<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T20:46:10.215229+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ba749163-baad-4efc-817e-eaf59c155e38/export</id>
    <title>ba749163-baad-4efc-817e-eaf59c155e38</title>
    <updated>2026-05-05T20:46:10.477098+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ba749163-baad-4efc-817e-eaf59c155e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4435", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDocker environment and exploit the CVE-2023-30212 vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks\nURL\uff1ahttps://github.com/libasmon/create-a-vulnerable-Docker-environment-that-is-susceptible-to-CVE-2023-30212\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T06:46:15.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ba749163-baad-4efc-817e-eaf59c155e38/export"/>
    <published>2023-05-27T06:46:15+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1f4fd0b0-8672-46e2-9441-0b4dd5ae40a3/export</id>
    <title>1f4fd0b0-8672-46e2-9441-0b4dd5ae40a3</title>
    <updated>2026-05-05T20:46:10.477035+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1f4fd0b0-8672-46e2-9441-0b4dd5ae40a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4436", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDocker environment and exploit the CVE-2023-30212 vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks\nURL\uff1ahttps://github.com/libasmon/-CVE-2023-30212-Vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T07:00:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1f4fd0b0-8672-46e2-9441-0b4dd5ae40a3/export"/>
    <published>2023-05-27T07:00:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ba8f530f-eb6c-4bc1-abc1-0cb2e7f6a082/export</id>
    <title>ba8f530f-eb6c-4bc1-abc1-0cb2e7f6a082</title>
    <updated>2026-05-05T20:46:10.476971+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ba8f530f-eb6c-4bc1-abc1-0cb2e7f6a082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4437", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aVulnerable Docker Environment CVE-2023-30212\nURL\uff1ahttps://github.com/libas7994/Exploit-the-CVE-2023-30212-vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T09:38:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ba8f530f-eb6c-4bc1-abc1-0cb2e7f6a082/export"/>
    <published>2023-05-27T09:38:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3615c7c9-aa7f-4344-807d-27679868f67c/export</id>
    <title>3615c7c9-aa7f-4344-807d-27679868f67c</title>
    <updated>2026-05-05T20:46:10.476904+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3615c7c9-aa7f-4344-807d-27679868f67c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4438", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExploit-the-CVE-2023-30212-vulnerability\nURL\uff1ahttps://github.com/libasv/Exploite-CVE-2023-30212-vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T09:57:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3615c7c9-aa7f-4344-807d-27679868f67c/export"/>
    <published>2023-05-27T09:57:38+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8dd3dc76-17f8-4ffb-b968-7b687eb25246/export</id>
    <title>8dd3dc76-17f8-4ffb-b968-7b687eb25246</title>
    <updated>2026-05-05T20:46:10.476835+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8dd3dc76-17f8-4ffb-b968-7b687eb25246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4440", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExploit-the-CVE-2023-30212-vulnerability\nURL\uff1ahttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T11:21:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8dd3dc76-17f8-4ffb-b968-7b687eb25246/export"/>
    <published>2023-05-27T11:21:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/252e7014-2e5b-4321-b9a0-5a6f83da6eac/export</id>
    <title>252e7014-2e5b-4321-b9a0-5a6f83da6eac</title>
    <updated>2026-05-05T20:46:10.476762+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "252e7014-2e5b-4321-b9a0-5a6f83da6eac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8378", "content": "#exploit\n1. CVE-2022-36449:\nMali GPU Kernel Driver - improper GPU memory processing operations\nhttps://github.blog/2023-05-25-rooting-with-root-cause-finding-a-variant-of-a-project-zero-bug\n\n2. CVE-2023-30212:\nDocker Exploit (XSS)\nhttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnerability\nhttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnera", "creation_timestamp": "2023-06-12T00:58:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/252e7014-2e5b-4321-b9a0-5a6f83da6eac/export"/>
    <published>2023-06-12T00:58:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6eb3bbf4-f6cc-4ce5-8122-f28f2c063ac0/export</id>
    <title>6eb3bbf4-f6cc-4ce5-8122-f28f2c063ac0</title>
    <updated>2026-05-05T20:46:10.476693+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6eb3bbf4-f6cc-4ce5-8122-f28f2c063ac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4598", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aThis contains the necessary files and Docker to replicate A vulnerability in OURPHP that has a XSS Vulnerability (CVE-2023-30212)\nURL\uff1ahttps://github.com/VisDev23/Vulnerable-Docker--CVE-2023-30212-\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-20T09:18:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6eb3bbf4-f6cc-4ce5-8122-f28f2c063ac0/export"/>
