<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 04:15:31 +0000</lastBuildDate>
    <item>
      <title>bc3ace86-dd8a-4f4b-bdc1-ae20edbdd214</title>
      <link>https://vulnerability.circl.lu/sighting/bc3ace86-dd8a-4f4b-bdc1-ae20edbdd214/export</link>
      <description>{"uuid": "bc3ace86-dd8a-4f4b-bdc1-ae20edbdd214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/995", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:16.000000Z"}</description>
      <content:encoded>{"uuid": "bc3ace86-dd8a-4f4b-bdc1-ae20edbdd214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/995", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bc3ace86-dd8a-4f4b-bdc1-ae20edbdd214/export</guid>
      <pubDate>Sun, 29 Sep 2024 07:52:16 +0000</pubDate>
    </item>
    <item>
      <title>3de1fda8-3b23-4436-a003-576dbe19c3f6</title>
      <link>https://vulnerability.circl.lu/sighting/3de1fda8-3b23-4436-a003-576dbe19c3f6/export</link>
      <description>{"uuid": "3de1fda8-3b23-4436-a003-576dbe19c3f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8831", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:22.000000Z"}</description>
      <content:encoded>{"uuid": "3de1fda8-3b23-4436-a003-576dbe19c3f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8831", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3de1fda8-3b23-4436-a003-576dbe19c3f6/export</guid>
      <pubDate>Sun, 29 Sep 2024 07:52:22 +0000</pubDate>
    </item>
    <item>
      <title>3c3d4a05-58ef-4ef4-92b3-b3ca9078a6f3</title>
      <link>https://vulnerability.circl.lu/sighting/3c3d4a05-58ef-4ef4-92b3-b3ca9078a6f3/export</link>
      <description>{"uuid": "3c3d4a05-58ef-4ef4-92b3-b3ca9078a6f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7478", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:22.000000Z"}</description>
      <content:encoded>{"uuid": "3c3d4a05-58ef-4ef4-92b3-b3ca9078a6f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7478", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3c3d4a05-58ef-4ef4-92b3-b3ca9078a6f3/export</guid>
      <pubDate>Sun, 29 Sep 2024 07:52:22 +0000</pubDate>
    </item>
    <item>
      <title>f8d0266f-ba1a-4b0f-91be-3574a0c271b6</title>
      <link>https://vulnerability.circl.lu/sighting/f8d0266f-ba1a-4b0f-91be-3574a0c271b6/export</link>
      <description>{"uuid": "f8d0266f-ba1a-4b0f-91be-3574a0c271b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23940", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:48.000000Z"}</description>
      <content:encoded>{"uuid": "f8d0266f-ba1a-4b0f-91be-3574a0c271b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23940", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f8d0266f-ba1a-4b0f-91be-3574a0c271b6/export</guid>
      <pubDate>Sun, 29 Sep 2024 07:52:48 +0000</pubDate>
    </item>
    <item>
      <title>d017d5d0-46c9-4d63-82be-38193672771e</title>
      <link>https://vulnerability.circl.lu/sighting/d017d5d0-46c9-4d63-82be-38193672771e/export</link>
      <description>{"uuid": "d017d5d0-46c9-4d63-82be-38193672771e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/394", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:48.000000Z"}</description>
      <content:encoded>{"uuid": "d017d5d0-46c9-4d63-82be-38193672771e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/394", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:52:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d017d5d0-46c9-4d63-82be-38193672771e/export</guid>
      <pubDate>Sun, 29 Sep 2024 07:52:48 +0000</pubDate>
    </item>
    <item>
      <title>b5372456-121f-4445-9cea-a6728ad0d1f4</title>
      <link>https://vulnerability.circl.lu/sighting/b5372456-121f-4445-9cea-a6728ad0d1f4/export</link>
      <description>{"uuid": "b5372456-121f-4445-9cea-a6728ad0d1f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3769", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:53:10.000000Z"}</description>
