content": "", "creation_timestamp": "2023-03-24T15:39:00.000000Z"}</description>
      <content:encoded>{"uuid": "e2c87aaf-6f4d-4761-b687-b019adecaf1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "Telegram/Gyrvv86AbWrB1GT84Y-sUOl1kYGUEvQAgiox85A6xDMevbQ", "content": "", "creation_timestamp": "2023-03-24T15:39:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e2c87aaf-6f4d-4761-b687-b019adecaf1f/export</guid>
      <pubDate>Fri, 24 Mar 2023 15:39:00 +0000</pubDate>
    </item>
    <item>
      <title>aea7da65-aaab-4d3a-9001-a0cfc60572a7</title>
      <link>https://db.gcve.eu/sighting/aea7da65-aaab-4d3a-9001-a0cfc60572a7/export</link>
      <description>{"uuid": "aea7da65-aaab-4d3a-9001-a0cfc60572a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/arvin_club/6603", "content": "TP-Link AX1800\nMemory Corruption Vulnerability (Exploit)\nhttps://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-03-24T15:59:08.000000Z"}</description>
      <content:encoded>{"uuid": "aea7da65-aaab-4d3a-9001-a0cfc60572a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/arvin_club/6603", "content": "TP-Link AX1800\nMemory Corruption Vulnerability (Exploit)\nhttps://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-03-24T15:59:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/aea7da65-aaab-4d3a-9001-a0cfc60572a7/export</guid>
      <pubDate>Fri, 24 Mar 2023 15:59:08 +0000</pubDate>
    </item>
    <item>
      <title>eb06a7fb-c27b-4aec-84d8-b1d3451dddfe</title>
      <link>https://db.gcve.eu/sighting/eb06a7fb-c27b-4aec-84d8-b1d3451dddfe/export</link>
      <description>{"uuid": "eb06a7fb-c27b-4aec-84d8-b1d3451dddfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/223497", "content": "{\n  \"Source\": \"arvin_club\",\n  \"Content\": \"TP-Link AX1800 Memory Corruption Vulnerability (Exploit) https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760 GitHubexploits/CVE-2023-28760 at main \u00b7 TecR0c/exploits Contribute to TecR0c/exploits development by creating an account on GitHub.\", \n  \"author\": \"ARVIN\",\n  \"Detection Date\": \"24 Mar 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-03-24T16:44:56.000000Z"}</description>
      <content:encoded>{"uuid": "eb06a7fb-c27b-4aec-84d8-b1d3451dddfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/223497", "content": "{\n  \"Source\": \"arvin_club\",\n  \"Content\": \"TP-Link AX1800 Memory Corruption Vulnerability (Exploit) https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760 GitHubexploits/CVE-2023-28760 at main \u00b7 TecR0c/exploits Contribute to TecR0c/exploits development by creating an account on GitHub.\", \n  \"author\": \"ARVIN\",\n  \"Detection Date\": \"24 Mar 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-03-24T16:44:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/eb06a7fb-c27b-4aec-84d8-b1d3451dddfe/export</guid>
      <pubDate>Fri, 24 Mar 2023 16:44:56 +0000</pubDate>
    </item>
    <item>
      <title>9d61ad9d-6da6-4b68-8e4b-acac9053528d</title>
      <link>https://db.gcve.eu/sighting/9d61ad9d-6da6-4b68-8e4b-acac9053528d/export</link>
      <description>{"uuid": "9d61ad9d-6da6-4b68-8e4b-acac9053528d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8006", "content": "#exploit\n1. An experimental webkit-based kernel exploit (Arb. R/W) for the PS5 on &amp;lt;= 4.51FW\nhttps://github.com/Cryptogenic/PS5-IPV6-Kernel-Exploit\n\n2. CVE-2023-28760:\nTP-Link AX1800 WiFi 6 Router - Memory Corruption Vulnerability\nhttps://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-03-27T11:00:54.000000Z"}</description>
      <content:encoded>{"uuid": "9d61ad9d-6da6-4b68-8e4b-acac9053528d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8006", "content": "#exploit\n1. An experimental webkit-based kernel exploit (Arb. R/W) for the PS5 on &amp;lt;= 4.51FW\nhttps://github.com/Cryptogenic/PS5-IPV6-Kernel-Exploit\n\n2. CVE-2023-28760:\nTP-Link AX1800 WiFi 6 Router - Memory Corruption Vulnerability\nhttps://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-03-27T11:00:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9d61ad9d-6da6-4b68-8e4b-acac9053528d/export</guid>
      <pubDate>Mon, 27 Mar 2023 11:00:54 +0000</pubDate>
    </item>
    <item>
      <title>3f12136c-d970-4231-b412-2ee10895ede4</title>
      <link>https://db.gcve.eu/sighting/3f12136c-d970-4231-b412-2ee10895ede4/export</link>
      <description>{"uuid": "3f12136c-d970-4231-b412-2ee10895ede4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "Telegram/LpF8VYXdxmMajpYLddvY-mVT50oeC0Do-nKjf25w_iuaQwE", "content": "", "creation_timestamp": "2023-03-27T19:35:02.000000Z"}</description>
      <content:encoded>{"uuid": "3f12136c-d970-4231-b412-2ee10895ede4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "Telegram/LpF8VYXdxmMajpYLddvY-mVT50oeC0Do-nKjf25w_iuaQwE", "content": "", "creation_timestamp": "2023-03-27T19:35:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3f12136c-d970-4231-b412-2ee10895ede4/export</guid>
