<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 10:38:27 +0000</lastBuildDate>
    <item>
      <title>7c70bd66-4349-4137-a853-e228681aacff</title>
      <link>https://vulnerability.circl.lu/sighting/7c70bd66-4349-4137-a853-e228681aacff/export</link>
      <description>{"uuid": "7c70bd66-4349-4137-a853-e228681aacff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "seen", "source": "https://t.me/arm1tage/296", "content": "\u0423\u042f\u0417\u0412\u0418\u041c\u041e\u0421\u0422\u042c, \u041a\u041e\u0422\u041e\u0420\u0410\u042f \u0417\u0410\u0421\u0422\u0410\u0412\u0418\u041b\u0410 \u0410\u0412\u0422\u041e\u0420\u0410 \u041e\u0411\u041e\u0421\u0420\u0410\u0422\u042c\u0421\u042f\n\n\u0417\u043d\u0430\u043a\u043e\u043c\u044c\u0442\u0435\u0441\u044c, CVE-2020-35489, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043b\u0430\u0433\u0438\u043d\u0435 Contact Form 7 \u0432 WordPress \u0432\u0435\u0440\u0441\u0438\u0438 \u0440\u0430\u043d\u044c\u0448\u0435 5.3.2 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u043b\u0438\u0442\u044c \u0448\u0435\u043b\u043b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043e\u0431\u0445\u043e\u0434\u0430 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u0430 \u0438 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043d\u0435\u043c\u0443 \u0447\u0435\u0440\u0435\u0437 \u043f\u0430\u043f\u043a\u0443 wp-content/uploads... \u0421\u043a\u0440\u0438\u043f\u0442-\u043a\u0438\u0434\u0434\u0438 \u0430\u0432\u0442\u043e\u0440, \u0440\u0430\u0434\u0443\u044f\u0441\u044c \u0437\u0430\u043b\u0438\u0442\u043e\u043c\u0443 \u043d\u0430 \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0438\u0441 \u0448\u0435\u043b\u043b\u0443, \u0442\u0443\u0442 \u0436\u0435 \u043f\u043e\u0437\u043d\u0430\u043b \u0433\u043e\u0440\u0435\u0447\u044c \u043f\u043e\u0440\u0430\u0436\u0435\u043d\u0438\u044f, \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0442\u0443\u043f\u043e \u043d\u0435 \u0441\u043c\u043e\u0433 \u043d\u0430\u0439\u0442\u0438 \u043a\u0443\u0434\u0430 \u0437\u0430\u043b\u0438\u043b\u0441\u044f \u044d\u0442\u043e\u0442 \u0444\u0430\u0439\u043b\ud83e\udd13\n\n\u0421\u0442\u0430\u0442\u044c\u044f\n\n\n#cve #wordpress", "creation_timestamp": "2022-08-23T16:59:41.000000Z"}</description>
      <content:encoded>{"uuid": "7c70bd66-4349-4137-a853-e228681aacff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "seen", "source": "https://t.me/arm1tage/296", "content": "\u0423\u042f\u0417\u0412\u0418\u041c\u041e\u0421\u0422\u042c, \u041a\u041e\u0422\u041e\u0420\u0410\u042f \u0417\u0410\u0421\u0422\u0410\u0412\u0418\u041b\u0410 \u0410\u0412\u0422\u041e\u0420\u0410 \u041e\u0411\u041e\u0421\u0420\u0410\u0422\u042c\u0421\u042f\n\n\u0417\u043d\u0430\u043a\u043e\u043c\u044c\u0442\u0435\u0441\u044c, CVE-2020-35489, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043b\u0430\u0433\u0438\u043d\u0435 Contact Form 7 \u0432 WordPress \u0432\u0435\u0440\u0441\u0438\u0438 \u0440\u0430\u043d\u044c\u0448\u0435 5.3.2 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u043b\u0438\u0442\u044c \u0448\u0435\u043b\u043b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043e\u0431\u0445\u043e\u0434\u0430 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u0430 \u0438 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043d\u0435\u043c\u0443 \u0447\u0435\u0440\u0435\u0437 \u043f\u0430\u043f\u043a\u0443 wp-content/uploads... \u0421\u043a\u0440\u0438\u043f\u0442-\u043a\u0438\u0434\u0434\u0438 \u0430\u0432\u0442\u043e\u0440, \u0440\u0430\u0434\u0443\u044f\u0441\u044c \u0437\u0430\u043b\u0438\u0442\u043e\u043c\u0443 \u043d\u0430 \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0438\u0441 \u0448\u0435\u043b\u043b\u0443, \u0442\u0443\u0442 \u0436\u0435 \u043f\u043e\u0437\u043d\u0430\u043b \u0433\u043e\u0440\u0435\u0447\u044c \u043f\u043e\u0440\u0430\u0436\u0435\u043d\u0438\u044f, \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0442\u0443\u043f\u043e \u043d\u0435 \u0441\u043c\u043e\u0433 \u043d\u0430\u0439\u0442\u0438 \u043a\u0443\u0434\u0430 \u0437\u0430\u043b\u0438\u043b\u0441\u044f \u044d\u0442\u043e\u0442 \u0444\u0430\u0439\u043b\ud83e\udd13\n\n\u0421\u0442\u0430\u0442\u044c\u044f\n\n\n#cve #wordpress", "creation_timestamp": "2022-08-23T16:59:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c70bd66-4349-4137-a853-e228681aacff/export</guid>