      <content:encoded>{"uuid": "b5372456-121f-4445-9cea-a6728ad0d1f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3769", "content": "Tools - Hackers Factory \n\nA complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.\n\nhttps://github.com/securi3ytalent/xray-automation\n\nInstantly share code, notes, and snippets\n\nhttps://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1\n\nEDR &amp;amp; Antivirus Bypass to Gain Shell Access\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\nServe as a reverse proxy to protect your web services from attacks and exploits\n\nhttps://github.com/chaitin/SafeLine\n\n[Android] Display useful information about your device privacy\n\nhttps://github.com/akexorcist/ruam-mij-android\n\nMultiple bugs leading to info leak and remote code execution\n\nhttps://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n\nDownload all the wallpapers in MKBHD's \"Panels\" app\n\nhttps://github.com/nadimkobeissi/mkbsd\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-29T07:53:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b5372456-121f-4445-9cea-a6728ad0d1f4/export</guid>
      <pubDate>Sun, 29 Sep 2024 07:53:10 +0000</pubDate>
    </item>
    <item>
      <title>11309702-cbb5-4238-85aa-980bf06550de</title>
      <link>https://vulnerability.circl.lu/sighting/11309702-cbb5-4238-85aa-980bf06550de/export</link>
      <description>{"uuid": "11309702-cbb5-4238-85aa-980bf06550de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "GHSA-rj88-6mr5-rcw8", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/19c15eba-7fb7-4f1e-8fdd-f5871d05e797", "content": "", "creation_timestamp": "2024-09-30T07:31:43.981846Z"}</description>
      <content:encoded>{"uuid": "11309702-cbb5-4238-85aa-980bf06550de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "GHSA-rj88-6mr5-rcw8", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/19c15eba-7fb7-4f1e-8fdd-f5871d05e797", "content": "", "creation_timestamp": "2024-09-30T07:31:43.981846Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/11309702-cbb5-4238-85aa-980bf06550de/export</guid>
      <pubDate>Mon, 30 Sep 2024 07:31:43 +0000</pubDate>
    </item>
    <item>
      <title>7d0f5d84-d0a0-4aaf-96b5-3a61a70bc555</title>
      <link>https://vulnerability.circl.lu/sighting/7d0f5d84-d0a0-4aaf-96b5-3a61a70bc555/export</link>
      <description>{"uuid": "7d0f5d84-d0a0-4aaf-96b5-3a61a70bc555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15564", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47177\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution.\n\nThis vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code.\n\ud83d\udccf Published: 2024-09-26T21:56:36.661Z\n\ud83d\udccf Modified: 2025-05-08T16:33:14.340Z\n\ud83d\udd17 References:\n1. https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47\n2. https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n3. https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5\n4. https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6\n5. https://bugzilla.suse.com/show_bug.cgi?id=1230931\n6. https://www.cups.org\n7. https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I", "creation_timestamp": "2025-05-08T17:24:19.000000Z"}</description>
      <content:encoded>{"uuid": "7d0f5d84-d0a0-4aaf-96b5-3a61a70bc555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "GHSA-RJ88-6MR5-RCW8", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15564", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47177\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution.\n\nThis vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code.\n\ud83d\udccf Published: 2024-09-26T21:56:36.661Z\n\ud83d\udccf Modified: 2025-05-08T16:33:14.340Z\n\ud83d\udd17 References:\n1. https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47\n2. https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8\n3. https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5\n4. https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6\n5. https://bugzilla.suse.com/show_bug.cgi?id=1230931\n6. https://www.cups.org\n7. https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I", "creation_timestamp": "2025-05-08T17:24:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7d0f5d84-d0a0-4aaf-96b5-3a61a70bc555/export</guid>
      <pubDate>Thu, 08 May 2025 17:24:19 +0000</pubDate>
    </item>
  </channel>
</rss>
