<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T19:12:02.022929+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/00b26463-b4d7-4881-b055-22bc9736e299/export</id>
    <title>00b26463-b4d7-4881-b055-22bc9736e299</title>
    <updated>2026-05-07T19:12:02.482865+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "00b26463-b4d7-4881-b055-22bc9736e299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44875", "type": "seen", "source": "https://t.me/cibsecurity/59449", "content": "\u203c CVE-2022-44875 \u203c\n\nKioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-06T07:12:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/00b26463-b4d7-4881-b055-22bc9736e299/export"/>
    <published>2023-03-06T07:12:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3737c36d-dcad-49e3-a89d-6c83d335cb62/export</id>
    <title>3737c36d-dcad-49e3-a89d-6c83d335cb62</title>
    <updated>2026-05-07T19:12:02.482537+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3737c36d-dcad-49e3-a89d-6c83d335cb62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44875", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3126", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27 \ud83d\udd28  - Hackers Factory\n\n\u200b\u200bTor / Darknet Links\n\nVerified darknet market and darknet service links on the Tor Network.\n\nhttps://github.com/DarkNetEye/tor-links\n\nWeb:\nhttps://darkneteye.com/\n\n#cybersecurity #infosec #privacy\n\n\u200b\u200bDragondoom\n\nThe PAKE Dragonfly is used as SAE in WPA3 authentication. A critical point during the authentication is when the password needs to be derived into an elliptic curve point.\n\nhttps://gitlab.inria.fr/ddealmei/artifact_dragondoom\n\n#cybersecurity #infosec\n\n\u200b\u200bwhatlicense\n\nFull tool chain to extract WinLicense secrets from a protected program then launch it bypassing all verification steps, utlizing an Intel PIN tool and license file builder.\n\nhttps://github.com/charlesnathansmith/whatlicense\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bCVE-2022-44875\n\nTesting CVE-2022-44875\n\nhttps://github.com/c0d30d1n/CVE-2022-44875-Test\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bWiFi-OSINT\n\nSome great Wifi, resources, tools and blogs if Wi-Fi #OSINT is your thing.\n\nhttps://github.com/cqcore/WiFi-OSINT\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bCVE-2023-35885\n\nCloudpanel 0-day Exploit\n\nhttps://github.com/datackmy/FallingSkies-CVE-2023-35885\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-3519\n\nThis script is a basic Citrix Scanner for CVE-2023-3519. We try to identify vulnerable Citrix Gateways/ADCs by looking at the HTTP headers.\n\nhttps://github.com/telekom-security/cve-2023-3519-citrix-scanner\n\n#cve #infosec #pentesting\n\n\u200b\u200bvala-vala-hey\n\nThis is a 0day root LPE for latest #Manjaro distro, tested on embedded ARM and x86_64 desktop installs.\n\nhttps://github.com/c-skills/vala-vala-hey\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2020-1472\n\nA Python script that uses the Impacket library to test vulnerability for the Zerologon exploit (CVE-2020-1472).\n\nhttps://github.com/SecuraBV/CVE-2020-1472\n\n#cve #cybersecurity #infosec\n\nEX-SQLi\n\nA tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programmed by the TYG team.\n\nhttps://github.com/mr-sami-x/SQLi\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2023-38632\n\nAsync-sockets-cpp &amp;lt;0.3.1 TCP Packet tcpsocket.hpp Stack-based Overflow\n\nhttps://github.com/Halcy0nic/CVE-2023-38632\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-3519\n\nThis Nuclei template checks for the presence of the CVE-2023-3519 vulnerability in a target web server.\n\nhttps://github.com/SalehLardhi/CVE-2023-3519\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bCVE-2023-28121\n\nWooCommerce Payments: Unauthorized Admin Access #Exploit.\n\nhttps://github.com/gbrsh/CVE-2023-28121\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bVanMoof Encryption Key Exporter\n\nExport all bike details (such as encryption key) of your VanMoof bikes.\n\nhttps://github.com/grossartig/vanmoof-encryption-key-exporter\n\nWeb:\nhttps://keyexporter.grossartig.io/\n\n#cybersecurity #infosec\n\n\u200b\u200bPowershellKerberos\n\nSome scripts to abuse kerberos using Powershell.\n\nhttps://github.com/MzHmO/PowershellKerberos\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-23T12:08:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3737c36d-dcad-49e3-a89d-6c83d335cb62/export"/>
    <published>2023-07-23T12:08:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/09e71e67-cfbd-4f67-9ddd-62d4d11a24ff/export</id>
    <title>09e71e67-cfbd-4f67-9ddd-62d4d11a24ff</title>
    <updated>2026-05-07T19:12:02.482435+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "09e71e67-cfbd-4f67-9ddd-62d4d11a24ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44875", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6761", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44875\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: KioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T20:41:24.047Z\n\ud83d\udd17 References:\n1. https://www.kioware.com/versionhistory.aspx?pid=15\n2. https://github.com/olnor18/writeup/tree/master/CVE/CVE-2022-44875", "creation_timestamp": "2025-03-06T21:34:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/09e71e67-cfbd-4f67-9ddd-62d4d11a24ff/export"/>
    <published>2025-03-06T21:34:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ef0bdcd7-7d8c-46a2-9284-e65e8fd8045c/export</id>
    <title>ef0bdcd7-7d8c-46a2-9284-e65e8fd8045c</title>
    <updated>2026-05-07T19:12:02.482300+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ef0bdcd7-7d8c-46a2-9284-e65e8fd8045c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44875", "type": "seen", "source": "Telegram/vWoCpVxG9Mcw8_H7wdgsnOOkCXbaBbj0nbxIyAUqy5tST0l2", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ef0bdcd7-7d8c-46a2-9284-e65e8fd8045c/export"/>
    <published>2025-03-08T04:34:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/970a92c9-1443-40bf-9f50-4e9f4841472d/export</id>
    <title>970a92c9-1443-40bf-9f50-4e9f4841472d</title>
    <updated>2026-05-07T19:12:02.479928+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "970a92c9-1443-40bf-9f50-4e9f4841472d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44875", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8709", "content": "#Blue_Team_Techniques\n1. Testing CVE-2022-44875\nhttps://github.com/c0d30d1n/CVE-2022-44875-Test\n2. Test tool for CVE-2020-1472 (Zerologon)\nhttps://github.com/SecuraBV/CVE-2020-1472\n3. Tool for scanning/exploiting the famous SQL injection vulnerability in more than millions of sites\nhttps://github.com/mr-sami-x/SQLi", "creation_timestamp": "2025-03-29T16:32:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/970a92c9-1443-40bf-9f50-4e9f4841472d/export"/>
    <published>2025-03-29T16:32:29+00:00</published>
  </entry>
</feed>