      <pubDate>Tue, 23 Aug 2022 16:59:41 +0000</pubDate>
    </item>
    <item>
      <title>c23cd565-528f-4055-8765-909c2da94324</title>
      <link>https://vulnerability.circl.lu/sighting/c23cd565-528f-4055-8765-909c2da94324/export</link>
      <description>{"uuid": "c23cd565-528f-4055-8765-909c2da94324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3076", "content": "Tools - Hackers Factory \n\nCVE-2023-33733\n\nThis write-up details how an RCE in Reportlab - was found and exploited. Due to the prevalence of Reportlab in HTML to PDF processing, this vulnerability may be reachable in many applications that process PDF files, making this an important one to patch and look out for.\n\nhttps://github.com/c53elyas/CVE-2023-33733\n\n#cve #cybersecurity #infosec\n\nLoki\n\nA Little Web Honeypot.\n\nhttps://github.com/TheKingOfDuck/Loki\n\n#cybersecurity #infosec\n\nPyrai - Mirai python variant\n\nThis is a working variant of the Mirai IOT botnet, this is fully written in Python3. In this paper I'm going to show you how to configure each script in order to setup your PyRai.\n\nhttps://github.com/readloud/PyRai\n\n#cybersecurity #infosec #redteam\n\nCVE-2023-33781\n\nD-Link DIR-842V2 v1.0.3 was discovered to allow a user to run an arbitrary binary when connecting to telnet. This vulnerability can be triggered using backup/restore functionality.\n\nhttps://github.com/s0tr/CVE-2023-33781\n\n#cve #cybersecurity #infosec\n\nCVE-2023-33782\n\nD-Link DIR-842V2 v1.0.3 was discovered to contain a command injection vulnerability in the iperf3 diagnostics functionality.\n\nhttps://github.com/s0tr/CVE-2023-33782\n\n#cve #cybersecurity #infosec\n\nHackBrowserData \n\nCommand-line tool for decrypting and exporting browser data ( passwords, history, cookies, bookmarks, credit cards, download records, localStorage and extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux.\n\nhttps://github.com/moonD4rk/HackBrowserData\n\n#infosec #pentesting #redteam\n\nVMClarity \n\nOpen source tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and security threats such as vulnerabilities, exploits, malware, rootkits, misconfigurations and leaked secrets.\n\nhttps://github.com/openclarity/vmclarity\n\n#cybersecurity #infosec #pentesting\n\nCVE-2023-33246 \n\nRocketMQ Remote Code Execution #Exploit.\n\nhttps://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT\n\n#cve #cybersecurity #infosec\n\n2023-33381\n\nOS command injection on MitraStar GPT-2741GNAC.\n\nhttps://github.com/duality084/CVE-2023-33381-MitraStar-GPT-2741GNAC\n\n#cve #cybersecurity #infosec\n\nEyeballer\n\nEyeballer is meant for large-scope network penetration tests where you need to find \"interesting\" targets from a huge set of web-based hosts. Go ahead and use your favorite screenshotting tool like normal (EyeWitness or GoWitness) and then run them through Eyeballer to tell you what's likely to contain vulnerabilities, and what isn't.\n\nhttps://github.com/BishopFox/eyeballer\n\n#cybersecurity #infosec #pentesting\n\nMultichain Auditor\n\nObservations and tips for auditing protocols on multiple chains \ud83e\uddd0\n\nhttps://github.com/0xJuancito/multichain-auditor\n\n#cybersecurity #infosec\n\nCoraza - Web Application Firewall\n\nCoraza is an open source, enterprise-grade, high performance Web Application Firewall (WAF) ready to protect your beloved applications. It written in Go, supports ModSecurity SecLang rulesets and is 100% compatible with the OWASP Core Rule Set.\n\nhttps://github.com/corazawaf/coraza\n\n#cybersecurity #infosec\n\nCVE-2020-35489\n\nCVE-2020-35489 Vulnerability Scanner in #Wordpress Websites.\n\nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_checker\n\n#cybersecurity #infosec\n\nRegStrike\n\nA .reg payload generator.\n\nhttps://github.com/itaymigdal/RegStrike\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-06-05T06:48:53.000000Z"}</description>
