<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 05:58:40 +0000</lastBuildDate>
    <item>
      <title>3b0e545a-5d8c-48d8-bcf9-9f20f2dcfe9a</title>
      <link>https://vulnerability.circl.lu/sighting/3b0e545a-5d8c-48d8-bcf9-9f20f2dcfe9a/export</link>
      <description>{"uuid": "3b0e545a-5d8c-48d8-bcf9-9f20f2dcfe9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "https://t.me/spammermarketool/39118", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}</description>
      <content:encoded>{"uuid": "3b0e545a-5d8c-48d8-bcf9-9f20f2dcfe9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "https://t.me/spammermarketool/39118", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3b0e545a-5d8c-48d8-bcf9-9f20f2dcfe9a/export</guid>
      <pubDate>Mon, 20 Jun 2022 19:53:12 +0000</pubDate>
    </item>
    <item>
      <title>04aadd4e-34f7-40c2-a509-8c16fbd58d19</title>
      <link>https://vulnerability.circl.lu/sighting/04aadd4e-34f7-40c2-a509-8c16fbd58d19/export</link>
      <description>{"uuid": "04aadd4e-34f7-40c2-a509-8c16fbd58d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "https://t.me/spammerspacer/33792", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}</description>
      <content:encoded>{"uuid": "04aadd4e-34f7-40c2-a509-8c16fbd58d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "https://t.me/spammerspacer/33792", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/04aadd4e-34f7-40c2-a509-8c16fbd58d19/export</guid>
      <pubDate>Mon, 20 Jun 2022 19:53:12 +0000</pubDate>
    </item>
    <item>
      <title>bcf070ac-2514-4bae-a7b7-43913e6c778b</title>
      <link>https://vulnerability.circl.lu/sighting/bcf070ac-2514-4bae-a7b7-43913e6c778b/export</link>
      <description>{"uuid": "bcf070ac-2514-4bae-a7b7-43913e6c778b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "https://t.me/LeakingXTeam/20993", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}</description>
      <content:encoded>{"uuid": "bcf070ac-2514-4bae-a7b7-43913e6c778b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "https://t.me/LeakingXTeam/20993", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-06-20T19:53:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bcf070ac-2514-4bae-a7b7-43913e6c778b/export</guid>
      <pubDate>Mon, 20 Jun 2022 19:53:12 +0000</pubDate>
    </item>
    <item>
      <title>1cd31ae3-7469-4b6f-8612-84eabdf83b16</title>
      <link>https://vulnerability.circl.lu/sighting/1cd31ae3-7469-4b6f-8612-84eabdf83b16/export</link>
      <description>{"uuid": "1cd31ae3-7469-4b6f-8612-84eabdf83b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "Telegram/qA7RHbfeiqXzFaQFtQDWHegpUj17EgvuINx_Fz9sXMRGmneY", "content": "", "creation_timestamp": "2022-06-20T20:34:58.000000Z"}</description>
      <content:encoded>{"uuid": "1cd31ae3-7469-4b6f-8612-84eabdf83b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "Telegram/qA7RHbfeiqXzFaQFtQDWHegpUj17EgvuINx_Fz9sXMRGmneY", "content": "", "creation_timestamp": "2022-06-20T20:34:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1cd31ae3-7469-4b6f-8612-84eabdf83b16/export</guid>
      <pubDate>Mon, 20 Jun 2022 20:34:58 +0000</pubDate>
    </item>
    <item>
      <title>c9c844fc-bcaa-41c0-84a0-7981e5ca2f17</title>
      <link>https://vulnerability.circl.lu/sighting/c9c844fc-bcaa-41c0-84a0-7981e5ca2f17/export</link>
      <description>{"uuid": "c9c844fc-bcaa-41c0-84a0-7981e5ca2f17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "Telegram/dt3wzguPwvHeMGbS-iOOUe43Y1n6HJwkKjrvq5BX_wYbkhfe", "content": "", "creation_timestamp": "2022-08-25T16:41:15.000000Z"}</description>
      <content:encoded>{"uuid": "c9c844fc-bcaa-41c0-84a0-7981e5ca2f17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "Telegram/dt3wzguPwvHeMGbS-iOOUe43Y1n6HJwkKjrvq5BX_wYbkhfe", "content": "", "creation_timestamp": "2022-08-25T16:41:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c9c844fc-bcaa-41c0-84a0-7981e5ca2f17/export</guid>
      <pubDate>Thu, 25 Aug 2022 16:41:15 +0000</pubDate>
    </item>
    <item>
      <title>593b6dce-a5f2-44d3-9c3c-c289d8c654e3</title>
      <link>https://vulnerability.circl.lu/sighting/593b6dce-a5f2-44d3-9c3c-c289d8c654e3/export</link>
      <description>{"uuid": "593b6dce-a5f2-44d3-9c3c-c289d8c654e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "https://t.me/hackingtoolsprvi8/2727", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-08-25T16:41:15.000000Z"}</description>
      <content:encoded>{"uuid": "593b6dce-a5f2-44d3-9c3c-c289d8c654e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7969", "type": "published-proof-of-concept", "source": "https://t.me/hackingtoolsprvi8/2727", "content": "\ud83d\udd25 Best HQ Wordpress Exploit AiO Package \u2764\ufe0f\n\n\u2757\ufe0f NOTED : Not for Sale !!! \n\nMaybe you hard find exploit wordpress and this our channel want gift something special to everyone\nfor support our channel exploit must working with python I recommend python3 and python2 \ninstalled both in machine because tools some different coder and exploit will be needed different version 2.7 and 3\n\n\n\u26a0\ufe0f I am Not Responsible for Any Damage \u26a0\ufe0f\n\nCVE-2014-7969\nCVE-2014-9473\nCVE-2015-6522\nCVE-2016-10033\nCVE-2018-6389\nCVE-2019-20361-EXPLOIT\nCVE-2019-8942-RCE\nCVE-2020-11738\nCVE-2020-12800\nCVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE\nCVE-2021-24762\nCVE-2021-25094-tatsu-preauth-rce\nWordpress-Plugin-Spritz-RFI\nWORDPRESS-Revslider-Exploit-0DAY\nWordpress-scanner\nWordPress_4.9.8_RCE_POC\nWP-augmented-reality-RCE\nWP-Content-Injection-Exploit\nwp-file-manager-CVE-2020-25213\nwp-gravity-form-exploit\nwp-plugin-amministrazione-aperta-LFI\nWP-SMTP-0DAY\n\nDownload Here : https://t.me/hackingtoolsprvi8/2377", "creation_timestamp": "2022-08-25T16:41:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/593b6dce-a5f2-44d3-9c3c-c289d8c654e3/export</guid>
      <pubDate>Thu, 25 Aug 2022 16:41:15 +0000</pubDate>
    </item>
  </channel>
</rss>
