<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 23 May 2026 17:39:24 +0000</lastBuildDate>
    <item>
      <title>3952c4c8-1d60-45d8-bde6-c8068f9cf6e1</title>
      <link>https://db.gcve.eu/sighting/3952c4c8-1d60-45d8-bde6-c8068f9cf6e1/export</link>
      <description>{"uuid": "3952c4c8-1d60-45d8-bde6-c8068f9cf6e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32112", "type": "seen", "source": "https://t.me/cibsecurity/63556", "content": "\u203c CVE-2023-32112 \u203c\n\nVendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to\u00c2\u00a0access some of its function. This could lead to modification of data impacting the integrity of the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T07:43:08.000000Z"}</description>
      <content:encoded>{"uuid": "3952c4c8-1d60-45d8-bde6-c8068f9cf6e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32112", "type": "seen", "source": "https://t.me/cibsecurity/63556", "content": "\u203c CVE-2023-32112 \u203c\n\nVendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to\u00c2\u00a0access some of its function. This could lead to modification of data impacting the integrity of the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T07:43:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3952c4c8-1d60-45d8-bde6-c8068f9cf6e1/export</guid>
      <pubDate>Tue, 09 May 2023 07:43:08 +0000</pubDate>
    </item>
    <item>
      <title>c2c6d6cf-e9dd-4c22-bf9c-2a961672cbe4</title>
      <link>https://db.gcve.eu/sighting/c2c6d6cf-e9dd-4c22-bf9c-2a961672cbe4/export</link>
      <description>{"uuid": "c2c6d6cf-e9dd-4c22-bf9c-2a961672cbe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32111", "type": "seen", "source": "https://t.me/cibsecurity/63569", "content": "\u203c CVE-2023-32111 \u203c\n\nIn SAP PowerDesigner (Proxy) - version 16.7, an attacker can send a crafted request from a remote host to the proxy machine and crash the proxy server, due to faulty implementation of memory management causing a memory corruption. This leads to a high impact on availability of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T07:43:29.000000Z"}</description>
      <content:encoded>{"uuid": "c2c6d6cf-e9dd-4c22-bf9c-2a961672cbe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32111", "type": "seen", "source": "https://t.me/cibsecurity/63569", "content": "\u203c CVE-2023-32111 \u203c\n\nIn SAP PowerDesigner (Proxy) - version 16.7, an attacker can send a crafted request from a remote host to the proxy machine and crash the proxy server, due to faulty implementation of memory management causing a memory corruption. This leads to a high impact on availability of the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T07:43:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c2c6d6cf-e9dd-4c22-bf9c-2a961672cbe4/export</guid>
      <pubDate>Tue, 09 May 2023 07:43:29 +0000</pubDate>
    </item>
    <item>
      <title>100d28b0-465b-4512-8406-6ad99fcadab6</title>
      <link>https://db.gcve.eu/sighting/100d28b0-465b-4512-8406-6ad99fcadab6/export</link>
      <description>{"uuid": "100d28b0-465b-4512-8406-6ad99fcadab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1631", "content": "CVE-2023-32117\nGoogle Drive Plugin, WordPress \u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 via REST API Endpoints\nPOC  CURL )", "creation_timestamp": "2023-07-17T15:47:57.000000Z"}</description>
      <content:encoded>{"uuid": "100d28b0-465b-4512-8406-6ad99fcadab6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1631", "content": "CVE-2023-32117\nGoogle Drive Plugin, WordPress \u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 via REST API Endpoints\nPOC  CURL )", "creation_timestamp": "2023-07-17T15:47:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/100d28b0-465b-4512-8406-6ad99fcadab6/export</guid>
      <pubDate>Mon, 17 Jul 2023 15:47:57 +0000</pubDate>
    </item>
    <item>
      <title>042ca3d9-4624-4338-9f40-a685d462f3ef</title>
      <link>https://db.gcve.eu/sighting/042ca3d9-4624-4338-9f40-a685d462f3ef/export</link>
      <description>{"uuid": "042ca3d9-4624-4338-9f40-a685d462f3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8690", "content": "#exploit\n1. CVE-2023-32117:\nIntegrate Google Drive &amp;lt;=1.1.99 - Missing Authorization via REST API Endpoints\nhttps://github.com/RandomRobbieBF/CVE-2023-32117\n\n2. Exploit for UWP roblox\nhttps://github.com/DevXternal/Crinox-Rebooted", "creation_timestamp": "2023-07-18T11:00:49.000000Z"}</description>
      <content:encoded>{"uuid": "042ca3d9-4624-4338-9f40-a685d462f3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8690", "content": "#exploit\n1. CVE-2023-32117:\nIntegrate Google Drive &amp;lt;=1.1.99 - Missing Authorization via REST API Endpoints\nhttps://github.com/RandomRobbieBF/CVE-2023-32117\n\n2. Exploit for UWP roblox\nhttps://github.com/DevXternal/Crinox-Rebooted", "creation_timestamp": "2023-07-18T11:00:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/042ca3d9-4624-4338-9f40-a685d462f3ef/export</guid>
      <pubDate>Tue, 18 Jul 2023 11:00:49 +0000</pubDate>
    </item>
    <item>
      <title>03e53b13-5d93-452f-b635-86c03d5db91d</title>
      <link>https://db.gcve.eu/sighting/03e53b13-5d93-452f-b635-86c03d5db91d/export</link>