    <published>2023-06-20T09:18:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/523602ae-e669-4dff-9346-fa490f1528b1/export</id>
    <title>523602ae-e669-4dff-9346-fa490f1528b1</title>
    <updated>2026-05-05T20:46:10.476616+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "523602ae-e669-4dff-9346-fa490f1528b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4432", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aTOP All bugbounty pentesting CVE-2023- POC Exp  RCE example payload  Things\nURL\uff1ahttps://github.com/libas7994/CVE-2023-30212\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-23T01:19:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/523602ae-e669-4dff-9346-fa490f1528b1/export"/>
    <published>2023-06-23T01:19:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b72313f4-95e9-4407-a1f4-3ff1f3477b7d/export</id>
    <title>b72313f4-95e9-4407-a1f4-3ff1f3477b7d</title>
    <updated>2026-05-05T20:46:10.476503+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b72313f4-95e9-4407-a1f4-3ff1f3477b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4433", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDocker environment and exploit the CVE-2023-30212 vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks\nURL\uff1ahttps://github.com/libasmon/Vulnerable-Docker-Environment-CVE-2023-30212\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-23T01:19:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b72313f4-95e9-4407-a1f4-3ff1f3477b7d/export"/>
    <published>2023-06-23T01:19:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a32e2531-89dc-4fde-b4a8-a1b61167f171/export</id>
    <title>a32e2531-89dc-4fde-b4a8-a1b61167f171</title>
    <updated>2026-05-05T20:46:10.473642+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a32e2531-89dc-4fde-b4a8-a1b61167f171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3068", "content": "Tools - Hackers Factory \n\nChameleon\n\nChameleon provides better content discovery by using wappalyzer's set of technology fingerprints alongside custom wordlists tailored to each detected technologies. The tool is highly customizable and allows users to add in their own custom wordlists, extensions or fingerprints.\n\nhttps://github.com/iustin24/chameleon\n\n#infosec #pentesting #bugbounty\n\ngoogle-dorks\n\nhttps://github.com/CorrieOnly/google-dorks\n\n#infosec #pentesting #bugbounty\n\nPresentation Slides\n\nCollections of Dhiyaneshwaran public presentation slides.\n\nhttps://github.com/DhiyaneshGeek/My-Presentation-Slides\n\n#cybersecurity #infosec #pentesting\n\nwebsurfx\n\nAn open source alternative to searx which provides a modern-looking, lightning-fast, privacy respecting, secure, self-hostable meta search engine with ad free clean results, high level of customizability and many other features while keeping privacy and security in mind.\n\nhttps://github.com/neon-mmd/websurfx\n\n#cybersecurity #infosec #privacy\n\nCheekyBlinder\n\nEnumerating/removing kernel callbacks using signed vulnerable drivers.\n\nhttps://github.com/br-sn/CheekyBlinder\n\n#cybersecurity #infosec\n\nCVE-2023-30212\n\nDocker environment and exploit the vulnerability CVE-2023-30212 is a security vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks.\n\nhttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnerability\n\n#cve #infosec #exploit\n\nssh-key-backdoor\n\nThis program generates a backdoor to hide inside an SSH public key (e.g. id_rsa.pub or authorized_keys). The backdoor will execute once when the user next logs in.\n\nhttps://github.com/hackerschoice/ssh-key-backdoor\n\n#infosec #pentesting #redteam\n\nrathole\n\nA lightweight and high-performance reverse proxy for NAT traversal, written in Rust. An alternative to frp and ngrok.\n\nhttps://github.com/rapiz1/rathole\n\n#cybersecurity #infosec #privacy\n\n433Screen-SignalHacker\n\nFull duplex 433 MHz Signal jammer, recorder, decoder and hacking multitool device based on ESP32 microcontroller and RFM69HW radios. This version of the device provides an OLED screen and simple UI to navigate menus and different hacks/modes/settings.\n\nhttps://github.com/luispl77/433Screen-SignalHacker\n\n#cybersecurity #infosec #pentesting\n\nCyberSec Conferences\n\nList of some #cybersecurity conferences.\n\nhttps://github.com/MrM8BRH/CyberSecurity_Conferences\n\n#infosec\n\nSQLiDetector\n\nSimple python script supported with BurpBouty profile that helps you to detect SQL injection \"Error based\" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.\n\nhttps://github.com/eslam3kl/SQLiDetector\n\n#infosec #pentesting #bugbounty\n\nrebindMultiA\n\nA tool to perform a Multiple A Record rebind attack.\n\nhttps://github.com/Rhynorater/rebindMultiA\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-07-04T17:35:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a32e2531-89dc-4fde-b4a8-a1b61167f171/export"/>
    <published>2023-07-04T17:35:37+00:00</published>
  </entry>
</feed>
