<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 15 May 2026 20:23:42 +0000</lastBuildDate>
    <item>
      <title>c14f3c45-eaeb-4134-ac7f-0e318eb357ff</title>
      <link>https://db.gcve.eu/sighting/c14f3c45-eaeb-4134-ac7f-0e318eb357ff/export</link>
      <description>{"uuid": "c14f3c45-eaeb-4134-ac7f-0e318eb357ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/341xXm5UtN9QICspfpxP1D9SSpGTYEVNLbqcOtHFcgKSJEI", "content": "", "creation_timestamp": "2025-05-02T11:00:06.000000Z"}</description>
      <content:encoded>{"uuid": "c14f3c45-eaeb-4134-ac7f-0e318eb357ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/341xXm5UtN9QICspfpxP1D9SSpGTYEVNLbqcOtHFcgKSJEI", "content": "", "creation_timestamp": "2025-05-02T11:00:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c14f3c45-eaeb-4134-ac7f-0e318eb357ff/export</guid>
      <pubDate>Fri, 02 May 2025 11:00:06 +0000</pubDate>
    </item>
    <item>
      <title>b0c36b89-2934-48f4-8344-23f43f0a3cd6</title>
      <link>https://db.gcve.eu/sighting/b0c36b89-2934-48f4-8344-23f43f0a3cd6/export</link>
      <description>{"uuid": "b0c36b89-2934-48f4-8344-23f43f0a3cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "https://t.me/liwaamohammad/1929", "content": "https://github.com/ajdumanhug/CVE-2022-42092\n\nCVE-2023-46818 Python3 Exploit for Backdrop CMS &amp;lt;= 1.22.0 Authenticated Remote Command Execution (RCE)\n#github #exploit", "creation_timestamp": "2025-05-02T14:06:34.000000Z"}</description>
      <content:encoded>{"uuid": "b0c36b89-2934-48f4-8344-23f43f0a3cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "https://t.me/liwaamohammad/1929", "content": "https://github.com/ajdumanhug/CVE-2022-42092\n\nCVE-2023-46818 Python3 Exploit for Backdrop CMS &amp;lt;= 1.22.0 Authenticated Remote Command Execution (RCE)\n#github #exploit", "creation_timestamp": "2025-05-02T14:06:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b0c36b89-2934-48f4-8344-23f43f0a3cd6/export</guid>
      <pubDate>Fri, 02 May 2025 14:06:34 +0000</pubDate>
    </item>
    <item>
      <title>6a5d1bfb-5ac9-40a0-ba87-92e94f27acba</title>
      <link>https://db.gcve.eu/sighting/6a5d1bfb-5ac9-40a0-ba87-92e94f27acba/export</link>
      <description>{"uuid": "6a5d1bfb-5ac9-40a0-ba87-92e94f27acba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "https://t.me/NinjaSec/290", "content": "1. https://github.com/Sachinart/CVE-2025-32432\nCheck for CVE-2025-32432 vulnerability\n#github #exploit\n\n\n2. https://github.com/helidem/CVE-2025-24054-PoC\nProof of Concept for NTLM Hash Leak via .library-ms CVE-2025-24054\n#github #poc\n\n\n3. https://github.com/ajdumanhug/CVE-2023-46818\nCVE-2023-46818 Python3 Exploit for ISPConfig &amp;lt;= 3.2.11 PHP Code Injection\n#github #exploit\n\n\n4. https://github.com/0x6rss/CVE-2025-24071_PoC\nNTLM hash leak via .library-ms inside ZIP/RAR (CVE-2025-24071)\n#github #poc\n\n\n5. https://github.com/trickest/cve/blob/main/2022/CVE-2022-42092.md\nCVE-2022-42092 \u2013 Backdrop CMS RCE PoC\n#github #exploit\n\n\n6. https://github.com/nomi-sec/PoC-in-GitHub\nAggregated CVE Exploits and PoCs from GitHub\n#github #tool\n\n\n7. https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker\nLinux Container Escape CVE-2022-0492 vulnerability checker\n#github #exploit\n\n\n8. https://github.com/xigney/CVE-2025-24054_PoC\nAlternate NTLM Hash Leak via .library-ms CVE-2025-24054\n#github #poc\n\n\n9. https://github.com/bipbopbup/CVE-2023-46818-python-exploit\nPython PoC for CVE-2023-46818 in ISPConfig\n#github #exploit\n\n\n10. https://github.com/Marcejr117/CVE-2025-24071_PoC\nNTLM