      <pubDate>Mon, 27 Mar 2023 19:35:02 +0000</pubDate>
    </item>
    <item>
      <title>80af9a71-5732-48f8-a8fd-36fbb36154eb</title>
      <link>https://db.gcve.eu/sighting/80af9a71-5732-48f8-a8fd-36fbb36154eb/export</link>
      <description>{"uuid": "80af9a71-5732-48f8-a8fd-36fbb36154eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/ctftm/493", "content": "TP-Link AX1800\nMemory Corruption Vulnerability (Exploit)\n\nhttps://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-04-06T20:20:22.000000Z"}</description>
      <content:encoded>{"uuid": "80af9a71-5732-48f8-a8fd-36fbb36154eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/ctftm/493", "content": "TP-Link AX1800\nMemory Corruption Vulnerability (Exploit)\n\nhttps://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-04-06T20:20:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/80af9a71-5732-48f8-a8fd-36fbb36154eb/export</guid>
      <pubDate>Thu, 06 Apr 2023 20:20:22 +0000</pubDate>
    </item>
    <item>
      <title>afee68f7-2101-4ce2-8e57-5735cceffc29</title>
      <link>https://db.gcve.eu/sighting/afee68f7-2101-4ce2-8e57-5735cceffc29/export</link>
      <description>{"uuid": "afee68f7-2101-4ce2-8e57-5735cceffc29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/arvinclub1/207", "content": "https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-05-20T23:38:20.000000Z"}</description>
      <content:encoded>{"uuid": "afee68f7-2101-4ce2-8e57-5735cceffc29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/arvinclub1/207", "content": "https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-05-20T23:38:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/afee68f7-2101-4ce2-8e57-5735cceffc29/export</guid>
      <pubDate>Sat, 20 May 2023 23:38:20 +0000</pubDate>
    </item>
    <item>
      <title>de7dff61-6a52-4b6b-80d5-de5864706b2e</title>
      <link>https://db.gcve.eu/sighting/de7dff61-6a52-4b6b-80d5-de5864706b2e/export</link>
      <description>{"uuid": "de7dff61-6a52-4b6b-80d5-de5864706b2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/498", "content": "https://github.com/TecR0c/exploits/blob/main/CVE-2023-28760/CVE-2023-28760.py", "creation_timestamp": "2023-06-13T11:57:10.000000Z"}</description>
      <content:encoded>{"uuid": "de7dff61-6a52-4b6b-80d5-de5864706b2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/498", "content": "https://github.com/TecR0c/exploits/blob/main/CVE-2023-28760/CVE-2023-28760.py", "creation_timestamp": "2023-06-13T11:57:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/de7dff61-6a52-4b6b-80d5-de5864706b2e/export</guid>
      <pubDate>Tue, 13 Jun 2023 11:57:10 +0000</pubDate>
    </item>
    <item>
      <title>d2c391ea-75ac-4f83-8516-fb3a256e831c</title>
      <link>https://db.gcve.eu/sighting/d2c391ea-75ac-4f83-8516-fb3a256e831c/export</link>
      <description>{"uuid": "d2c391ea-75ac-4f83-8516-fb3a256e831c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/723", "content": "https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760\nTP-Link AX1800WiFi6\n#github", "creation_timestamp": "2023-07-16T05:17:39.000000Z"}</description>
      <content:encoded>{"uuid": "d2c391ea-75ac-4f83-8516-fb3a256e831c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/723", "content": "https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760\nTP-Link AX1800WiFi6\n#github", "creation_timestamp": "2023-07-16T05:17:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d2c391ea-75ac-4f83-8516-fb3a256e831c/export</guid>
      <pubDate>Sun, 16 Jul 2023 05:17:39 +0000</pubDate>
    </item>
    <item>
      <title>9f183fc8-e388-498e-92be-353ce482c1de</title>
      <link>https://db.gcve.eu/sighting/9f183fc8-e388-498e-92be-353ce482c1de/export</link>
      <description>{"uuid": "9f183fc8-e388-498e-92be-353ce482c1de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/761", "content": "PWNING THE TP-LINK AX1800 WIFI 6 ROUTER: UNCOVERED AND EXPLOITED A MEMORY CORRUPTION VULNERABILITY\nBlog : https://www.tecsecurity.io/blog/tp-link_ax1800\nPOC : https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-07-26T14:30:49.000000Z"}</description>
      <content:encoded>{"uuid": "9f183fc8-e388-498e-92be-353ce482c1de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28760", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/761", "content": "PWNING THE TP-LINK AX1800 WIFI 6 ROUTER: UNCOVERED AND EXPLOITED A MEMORY CORRUPTION VULNERABILITY\nBlog : https://www.tecsecurity.io/blog/tp-link_ax1800\nPOC : https://github.com/TecR0c/exploits/tree/main/CVE-2023-28760", "creation_timestamp": "2023-07-26T14:30:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9f183fc8-e388-498e-92be-353ce482c1de/export</guid>
      <pubDate>Wed, 26 Jul 2023 14:30:49 +0000</pubDate>
    </item>
  </channel>
</rss>
