<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 07:30:58 +0000</lastBuildDate>
    <item>
      <title>3bb28078-906f-4299-9bb7-cdf093ae5ca5</title>
      <link>https://db.gcve.eu/sighting/3bb28078-906f-4299-9bb7-cdf093ae5ca5/export</link>
      <description>{"uuid": "3bb28078-906f-4299-9bb7-cdf093ae5ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "Telegram/Ro8t_vwt7AQYmnMRxlCmXGb8FIuOnTPoeQgd1Ea_p3ddcg", "content": "", "creation_timestamp": "2023-09-15T03:38:09.000000Z"}</description>
      <content:encoded>{"uuid": "3bb28078-906f-4299-9bb7-cdf093ae5ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "Telegram/Ro8t_vwt7AQYmnMRxlCmXGb8FIuOnTPoeQgd1Ea_p3ddcg", "content": "", "creation_timestamp": "2023-09-15T03:38:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3bb28078-906f-4299-9bb7-cdf093ae5ca5/export</guid>
      <pubDate>Fri, 15 Sep 2023 03:38:09 +0000</pubDate>
    </item>
    <item>
      <title>8a7b3450-9776-4abb-a493-f74c1cc64869</title>
      <link>https://db.gcve.eu/sighting/8a7b3450-9776-4abb-a493-f74c1cc64869/export</link>
      <description>{"uuid": "8a7b3450-9776-4abb-a493-f74c1cc64869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4299", "content": "\ud83d\udcccRCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download\n\n\ud83e\ude85Pocket Access \u2013 Telegram Bot For Remote Access To Computer Files : Download\n\n\ud83d\udc38International Civil Defense Organization Data Leak : Download\n\n\ud83e\udd16CVE-2023-40930 POC: Skyworth 3.0 (Android) \u2013 Directory Traversal : Explore\n\n\ud83d\udd78Invicti Standard v23.9.0.42095 Crack : Download\n\n\ud83d\udcefSartrouville Company France Data Leak : Download\n\n\ud83c\udf1aAranui Cruises Data Leak : Download\n\n\ud83d\udc00Craxs Rat V6.7 : DOwnload\n\n\ud83e\udeacURL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore\n\n\ud83e\uddeeCVE-2023-41362 \u2013 MyBB ACP RCE Exploit : Explore\n  \n\ud83d\udc7eCVE-2023-3244 POC: WordPress Missing Authorization: Explore\n\n\ud83d\udccdOpenText EnCase Forensic Tool : Download\n\n\ud83d\udc32Telegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check", "creation_timestamp": "2023-09-16T11:16:40.000000Z"}</description>
      <content:encoded>{"uuid": "8a7b3450-9776-4abb-a493-f74c1cc64869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4299", "content": "\ud83d\udcccRCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download\n\n\ud83e\ude85Pocket Access \u2013 Telegram Bot For Remote Access To Computer Files : Download\n\n\ud83d\udc38International Civil Defense Organization Data Leak : Download\n\n\ud83e\udd16CVE-2023-40930 POC: Skyworth 3.0 (Android) \u2013 Directory Traversal : Explore\n\n\ud83d\udd78Invicti Standard v23.9.0.42095 Crack : Download\n\n\ud83d\udcefSartrouville Company France Data Leak : Download\n\n\ud83c\udf1aAranui Cruises Data Leak : Download\n\n\ud83d\udc00Craxs Rat V6.7 : DOwnload\n\n\ud83e\udeacURL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore\n\n\ud83e\uddeeCVE-2023-41362 \u2013 MyBB ACP RCE Exploit : Explore\n  \n\ud83d\udc7eCVE-2023-3244 POC: WordPress Missing Authorization: Explore\n\n\ud83d\udccdOpenText EnCase Forensic Tool : Download\n\n\ud83d\udc32Telegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check", "creation_timestamp": "2023-09-16T11:16:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8a7b3450-9776-4abb-a493-f74c1cc64869/export</guid>
      <pubDate>Sat, 16 Sep 2023 11:16:40 +0000</pubDate>
    </item>
    <item>
      <title>b7c3dff4-d3ab-41c2-bd39-c7a31bba80db</title>
      <link>https://db.gcve.eu/sighting/b7c3dff4-d3ab-41c2-bd39-c7a31bba80db/export</link>
