<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 21 May 2026 23:38:57 +0000</lastBuildDate>
    <item>
      <title>9495c425-4b7d-4f48-a6e1-31b8a3414b40</title>
      <link>https://db.gcve.eu/sighting/9495c425-4b7d-4f48-a6e1-31b8a3414b40/export</link>
      <description>{"uuid": "9495c425-4b7d-4f48-a6e1-31b8a3414b40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35671", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1113", "content": "https://github.com/MrTiz/CVE-2023-35671\nAndroid\u5e94\u7528\u7a0b\u5e8fPin\u5b89\u5168\u95ee\u9898\u5141\u8bb8\u901a\u8fc7\u8c37\u6b4c\u94b1\u5305\u8fdb\u884c\u672a\u7ecf\u6388\u6743\u7684\u652f\u4ed8\n#github #poc", "creation_timestamp": "2023-10-09T18:27:39.000000Z"}</description>
      <content:encoded>{"uuid": "9495c425-4b7d-4f48-a6e1-31b8a3414b40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35671", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1113", "content": "https://github.com/MrTiz/CVE-2023-35671\nAndroid\u5e94\u7528\u7a0b\u5e8fPin\u5b89\u5168\u95ee\u9898\u5141\u8bb8\u901a\u8fc7\u8c37\u6b4c\u94b1\u5305\u8fdb\u884c\u672a\u7ecf\u6388\u6743\u7684\u652f\u4ed8\n#github #poc", "creation_timestamp": "2023-10-09T18:27:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9495c425-4b7d-4f48-a6e1-31b8a3414b40/export</guid>
      <pubDate>Mon, 09 Oct 2023 18:27:39 +0000</pubDate>
    </item>
    <item>
      <title>9beb28f2-87d7-49f9-aaee-8c029d83c290</title>
      <link>https://db.gcve.eu/sighting/9beb28f2-87d7-49f9-aaee-8c029d83c290/export</link>
      <description>{"uuid": "9beb28f2-87d7-49f9-aaee-8c029d83c290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35671", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2012", "content": "Android App Pin Security Issue Allows Unauthorized Payments via Google Wallet even with enabled \"Require device unlock for NFC\" option (CVE-2023-35671)\nWhile in pinned mode, all other apps become temporarily inaccessible, except Google Wallet.\nPoC: https://github.com/MrTiz/CVE-2023-35671", "creation_timestamp": "2023-11-03T10:24:50.000000Z"}</description>
      <content:encoded>{"uuid": "9beb28f2-87d7-49f9-aaee-8c029d83c290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35671", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2012", "content": "Android App Pin Security Issue Allows Unauthorized Payments via Google Wallet even with enabled \"Require device unlock for NFC\" option (CVE-2023-35671)\nWhile in pinned mode, all other apps become temporarily inaccessible, except Google Wallet.\nPoC: https://github.com/MrTiz/CVE-2023-35671", "creation_timestamp": "2023-11-03T10:24:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9beb28f2-87d7-49f9-aaee-8c029d83c290/export</guid>
      <pubDate>Fri, 03 Nov 2023 10:24:50 +0000</pubDate>
    </item>
    <item>
      <title>b7209d50-6265-4dc8-bfdb-9503da513b26</title>
      <link>https://db.gcve.eu/sighting/b7209d50-6265-4dc8-bfdb-9503da513b26/export</link>
      <description>{"uuid": "b7209d50-6265-4dc8-bfdb-9503da513b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35671", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3199", "content": "Hackers Factory \n\nNext Generation DorX. Built by Dorks, for Dorks.\u00a0\n\nhttps://github.com/ResearchandDestroy/DorXNGy\n\nA framework for assessing the security of L2s\n\nhttps://github.com/quantstamp/l2-security-framework\n\nMultiPlatform HTTP Reverse Shell\n\nhttps://github.com/JoelGMSec/HTTP-Shell\n\nBypassing UAC with SSPI Datagram Contexts\n\nhttps://github.com/antonioCoco/SspiUacBypass\n\nA comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape\n\nhttps://github.com/samhaxr/VTScanner\n\nAnother tool to perform minidump of LSASS process using few technics to avoid detection.\n\nhttps://github.com/YOLOP0wn/POSTDump\n\nExploitation of echo_driver.sys\n\nhttps://github.com/YOLOP0wn/EchoDrv\n\nEncrypted shellcode Injection to avoid Kernel triggered memory scans\n\nhttps://github.com/S3cur3Th1sSh1t/Caro-Kann\n\nProof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")\n\nhttps://github.com/gabe-k/themebleed\n\nAndroid App Pin Security Issue Allowing Unauthorized Payments via Google Wallet\n\nhttps://github.com/MrTiz/CVE-2023-35671\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2024-02-21T13:45:38.000000Z"}</description>