Hash Leak using .library-ms via ZIP trick (CVE-2025-24071)\n#github #poc\n\n\n11. https://github.com/Ostorlab/KEV\nKnown Exploited Vulnerabilities Detector\n#github #scanner\n\n\n12. https://github.com/edoardottt/missing-cve-nuclei-templates\nMissing CVE Detection via Nuclei Templates\n#github #scanner\n\n\n13. https://github.com/hyp3rlinx/Advisories\nZero-Day Security Advisories and Exploits by Hyp3rlinx\n#github #exploit\n\n\n14. https://github.com/Kubashok/apple-cve-repos\nApple CVE Database Links Repository\n#github #cve\n\n\n15. https://github.com/esnet/Seccubus_v2\nSeccubus Test Data for Vulnerability Scanners\n#github #tool\n\n\n16. https://github.com/skordemir/Xml2Ontology\nNessus XML Vulnerability Report Samples\n#github #data\n\n\n17. https://github.com/madirish/hector\nHector: Vulnerability Management Tool with Sample Nessus Reports\n#github #tool\n\n\n18. https://github.com/projectdiscovery/nuclei-templates/issues/8804\nNuclei Template request for ISPConfig CVE-2023-46818\n#github #scanner\n\n\n19. https://github.com/projectdiscovery/nuclei-templates/issues/12020\nNuclei Template PoC Request for CraftCMS CVE-2025-32432\n#github #scanner\n\n\n20. https://github.com/tanjiti/sec_profile\nSecurity Profile Aggregator \u2013 CVE, CISA, NVD, etc.\n#github #intel\n\n\n21. https://github.com/cube0x0/CVE-2021-1675\nPrintNightmare Exploit PoC (CVE-2021-1675 / CVE-2021-34527)\n#github #exploit\n\n22. https://github.com/Maldev-Academy/LsassHijackingViaReg\n\nInjecting DLL into LSASS at boot\n#github #tools\n\n\nOpen-source tools and proof-of-concept (PoC) repositories related to recent CVEs, exploits, and security research. These resources are valuable for educational purposes and can aid students in understanding real-world vulnerabilities and exploitation techniques.", "creation_timestamp": "2025-05-05T10:30:13.000000Z"}</description>
      <content:encoded>{"uuid": "6a5d1bfb-5ac9-40a0-ba87-92e94f27acba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "https://t.me/NinjaSec/290", "content": "1. https://github.com/Sachinart/CVE-2025-32432\nCheck for CVE-2025-32432 vulnerability\n#github #exploit\n\n\n2. https://github.com/helidem/CVE-2025-24054-PoC\nProof of Concept for NTLM Hash Leak via .library-ms CVE-2025-24054\n#github #poc\n\n\n3. https://github.com/ajdumanhug/CVE-2023-46818\nCVE-2023-46818 Python3 Exploit for ISPConfig &amp;lt;= 3.2.11 PHP Code Injection\n#github #exploit\n\n\n4. https://github.com/0x6rss/CVE-2025-24071_PoC\nNTLM hash leak via .library-ms inside ZIP/RAR (CVE-2025-24071)\n#github #poc\n\n\n5. https://github.com/trickest/cve/blob/main/2022/CVE-2022-42092.md\nCVE-2022-42092 \u2013 Backdrop CMS RCE PoC\n#github #exploit\n\n\n6. https://github.com/nomi-sec/PoC-in-GitHub\nAggregated CVE Exploits and PoCs from GitHub\n#github #tool\n\n\n7. https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker\nLinux Container Escape CVE-2022-0492 vulnerability checker\n#github #exploit\n\n\n8. https://github.com/xigney/CVE-2025-24054_PoC\nAlternate NTLM Hash Leak via .library-ms CVE-2025-24054\n#github #poc\n\n\n9. https://github.com/bipbopbup/CVE-2023-46818-python-exploit\nPython PoC for CVE-2023-46818 in ISPConfig\n#github #exploit\n\n\n10. https://github.com/Marcejr117/CVE-2025-24071_PoC\nNTLM Hash Leak using .library-ms via ZIP trick (CVE-2025-24071)\n#github #poc\n\n\n11. https://github.com/Ostorlab/KEV\nKnown Exploited Vulnerabilities Detector\n#github #scanner\n\n\n12. https://github.com/edoardottt/missing-cve-nuclei-templates\nMissing CVE Detection via Nuclei Templates\n#github #scanner\n\n\n13. https://github.com/hyp3rlinx/Advisories\nZero-Day Security Advisories and Exploits by Hyp3rlinx\n#github #exploit\n\n\n14. https://github.com/Kubashok/apple-cve-repos\nApple CVE Database Links Repository\n#github #cve\n\n\n15. https://github.com/esnet/Seccubus_v2\nSeccubus Test Data for Vulnerability Scanners\n#github #tool\n\n\n16. https://github.com/skordemir/Xml2Ontology\nNessus XML Vulnerability Report Samples\n#github #data\n\n\n17. https://github.com/madirish/hector\nHector: Vulnerability Management Tool with Sample Nessus Reports\n#github #tool\n\n\n18. https://github.com/projectdiscovery/nuclei-templates/issues/8804\nNuclei Template request for ISPConfig CVE-2023-46818\n#github #scanner\n\n\n19. https://github.com/projectdiscovery/nuclei-templates/issues/12020\nNuclei Template PoC Request for CraftCMS CVE-2025-32432\n#github #scanner\n\n\n20. https://github.com/tanjiti/sec_profile\nSecurity Profile Aggregator \u2013 CVE, CISA, NVD, etc.\n#github #intel\n\n\n21. https://github.com/cube0x0/CVE-2021-1675\nPrintNightmare Exploit PoC (CVE-2021-1675 / CVE-2021-34527)\n#github #exploit\n\n22. https://github.com/Maldev-Academy/LsassHijackingViaReg\n\nInjecting DLL into LSASS at boot\n#github #tools\n\n\nOpen-source tools and proof-of-concept (PoC) repositories related to recent CVEs, exploits, and security research. These resources are valuable for educational purposes and can aid students in understanding real-world vulnerabilities and exploitation techniques.", "creation_timestamp": "2025-05-05T10:30:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6a5d1bfb-5ac9-40a0-ba87-92e94f27acba/export</guid>
      <pubDate>Mon, 05 May 2025 10:30:13 +0000</pubDate>
    </item>
    <item>
      <title>78de90a7-e603-43ed-b083-92051878f0a8</title>
      <link>https://db.gcve.eu/sighting/78de90a7-e603-43ed-b083-92051878f0a8/export</link>
      <description>{"uuid": "78de90a7-e603-43ed-b083-92051878f0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/YzbpGbL1ih43JnW9bbIM91Q9MCmFYDnJfG6ZYS4qtd5wFPE", "content": "", "creation_timestamp": "2025-06-14T21:00:04.000000Z"}</description>
      <content:encoded>{"uuid": "78de90a7-e603-43ed-b083-92051878f0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/YzbpGbL1ih43JnW9bbIM91Q9MCmFYDnJfG6ZYS4qtd5wFPE", "content": "", "creation_timestamp": "2025-06-14T21:00:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/78de90a7-e603-43ed-b083-92051878f0a8/export</guid>
      <pubDate>Sat, 14 Jun 2025 21:00:04 +0000</pubDate>
    </item>
    <item>
      <title>cf8a6cf6-ac21-47c5-aac5-ed659858f574</title>
      <link>https://db.gcve.eu/sighting/cf8a6cf6-ac21-47c5-aac5-ed659858f574/export</link>
      <description>{"uuid": "cf8a6cf6-ac21-47c5-aac5-ed659858f574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/Xd5Dp2K-pK8eim0GR99MlfqC5INsxluEke7iGLM_07w0WZI", "content": "", "creation_timestamp": "2025-06-25T09:00:03.000000Z"}</description>
      <content:encoded>{"uuid": "cf8a6cf6-ac21-47c5-aac5-ed659858f574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/Xd5Dp2K-pK8eim0GR99MlfqC5INsxluEke7iGLM_07w0WZI", "content": "", "creation_timestamp": "2025-06-25T09:00:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cf8a6cf6-ac21-47c5-aac5-ed659858f574/export</guid>
      <pubDate>Wed, 25 Jun 2025 09:00:03 +0000</pubDate>
    </item>
    <item>
      <title>6c61fe84-d83f-4fc8-9f2c-b0d04059bda4</title>
      <link>https://db.gcve.eu/sighting/6c61fe84-d83f-4fc8-9f2c-b0d04059bda4/export</link>