      <description>{"uuid": "b7c3dff4-d3ab-41c2-bd39-c7a31bba80db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "Telegram/UG6oSddx2bwhG_QTebEnBYG2SK7WVcpFXH_OXoX525gYMA", "content": "", "creation_timestamp": "2023-09-16T11:17:24.000000Z"}</description>
      <content:encoded>{"uuid": "b7c3dff4-d3ab-41c2-bd39-c7a31bba80db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "Telegram/UG6oSddx2bwhG_QTebEnBYG2SK7WVcpFXH_OXoX525gYMA", "content": "", "creation_timestamp": "2023-09-16T11:17:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b7c3dff4-d3ab-41c2-bd39-c7a31bba80db/export</guid>
      <pubDate>Sat, 16 Sep 2023 11:17:24 +0000</pubDate>
    </item>
    <item>
      <title>47c26010-7526-4a9a-ad88-876e740f5eb1</title>
      <link>https://db.gcve.eu/sighting/47c26010-7526-4a9a-ad88-876e740f5eb1/export</link>
      <description>{"uuid": "47c26010-7526-4a9a-ad88-876e740f5eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3201", "content": "Hackers Factory \n\nA collection of resources for linux reverse engineering\n\nhttps://github.com/michalmalik/linux-re-101\n\nA tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nA tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.\n\nhttps://github.com/ShorSec/ShadowSpray\n\nEXP for CVE-2023-28434 MinIO unauthorized to RCE\n\nhttps://github.com/AbelChe/evil_minio\n\nThis is a Proof of Concept (PoC) for CVE-2023-3244, a vulnerability in comment-like-dislike. The PoC demonstrates the exploitability of this vulnerability and serves as a reference for security researchers and developers to better understand and mitigate the risk associated with this issue.\n\nhttps://github.com/drnull03/POC-CVE-2023-3244\n\nNextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix\n\nhttps://github.com/Nextdoor/cspm_evaluation_matrix\n\nMass Exploit - CVE-2023-1698 &amp;lt; Unauthenticated Remote Command Execution\n\nhttps://github.com/codeb0ss/CVE-2023-1698-PoC\n\nPassive subdomain continous monitoring tool\n\nhttps://github.com/e1abrador/sub.Monitor\n\nAn exploit for OpenTSDB &amp;lt;= 2.4.1 cmd injection (CVE-2023-36812/CVE-2023-25826) written in Fortran\n\nhttps://github.com/ErikWynter/opentsdb_key_cmd_injection\n\nA collection of awesome one-liners for bug bounty hunting.\n\nhttps://github.com/0xPugazh/One-Liners\n\nThis is a useful Python script for extracting bug bounty.\n\nhttps://github.com/St74nger/writeup-miner\n\nThis repository serves as a comprehensive collection of essential wordlists utilized by bug hunters, penetration testers, and security enthusiasts during their reconnaissance and vulnerability assessment processes.\n\nhttps://github.com/bhavesh-pardhi/Wordlist-Hub\n\nKQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules &amp;amp; Hunting Rules.\n\nhttps://github.com/Bert-JanP/Hunting-Queries-Detection-Rules\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-10-23T21:34:09.000000Z"}</description>
      <content:encoded>{"uuid": "47c26010-7526-4a9a-ad88-876e740f5eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3201", "content": "Hackers Factory \n\nA collection of resources for linux reverse engineering\n\nhttps://github.com/michalmalik/linux-re-101\n\nA tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nA tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other objects in the domain.\n\nhttps://github.com/ShorSec/ShadowSpray\n\nEXP for CVE-2023-28434 MinIO unauthorized to RCE\n\nhttps://github.com/AbelChe/evil_minio\n\nThis is a Proof of Concept (PoC) for CVE-2023-3244, a vulnerability in comment-like-dislike. The PoC demonstrates the exploitability of this vulnerability and serves as a reference for security researchers and developers to better understand and mitigate the risk associated with this issue.