      <content:encoded>{"uuid": "b7209d50-6265-4dc8-bfdb-9503da513b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35671", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3199", "content": "Hackers Factory \n\nNext Generation DorX. Built by Dorks, for Dorks.\u00a0\n\nhttps://github.com/ResearchandDestroy/DorXNGy\n\nA framework for assessing the security of L2s\n\nhttps://github.com/quantstamp/l2-security-framework\n\nMultiPlatform HTTP Reverse Shell\n\nhttps://github.com/JoelGMSec/HTTP-Shell\n\nBypassing UAC with SSPI Datagram Contexts\n\nhttps://github.com/antonioCoco/SspiUacBypass\n\nA comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape\n\nhttps://github.com/samhaxr/VTScanner\n\nAnother tool to perform minidump of LSASS process using few technics to avoid detection.\n\nhttps://github.com/YOLOP0wn/POSTDump\n\nExploitation of echo_driver.sys\n\nhttps://github.com/YOLOP0wn/EchoDrv\n\nEncrypted shellcode Injection to avoid Kernel triggered memory scans\n\nhttps://github.com/S3cur3Th1sSh1t/Caro-Kann\n\nProof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")\n\nhttps://github.com/gabe-k/themebleed\n\nAndroid App Pin Security Issue Allowing Unauthorized Payments via Google Wallet\n\nhttps://github.com/MrTiz/CVE-2023-35671\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2024-02-21T13:45:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b7209d50-6265-4dc8-bfdb-9503da513b26/export</guid>
      <pubDate>Wed, 21 Feb 2024 13:45:38 +0000</pubDate>
    </item>
    <item>
      <title>ec6f4572-8cdc-464f-8c4c-82de2c19b146</title>
      <link>https://db.gcve.eu/sighting/ec6f4572-8cdc-464f-8c4c-82de2c19b146/export</link>
      <description>{"uuid": "ec6f4572-8cdc-464f-8c4c-82de2c19b146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35671", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/968", "content": "#exploit \n1. CVE-2023-3244:\nWordPress Missing Authorization\nhttps://github.com/drnull03/POC-CVE-2023-3244\n\n2. CVE-2023-35671:\nAndroid App Pin Security Issue\nhttps://github.com/MrTiz/CVE-2023-35671", "creation_timestamp": "2024-08-16T08:24:34.000000Z"}</description>
      <content:encoded>{"uuid": "ec6f4572-8cdc-464f-8c4c-82de2c19b146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35671", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/968", "content": "#exploit \n1. CVE-2023-3244:\nWordPress Missing Authorization\nhttps://github.com/drnull03/POC-CVE-2023-3244\n\n2. CVE-2023-35671:\nAndroid App Pin Security Issue\nhttps://github.com/MrTiz/CVE-2023-35671", "creation_timestamp": "2024-08-16T08:24:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ec6f4572-8cdc-464f-8c4c-82de2c19b146/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:24:34 +0000</pubDate>
    </item>
    <item>
      <title>7729f390-4405-4604-85ab-d2a22f2a4465</title>
      <link>https://db.gcve.eu/sighting/7729f390-4405-4604-85ab-d2a22f2a4465/export</link>
      <description>{"uuid": "7729f390-4405-4604-85ab-d2a22f2a4465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35674", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971881", "content": "", "creation_timestamp": "2024-12-24T20:35:11.620726Z"}</description>
      <content:encoded>{"uuid": "7729f390-4405-4604-85ab-d2a22f2a4465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35674", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971881", "content": "", "creation_timestamp": "2024-12-24T20:35:11.620726Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7729f390-4405-4604-85ab-d2a22f2a4465/export</guid>
      <pubDate>Tue, 24 Dec 2024 20:35:11 +0000</pubDate>
    </item>
    <item>
      <title>16c4c635-2146-4040-b0a6-66691dc4f707</title>
      <link>https://db.gcve.eu/sighting/16c4c635-2146-4040-b0a6-66691dc4f707/export</link>
      <description>{"uuid": "16c4c635-2146-4040-b0a6-66691dc4f707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35674", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:46.000000Z"}</description>
      <content:encoded>{"uuid": "16c4c635-2146-4040-b0a6-66691dc4f707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35674", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/16c4c635-2146-4040-b0a6-66691dc4f707/export</guid>
      <pubDate>Sun, 23 Feb 2025 02:10:46 +0000</pubDate>
    </item>
    <item>
      <title>03a72e18-074a-4a62-9eff-7911d78ebe9b</title>
