<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T04:15:31.991578+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bc3ace86-dd8a-4f4b-bdc1-ae20edbdd214/export</id>
    <title>bc3ace86-dd8a-4f4b-bdc1-ae20edbdd214</title>
    <updated>2026-05-09T04:15:32.408325+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bc3ace86-dd8a-4f4b-bdc1-ae20edbdd214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/995", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bc3ace86-dd8a-4f4b-bdc1-ae20edbdd214/export"/>
    <published>2024-09-29T07:52:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3de1fda8-3b23-4436-a003-576dbe19c3f6/export</id>
    <title>3de1fda8-3b23-4436-a003-576dbe19c3f6</title>
    <updated>2026-05-09T04:15:32.408222+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3de1fda8-3b23-4436-a003-576dbe19c3f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8831", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3de1fda8-3b23-4436-a003-576dbe19c3f6/export"/>
    <published>2024-09-29T07:52:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c3d4a05-58ef-4ef4-92b3-b3ca9078a6f3/export</id>
    <title>3c3d4a05-58ef-4ef4-92b3-b3ca9078a6f3</title>
    <updated>2026-05-09T04:15:32.408114+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c3d4a05-58ef-4ef4-92b3-b3ca9078a6f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7478", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c3d4a05-58ef-4ef4-92b3-b3ca9078a6f3/export"/>
    <published>2024-09-29T07:52:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f8d0266f-ba1a-4b0f-91be-3574a0c271b6/export</id>
    <title>f8d0266f-ba1a-4b0f-91be-3574a0c271b6</title>
    <updated>2026-05-09T04:15:32.408014+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f8d0266f-ba1a-4b0f-91be-3574a0c271b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23940", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f8d0266f-ba1a-4b0f-91be-3574a0c271b6/export"/>
    <published>2024-09-29T07:52:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d017d5d0-46c9-4d63-82be-38193672771e/export</id>
    <title>d017d5d0-46c9-4d63-82be-38193672771e</title>
    <updated>2026-05-09T04:15:32.407900+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d017d5d0-46c9-4d63-82be-38193672771e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/394", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d017d5d0-46c9-4d63-82be-38193672771e/export"/>
    <published>2024-09-29T07:52:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b5372456-121f-4445-9cea-a6728ad0d1f4/export</id>
    <title>b5372456-121f-4445-9cea-a6728ad0d1f4</title>
    <updated>2026-05-09T04:15:32.407738+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b5372456-121f-4445-9cea-a6728ad0d1f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3769", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:53:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b5372456-121f-4445-9cea-a6728ad0d1f4/export"/>
    <published>2024-09-29T07:53:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/11309702-cbb5-4238-85aa-980bf06550de/export</id>
    <title>11309702-cbb5-4238-85aa-980bf06550de</title>
    <updated>2026-05-09T04:15:32.405936+00:00</updated>
    <author>
      <name>Alexandre Dulaunoy</name>
      <uri>http://cve.circl.lu/user/adulau</uri>
    </author>
    <content>{"uuid": "11309702-cbb5-4238-85aa-980bf06550de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "GHSA-rj88-6mr5-rcw8", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/19c15eba-7fb7-4f1e-8fdd-f5871d05e797", "content": "", "creation_timestamp": "2024-09-30T07:31:43.981846Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/11309702-cbb5-4238-85aa-980bf06550de/export"/>
    <published>2024-09-30T07:31:43.981846+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7d0f5d84-d0a0-4aaf-96b5-3a61a70bc555/export</id>
    <title>7d0f5d84-d0a0-4aaf-96b5-3a61a70bc555</title>
    <updated>2026-05-09T04:15:32.402929+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7d0f5d84-d0a0-4aaf-96b5-3a61a70bc555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15564", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47177\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution.\n\nThis vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code.\n\ud83d\udccf Published: 2024-09-26T21:56:36.661Z\n\ud83d\udccf Modified: 2025-05-08T16:33:14.340Z\n\ud83d\udd17 References:\n1. https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47\n2. https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n3. https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5\n4. https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6\n5. https://bugzilla.suse.com/show_bug.cgi?id=1230931\n6. https://www.cups.org\n7. https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I", "creation_timestamp": "2025-05-08T17:24:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7d0f5d84-d0a0-4aaf-96b5-3a61a70bc555/export"/>
    <published>2025-05-08T17:24:19+00:00</published>
  </entry>
</feed>