      <content:encoded>{"uuid": "c23cd565-528f-4055-8765-909c2da94324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3076", "content": "Tools - Hackers Factory \n\nCVE-2023-33733\n\nThis write-up details how an RCE in Reportlab - was found and exploited. Due to the prevalence of Reportlab in HTML to PDF processing, this vulnerability may be reachable in many applications that process PDF files, making this an important one to patch and look out for.\n\nhttps://github.com/c53elyas/CVE-2023-33733\n\n#cve #cybersecurity #infosec\n\nLoki\n\nA Little Web Honeypot.\n\nhttps://github.com/TheKingOfDuck/Loki\n\n#cybersecurity #infosec\n\nPyrai - Mirai python variant\n\nThis is a working variant of the Mirai IOT botnet, this is fully written in Python3. In this paper I'm going to show you how to configure each script in order to setup your PyRai.\n\nhttps://github.com/readloud/PyRai\n\n#cybersecurity #infosec #redteam\n\nCVE-2023-33781\n\nD-Link DIR-842V2 v1.0.3 was discovered to allow a user to run an arbitrary binary when connecting to telnet. This vulnerability can be triggered using backup/restore functionality.\n\nhttps://github.com/s0tr/CVE-2023-33781\n\n#cve #cybersecurity #infosec\n\nCVE-2023-33782\n\nD-Link DIR-842V2 v1.0.3 was discovered to contain a command injection vulnerability in the iperf3 diagnostics functionality.\n\nhttps://github.com/s0tr/CVE-2023-33782\n\n#cve #cybersecurity #infosec\n\nHackBrowserData \n\nCommand-line tool for decrypting and exporting browser data ( passwords, history, cookies, bookmarks, credit cards, download records, localStorage and extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux.\n\nhttps://github.com/moonD4rk/HackBrowserData\n\n#infosec #pentesting #redteam\n\nVMClarity \n\nOpen source tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and security threats such as vulnerabilities, exploits, malware, rootkits, misconfigurations and leaked secrets.\n\nhttps://github.com/openclarity/vmclarity\n\n#cybersecurity #infosec #pentesting\n\nCVE-2023-33246 \n\nRocketMQ Remote Code Execution #Exploit.\n\nhttps://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT\n\n#cve #cybersecurity #infosec\n\n2023-33381\n\nOS command injection on MitraStar GPT-2741GNAC.\n\nhttps://github.com/duality084/CVE-2023-33381-MitraStar-GPT-2741GNAC\n\n#cve #cybersecurity #infosec\n\nEyeballer\n\nEyeballer is meant for large-scope network penetration tests where you need to find \"interesting\" targets from a huge set of web-based hosts. Go ahead and use your favorite screenshotting tool like normal (EyeWitness or GoWitness) and then run them through Eyeballer to tell you what's likely to contain vulnerabilities, and what isn't.\n\nhttps://github.com/BishopFox/eyeballer\n\n#cybersecurity #infosec #pentesting\n\nMultichain Auditor\n\nObservations and tips for auditing protocols on multiple chains \ud83e\uddd0\n\nhttps://github.com/0xJuancito/multichain-auditor\n\n#cybersecurity #infosec\n\nCoraza - Web Application Firewall\n\nCoraza is an open source, enterprise-grade, high performance Web Application Firewall (WAF) ready to protect your beloved applications. It written in Go, supports ModSecurity SecLang rulesets and is 100% compatible with the OWASP Core Rule Set.\n\nhttps://github.com/corazawaf/coraza\n\n#cybersecurity #infosec\n\nCVE-2020-35489\n\nCVE-2020-35489 Vulnerability Scanner in #Wordpress Websites.\n\nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_checker\n\n#cybersecurity #infosec\n\nRegStrike\n\nA .reg payload generator.\n\nhttps://github.com/itaymigdal/RegStrike\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-06-05T06:48:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c23cd565-528f-4055-8765-909c2da94324/export</guid>
      <pubDate>Mon, 05 Jun 2023 06:48:53 +0000</pubDate>
    </item>
    <item>
      <title>cb70875b-76d9-4b4a-aac9-3d8018290b37</title>
      <link>https://vulnerability.circl.lu/sighting/cb70875b-76d9-4b4a-aac9-3d8018290b37/export</link>
      <description>{"uuid": "cb70875b-76d9-4b4a-aac9-3d8018290b37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8616", "content": "#tools\n#Blue_Team_Techniques\n1. Ruby script to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway/ADC\nhttps://github.com/Abo5/CVE-2023-24488\n2. KRSI (eBPF+LSM) based Linux security auditing tool\nhttps://github.com/mrtc0/bouheki\n3. WordPress Sites Vulnerability Checker for CVE-2020-35489\nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_checker", "creation_timestamp": "2023-07-05T15:02:28.000000Z"}</description>