\n\nhttps://github.com/drnull03/POC-CVE-2023-3244\n\nNextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix\n\nhttps://github.com/Nextdoor/cspm_evaluation_matrix\n\nMass Exploit - CVE-2023-1698 &amp;lt; Unauthenticated Remote Command Execution\n\nhttps://github.com/codeb0ss/CVE-2023-1698-PoC\n\nPassive subdomain continous monitoring tool\n\nhttps://github.com/e1abrador/sub.Monitor\n\nAn exploit for OpenTSDB &amp;lt;= 2.4.1 cmd injection (CVE-2023-36812/CVE-2023-25826) written in Fortran\n\nhttps://github.com/ErikWynter/opentsdb_key_cmd_injection\n\nA collection of awesome one-liners for bug bounty hunting.\n\nhttps://github.com/0xPugazh/One-Liners\n\nThis is a useful Python script for extracting bug bounty.\n\nhttps://github.com/St74nger/writeup-miner\n\nThis repository serves as a comprehensive collection of essential wordlists utilized by bug hunters, penetration testers, and security enthusiasts during their reconnaissance and vulnerability assessment processes.\n\nhttps://github.com/bhavesh-pardhi/Wordlist-Hub\n\nKQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules &amp;amp; Hunting Rules.\n\nhttps://github.com/Bert-JanP/Hunting-Queries-Detection-Rules\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-10-23T21:34:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/47c26010-7526-4a9a-ad88-876e740f5eb1/export</guid>
      <pubDate>Mon, 23 Oct 2023 21:34:09 +0000</pubDate>
    </item>
    <item>
      <title>53db7aa7-2b45-45ee-b7a3-3b9c333de139</title>
      <link>https://db.gcve.eu/sighting/53db7aa7-2b45-45ee-b7a3-3b9c333de139/export</link>
      <description>{"uuid": "53db7aa7-2b45-45ee-b7a3-3b9c333de139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32443", "type": "seen", "source": "https://t.me/arpsyndicate/74", "content": "#ExploitObserverAlert\n\nCVE-2023-32443\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-32443. An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. Processing a file may lead to a denial-of-service or potentially disclose memory contents.\n\nFIRST-EPSS: 0.000650000\nNVD-IS: 5.2\nNVD-ES: 2.8", "creation_timestamp": "2023-11-11T04:02:51.000000Z"}</description>
      <content:encoded>{"uuid": "53db7aa7-2b45-45ee-b7a3-3b9c333de139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32443", "type": "seen", "source": "https://t.me/arpsyndicate/74", "content": "#ExploitObserverAlert\n\nCVE-2023-32443\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-32443. An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. Processing a file may lead to a denial-of-service or potentially disclose memory contents.\n\nFIRST-EPSS: 0.000650000\nNVD-IS: 5.2\nNVD-ES: 2.8", "creation_timestamp": "2023-11-11T04:02:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/53db7aa7-2b45-45ee-b7a3-3b9c333de139/export</guid>
      <pubDate>Sat, 11 Nov 2023 04:02:51 +0000</pubDate>
    </item>
    <item>
      <title>f1c81e10-8401-4783-aaa3-f6d381fd3c3e</title>
      <link>https://db.gcve.eu/sighting/f1c81e10-8401-4783-aaa3-f6d381fd3c3e/export</link>
      <description>{"uuid": "f1c81e10-8401-4783-aaa3-f6d381fd3c3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4830", "content": "\ud83d\udcccRCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download\n\n\ud83e\ude85Pocket Access \u2013 Telegram Bot For Remote Access To Computer Files : Download\n\n\ud83d\udc38International Civil Defense Organization Data Leak : Download\n\n\ud83e\udd16CVE-2023-40930 POC: Skyworth 3.0 (Android) \u2013 Directory Traversal : Explore\n\n\ud83d\udd78Invicti Standard v23.9.0.42095 Crack : Download\n\n\ud83d\udcefSartrouville Company France Data Leak : Download\n\n\ud83c\udf1aAranui Cruises Data Leak : Download\n\n\ud83d\udc00Craxs Rat V6.7 : DOwnload\n\n\ud83e\udeacURL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore\n\n\ud83e\uddeeCVE-2023-41362 \u2013 MyBB ACP RCE Exploit : Explore\n  \n\ud83d\udc7eCVE-2023-3244 POC: WordPress Missing Authorization: Explore\n\n\ud83d\udccdOpenText EnCase Forensic Tool : Download\n\n\ud83d\udc32Telegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check", "creation_timestamp": "2023-12-20T08:05:32.000000Z"}</description>