      <link>https://db.gcve.eu/sighting/03a72e18-074a-4a62-9eff-7911d78ebe9b/export</link>
      <description>{"uuid": "03a72e18-074a-4a62-9eff-7911d78ebe9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35670", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14529", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35670\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In computeValuesFromData of FileUtils.java, there is a possible way to insert files to other apps' external private directories due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2023-09-11T20:09:52.999Z\n\ud83d\udccf Modified: 2025-05-02T16:53:52.496Z\n\ud83d\udd17 References:\n1. https://android.googlesource.com/platform/packages/providers/MediaProvider/+/db3c69afcb0a45c8aa2f333fcde36217889899fe\n2. https://source.android.com/security/bulletin/2023-09-01", "creation_timestamp": "2025-05-02T17:16:30.000000Z"}</description>
      <content:encoded>{"uuid": "03a72e18-074a-4a62-9eff-7911d78ebe9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35670", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14529", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-35670\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In computeValuesFromData of FileUtils.java, there is a possible way to insert files to other apps' external private directories due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2023-09-11T20:09:52.999Z\n\ud83d\udccf Modified: 2025-05-02T16:53:52.496Z\n\ud83d\udd17 References:\n1. https://android.googlesource.com/platform/packages/providers/MediaProvider/+/db3c69afcb0a45c8aa2f333fcde36217889899fe\n2. https://source.android.com/security/bulletin/2023-09-01", "creation_timestamp": "2025-05-02T17:16:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/03a72e18-074a-4a62-9eff-7911d78ebe9b/export</guid>
      <pubDate>Fri, 02 May 2025 17:16:30 +0000</pubDate>
    </item>
    <item>
      <title>a8682c32-2e70-49d3-843c-c6c899b6273a</title>
      <link>https://db.gcve.eu/sighting/a8682c32-2e70-49d3-843c-c6c899b6273a/export</link>
      <description>{"uuid": "a8682c32-2e70-49d3-843c-c6c899b6273a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3567", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "a8682c32-2e70-49d3-843c-c6c899b6273a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3567", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a8682c32-2e70-49d3-843c-c6c899b6273a/export</guid>
      <pubDate>Thu, 14 Aug 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>1ad5eb42-72c9-4d08-91dd-43b0a8f159c5</title>
      <link>https://db.gcve.eu/sighting/1ad5eb42-72c9-4d08-91dd-43b0a8f159c5/export</link>
      <description>{"uuid": "1ad5eb42-72c9-4d08-91dd-43b0a8f159c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35674", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9c66c1c7-ea90-437f-bd9a-10282031fb74", "content": "", "creation_timestamp": "2026-02-02T12:26:50.848572Z"}</description>
      <content:encoded>{"uuid": "1ad5eb42-72c9-4d08-91dd-43b0a8f159c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35674", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9c66c1c7-ea90-437f-bd9a-10282031fb74", "content": "", "creation_timestamp": "2026-02-02T12:26:50.848572Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1ad5eb42-72c9-4d08-91dd-43b0a8f159c5/export</guid>
      <pubDate>Mon, 02 Feb 2026 12:26:50 +0000</pubDate>
    </item>
    <item>
      <title>84efe22c-3b99-485f-baf1-afce2e43ed6a</title>
      <link>https://db.gcve.eu/sighting/84efe22c-3b99-485f-baf1-afce2e43ed6a/export</link>
      <description>{"uuid": "84efe22c-3b99-485f-baf1-afce2e43ed6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35674", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9c66c1c7-ea90-437f-bd9a-10282031fb74", "content": "", "creation_timestamp": "2026-02-02T12:26:50.848572Z"}</description>
      <content:encoded>{"uuid": "84efe22c-3b99-485f-baf1-afce2e43ed6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-35674", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9c66c1c7-ea90-437f-bd9a-10282031fb74", "content": "", "creation_timestamp": "2026-02-02T12:26:50.848572Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/84efe22c-3b99-485f-baf1-afce2e43ed6a/export</guid>
      <pubDate>Mon, 02 Feb 2026 12:26:50 +0000</pubDate>
    </item>
  </channel>
</rss>