      <description>{"uuid": "6c61fe84-d83f-4fc8-9f2c-b0d04059bda4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ispconfig_lang_edit_php_code_injection.rb", "content": "", "creation_timestamp": "2025-07-09T05:55:58.000000Z"}</description>
      <content:encoded>{"uuid": "6c61fe84-d83f-4fc8-9f2c-b0d04059bda4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ispconfig_lang_edit_php_code_injection.rb", "content": "", "creation_timestamp": "2025-07-09T05:55:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6c61fe84-d83f-4fc8-9f2c-b0d04059bda4/export</guid>
      <pubDate>Wed, 09 Jul 2025 05:55:58 +0000</pubDate>
    </item>
    <item>
      <title>a357a8bd-9c1a-4336-b292-39b48baf4bc2</title>
      <link>https://db.gcve.eu/sighting/a357a8bd-9c1a-4336-b292-39b48baf4bc2/export</link>
      <description>{"uuid": "a357a8bd-9c1a-4336-b292-39b48baf4bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ltkpmawjzb2z", "content": "", "creation_timestamp": "2025-07-09T21:02:20.476588Z"}</description>
      <content:encoded>{"uuid": "a357a8bd-9c1a-4336-b292-39b48baf4bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ltkpmawjzb2z", "content": "", "creation_timestamp": "2025-07-09T21:02:20.476588Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a357a8bd-9c1a-4336-b292-39b48baf4bc2/export</guid>
      <pubDate>Wed, 09 Jul 2025 21:02:20 +0000</pubDate>
    </item>
    <item>
      <title>749c9beb-882f-4209-a847-85f20cc204ce</title>
      <link>https://db.gcve.eu/sighting/749c9beb-882f-4209-a847-85f20cc204ce/export</link>
      <description>{"uuid": "749c9beb-882f-4209-a847-85f20cc204ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/kPRwdse26OL24RRCXFgr-20UFoPAircdPCmhtViT2fQDNms", "content": "", "creation_timestamp": "2025-08-01T03:00:05.000000Z"}</description>
      <content:encoded>{"uuid": "749c9beb-882f-4209-a847-85f20cc204ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/kPRwdse26OL24RRCXFgr-20UFoPAircdPCmhtViT2fQDNms", "content": "", "creation_timestamp": "2025-08-01T03:00:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/749c9beb-882f-4209-a847-85f20cc204ce/export</guid>
      <pubDate>Fri, 01 Aug 2025 03:00:05 +0000</pubDate>
    </item>
    <item>
      <title>381a7dbf-5186-49dc-9573-04b82f54dad6</title>
      <link>https://db.gcve.eu/sighting/381a7dbf-5186-49dc-9573-04b82f54dad6/export</link>
      <description>{"uuid": "381a7dbf-5186-49dc-9573-04b82f54dad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/6tsNPngCJJc2PuKtjS5_37WNa-fKGq-6Vb5elS9ax5fMzMI", "content": "", "creation_timestamp": "2025-09-06T09:00:05.000000Z"}</description>
      <content:encoded>{"uuid": "381a7dbf-5186-49dc-9573-04b82f54dad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "published-proof-of-concept", "source": "Telegram/6tsNPngCJJc2PuKtjS5_37WNa-fKGq-6Vb5elS9ax5fMzMI", "content": "", "creation_timestamp": "2025-09-06T09:00:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/381a7dbf-5186-49dc-9573-04b82f54dad6/export</guid>
      <pubDate>Sat, 06 Sep 2025 09:00:05 +0000</pubDate>
    </item>
    <item>
      <title>27a38bd4-982c-497e-9f9b-b86e4b7dc66d</title>
      <link>https://db.gcve.eu/sighting/27a38bd4-982c-497e-9f9b-b86e4b7dc66d/export</link>
      <description>{"uuid": "27a38bd4-982c-497e-9f9b-b86e4b7dc66d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}</description>
      <content:encoded>{"uuid": "27a38bd4-982c-497e-9f9b-b86e4b7dc66d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-46818", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/27a38bd4-982c-497e-9f9b-b86e4b7dc66d/export</guid>
      <pubDate>Thu, 23 Oct 2025 21:13:01 +0000</pubDate>
    </item>
  </channel>
</rss>