      <content:encoded>{"uuid": "f1c81e10-8401-4783-aaa3-f6d381fd3c3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4830", "content": "\ud83d\udcccRCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download\n\n\ud83e\ude85Pocket Access \u2013 Telegram Bot For Remote Access To Computer Files : Download\n\n\ud83d\udc38International Civil Defense Organization Data Leak : Download\n\n\ud83e\udd16CVE-2023-40930 POC: Skyworth 3.0 (Android) \u2013 Directory Traversal : Explore\n\n\ud83d\udd78Invicti Standard v23.9.0.42095 Crack : Download\n\n\ud83d\udcefSartrouville Company France Data Leak : Download\n\n\ud83c\udf1aAranui Cruises Data Leak : Download\n\n\ud83d\udc00Craxs Rat V6.7 : DOwnload\n\n\ud83e\udeacURL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore\n\n\ud83e\uddeeCVE-2023-41362 \u2013 MyBB ACP RCE Exploit : Explore\n  \n\ud83d\udc7eCVE-2023-3244 POC: WordPress Missing Authorization: Explore\n\n\ud83d\udccdOpenText EnCase Forensic Tool : Download\n\n\ud83d\udc32Telegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check", "creation_timestamp": "2023-12-20T08:05:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f1c81e10-8401-4783-aaa3-f6d381fd3c3e/export</guid>
      <pubDate>Wed, 20 Dec 2023 08:05:32 +0000</pubDate>
    </item>
    <item>
      <title>50b92608-eaab-4a83-8ae7-21995b50d108</title>
      <link>https://db.gcve.eu/sighting/50b92608-eaab-4a83-8ae7-21995b50d108/export</link>
      <description>{"uuid": "50b92608-eaab-4a83-8ae7-21995b50d108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "Telegram/kU8an4Go1huFShTvCbdEWGzr-EU9qubcfsgo6U8YbLfS-g", "content": "", "creation_timestamp": "2023-12-20T08:06:02.000000Z"}</description>
      <content:encoded>{"uuid": "50b92608-eaab-4a83-8ae7-21995b50d108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "Telegram/kU8an4Go1huFShTvCbdEWGzr-EU9qubcfsgo6U8YbLfS-g", "content": "", "creation_timestamp": "2023-12-20T08:06:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/50b92608-eaab-4a83-8ae7-21995b50d108/export</guid>
      <pubDate>Wed, 20 Dec 2023 08:06:02 +0000</pubDate>
    </item>
    <item>
      <title>1cd11743-61a0-4678-bf05-1eb6b986e2b5</title>
      <link>https://db.gcve.eu/sighting/1cd11743-61a0-4678-bf05-1eb6b986e2b5/export</link>
      <description>{"uuid": "1cd11743-61a0-4678-bf05-1eb6b986e2b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32448", "type": "seen", "source": "https://t.me/arpsyndicate/2431", "content": "#ExploitObserverAlert\n\nCVE-2023-32448\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32448. PowerPath for Windows, versions 7.0, 7.1 &amp;amp; 7.2 contains License Key Stored in Cleartext vulnerability. A local user with access to the installation directory can retrieve the license key of the product and use it to install and license PowerPath on different systems.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2024-01-04T04:35:44.000000Z"}</description>
      <content:encoded>{"uuid": "1cd11743-61a0-4678-bf05-1eb6b986e2b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32448", "type": "seen", "source": "https://t.me/arpsyndicate/2431", "content": "#ExploitObserverAlert\n\nCVE-2023-32448\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32448. PowerPath for Windows, versions 7.0, 7.1 &amp;amp; 7.2 contains License Key Stored in Cleartext vulnerability. A local user with access to the installation directory can retrieve the license key of the product and use it to install and license PowerPath on different systems.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2024-01-04T04:35:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1cd11743-61a0-4678-bf05-1eb6b986e2b5/export</guid>