      <description>{"uuid": "03e53b13-5d93-452f-b635-86c03d5db91d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/883", "content": "", "creation_timestamp": "2023-07-19T05:31:37.000000Z"}</description>
      <content:encoded>{"uuid": "03e53b13-5d93-452f-b635-86c03d5db91d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/883", "content": "", "creation_timestamp": "2023-07-19T05:31:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/03e53b13-5d93-452f-b635-86c03d5db91d/export</guid>
      <pubDate>Wed, 19 Jul 2023 05:31:37 +0000</pubDate>
    </item>
    <item>
      <title>0ab4b7c1-2344-444b-9d03-5178fa1b6fb3</title>
      <link>https://db.gcve.eu/sighting/0ab4b7c1-2344-444b-9d03-5178fa1b6fb3/export</link>
      <description>{"uuid": "0ab4b7c1-2344-444b-9d03-5178fa1b6fb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32119", "type": "seen", "source": "https://t.me/cibsecurity/69053", "content": "\u203c CVE-2023-32119 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPO365 | Mail Integration for Office 365 / Outlook plugin &amp;lt;=\u00c2\u00a01.9.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-23T16:13:49.000000Z"}</description>
      <content:encoded>{"uuid": "0ab4b7c1-2344-444b-9d03-5178fa1b6fb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32119", "type": "seen", "source": "https://t.me/cibsecurity/69053", "content": "\u203c CVE-2023-32119 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPO365 | Mail Integration for Office 365 / Outlook plugin &amp;lt;=\u00c2\u00a01.9.0 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-23T16:13:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0ab4b7c1-2344-444b-9d03-5178fa1b6fb3/export</guid>
      <pubDate>Wed, 23 Aug 2023 16:13:49 +0000</pubDate>
    </item>
    <item>
      <title>55b94e83-e479-4fcc-8604-b54ac2ca0f35</title>
      <link>https://db.gcve.eu/sighting/55b94e83-e479-4fcc-8604-b54ac2ca0f35/export</link>
      <description>{"uuid": "55b94e83-e479-4fcc-8604-b54ac2ca0f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3211", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1198", "content": "", "creation_timestamp": "2023-09-30T07:19:43.000000Z"}</description>
      <content:encoded>{"uuid": "55b94e83-e479-4fcc-8604-b54ac2ca0f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3211", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1198", "content": "", "creation_timestamp": "2023-09-30T07:19:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/55b94e83-e479-4fcc-8604-b54ac2ca0f35/export</guid>
      <pubDate>Sat, 30 Sep 2023 07:19:43 +0000</pubDate>
    </item>
    <item>
      <title>6dd5566c-9d09-4511-b449-f267401a801d</title>
      <link>https://db.gcve.eu/sighting/6dd5566c-9d09-4511-b449-f267401a801d/export</link>
      <description>{"uuid": "6dd5566c-9d09-4511-b449-f267401a801d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3211", "type": "seen", "source": "https://t.me/ctinow/168910", "content": "https://ift.tt/dVNRSjG\nCVE-2023-3211", "creation_timestamp": "2024-01-16T17:27:21.000000Z"}</description>
      <content:encoded>{"uuid": "6dd5566c-9d09-4511-b449-f267401a801d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3211", "type": "seen", "source": "https://t.me/ctinow/168910", "content": "https://ift.tt/dVNRSjG\nCVE-2023-3211", "creation_timestamp": "2024-01-16T17:27:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6dd5566c-9d09-4511-b449-f267401a801d/export</guid>
      <pubDate>Tue, 16 Jan 2024 17:27:21 +0000</pubDate>
    </item>
    <item>
      <title>1a7faf4d-c44a-4a21-a9c0-44d86b962d02</title>
      <link>https://db.gcve.eu/sighting/1a7faf4d-c44a-4a21-a9c0-44d86b962d02/export</link>
      <description>{"uuid": "1a7faf4d-c44a-4a21-a9c0-44d86b962d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3211", "type": "seen", "source": "https://t.me/ctinow/171517", "content": "https://ift.tt/OdBvf5n\nCVE-2023-3211 Exploit", "creation_timestamp": "2024-01-22T23:16:39.000000Z"}</description>
      <content:encoded>{"uuid": "1a7faf4d-c44a-4a21-a9c0-44d86b962d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3211", "type": "seen", "source": "https://t.me/ctinow/171517", "content": "https://ift.tt/OdBvf5n\nCVE-2023-3211 Exploit", "creation_timestamp": "2024-01-22T23:16:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1a7faf4d-c44a-4a21-a9c0-44d86b962d02/export</guid>
      <pubDate>Mon, 22 Jan 2024 23:16:39 +0000</pubDate>
    </item>
    <item>
      <title>87b8cd34-277f-4108-8f05-ad01f3de05d1</title>
      <link>https://db.gcve.eu/sighting/87b8cd34-277f-4108-8f05-ad01f3de05d1/export</link>
      <description>{"uuid": "87b8cd34-277f-4108-8f05-ad01f3de05d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mdgnthhzca2q", "content": "", "creation_timestamp": "2026-01-27T21:03:03.368236Z"}</description>
      <content:encoded>{"uuid": "87b8cd34-277f-4108-8f05-ad01f3de05d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32117", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mdgnthhzca2q", "content": "", "creation_timestamp": "2026-01-27T21:03:03.368236Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/87b8cd34-277f-4108-8f05-ad01f3de05d1/export</guid>
      <pubDate>Tue, 27 Jan 2026 21:03:03 +0000</pubDate>
    </item>
  </channel>
</rss>