      <pubDate>Thu, 04 Jan 2024 04:35:44 +0000</pubDate>
    </item>
    <item>
      <title>db517650-8f0d-4383-b61f-9a395923ffab</title>
      <link>https://db.gcve.eu/sighting/db517650-8f0d-4383-b61f-9a395923ffab/export</link>
      <description>{"uuid": "db517650-8f0d-4383-b61f-9a395923ffab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/968", "content": "#exploit \n1. CVE-2023-3244:\nWordPress Missing Authorization\nhttps://github.com/drnull03/POC-CVE-2023-3244\n\n2. CVE-2023-35671:\nAndroid App Pin Security Issue\nhttps://github.com/MrTiz/CVE-2023-35671", "creation_timestamp": "2024-08-16T08:24:34.000000Z"}</description>
      <content:encoded>{"uuid": "db517650-8f0d-4383-b61f-9a395923ffab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3244", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/968", "content": "#exploit \n1. CVE-2023-3244:\nWordPress Missing Authorization\nhttps://github.com/drnull03/POC-CVE-2023-3244\n\n2. CVE-2023-35671:\nAndroid App Pin Security Issue\nhttps://github.com/MrTiz/CVE-2023-35671", "creation_timestamp": "2024-08-16T08:24:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/db517650-8f0d-4383-b61f-9a395923ffab/export</guid>
      <pubDate>Fri, 16 Aug 2024 08:24:34 +0000</pubDate>
    </item>
    <item>
      <title>3e65bd29-7ff5-4f6d-a471-6d342645ee0e</title>
      <link>https://db.gcve.eu/sighting/3e65bd29-7ff5-4f6d-a471-6d342645ee0e/export</link>
      <description>{"uuid": "3e65bd29-7ff5-4f6d-a471-6d342645ee0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32448", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1178", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32448\n\ud83d\udd39 Description: \nPowerPath for Windows, versions 7.0, 7.1 &amp;amp; 7.2 contains License Key Stored in Cleartext vulnerability. A local user with access to the installation directory can retrieve the license key of the product and use it to install and license PowerPath on different systems.\n\n\n\ud83d\udccf Published: 2023-05-30T15:29:19.013Z\n\ud83d\udccf Modified: 2025-01-10T16:37:06.150Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000214248/dsa-2023-154-powerpath-windows-security-update-for-security-update-for-multiple-vulnerabilities", "creation_timestamp": "2025-01-10T17:04:13.000000Z"}</description>
      <content:encoded>{"uuid": "3e65bd29-7ff5-4f6d-a471-6d342645ee0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32448", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1178", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32448\n\ud83d\udd39 Description: \nPowerPath for Windows, versions 7.0, 7.1 &amp;amp; 7.2 contains License Key Stored in Cleartext vulnerability. A local user with access to the installation directory can retrieve the license key of the product and use it to install and license PowerPath on different systems.\n\n\n\ud83d\udccf Published: 2023-05-30T15:29:19.013Z\n\ud83d\udccf Modified: 2025-01-10T16:37:06.150Z\n\ud83d\udd17 References:\n1. https://www.dell.com/support/kbdoc/en-us/000214248/dsa-2023-154-powerpath-windows-security-update-for-security-update-for-multiple-vulnerabilities", "creation_timestamp": "2025-01-10T17:04:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3e65bd29-7ff5-4f6d-a471-6d342645ee0e/export</guid>
      <pubDate>Fri, 10 Jan 2025 17:04:13 +0000</pubDate>
    </item>
  </channel>
</rss>