      <content:encoded>{"uuid": "cb70875b-76d9-4b4a-aac9-3d8018290b37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8616", "content": "#tools\n#Blue_Team_Techniques\n1. Ruby script to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway/ADC\nhttps://github.com/Abo5/CVE-2023-24488\n2. KRSI (eBPF+LSM) based Linux security auditing tool\nhttps://github.com/mrtc0/bouheki\n3. WordPress Sites Vulnerability Checker for CVE-2020-35489\nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_checker", "creation_timestamp": "2023-07-05T15:02:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cb70875b-76d9-4b4a-aac9-3d8018290b37/export</guid>
      <pubDate>Wed, 05 Jul 2023 15:02:28 +0000</pubDate>
    </item>
    <item>
      <title>65601431-cc53-4eee-8611-b8f0b9ae496e</title>
      <link>https://vulnerability.circl.lu/sighting/65601431-cc53-4eee-8611-b8f0b9ae496e/export</link>
      <description>{"uuid": "65601431-cc53-4eee-8611-b8f0b9ae496e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "seen", "source": "Telegram/S9OVQYfdNz0Aup1BmMIRFsjuMIIVbtZ6CrSGV042i0CzBPw", "content": "", "creation_timestamp": "2024-03-07T19:15:55.000000Z"}</description>
      <content:encoded>{"uuid": "65601431-cc53-4eee-8611-b8f0b9ae496e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "seen", "source": "Telegram/S9OVQYfdNz0Aup1BmMIRFsjuMIIVbtZ6CrSGV042i0CzBPw", "content": "", "creation_timestamp": "2024-03-07T19:15:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/65601431-cc53-4eee-8611-b8f0b9ae496e/export</guid>
      <pubDate>Thu, 07 Mar 2024 19:15:55 +0000</pubDate>
    </item>
    <item>
      <title>42648b78-bc70-435a-aad6-fb9866145523</title>
      <link>https://vulnerability.circl.lu/sighting/42648b78-bc70-435a-aad6-fb9866145523/export</link>
      <description>{"uuid": "42648b78-bc70-435a-aad6-fb9866145523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/paiddpam/3505", "content": "- WP CVE-2020-35489 Checker\n+ Google Dork : inurl:/wp-content/plugins/contact-form-7/\n\nShare for everybody \nDownload \nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_", "creation_timestamp": "2024-07-12T10:38:05.000000Z"}</description>
      <content:encoded>{"uuid": "42648b78-bc70-435a-aad6-fb9866145523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/paiddpam/3505", "content": "- WP CVE-2020-35489 Checker\n+ Google Dork : inurl:/wp-content/plugins/contact-form-7/\n\nShare for everybody \nDownload \nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_", "creation_timestamp": "2024-07-12T10:38:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/42648b78-bc70-435a-aad6-fb9866145523/export</guid>
      <pubDate>Fri, 12 Jul 2024 10:38:05 +0000</pubDate>
    </item>
    <item>
      <title>815151ec-95ab-4f60-a16b-3ec0d05aaeb7</title>
      <link>https://vulnerability.circl.lu/sighting/815151ec-95ab-4f60-a16b-3ec0d05aaeb7/export</link>
      <description>{"uuid": "815151ec-95ab-4f60-a16b-3ec0d05aaeb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/hitshare/2343", "content": "- WP CVE-2020-35489 Checker\n+ Google Dork : inurl:/wp-content/plugins/contact-form-7/\n\nShare for everybody \nDownload \nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_checker\n\nChannel @StableExploitvv\nShare &amp;amp; Support Us", "creation_timestamp": "2024-07-12T17:13:04.000000Z"}</description>
      <content:encoded>{"uuid": "815151ec-95ab-4f60-a16b-3ec0d05aaeb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/hitshare/2343", "content": "- WP CVE-2020-35489 Checker\n+ Google Dork : inurl:/wp-content/plugins/contact-form-7/\n\nShare for everybody \nDownload \nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_checker\n\nChannel @StableExploitvv\nShare &amp;amp; Support Us", "creation_timestamp": "2024-07-12T17:13:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/815151ec-95ab-4f60-a16b-3ec0d05aaeb7/export</guid>
      <pubDate>Fri, 12 Jul 2024 17:13:04 +0000</pubDate>
    </item>
    <item>
      <title>7c8cdffc-d4a5-4f0c-8d20-275bb555ccd5</title>
      <link>https://vulnerability.circl.lu/sighting/7c8cdffc-d4a5-4f0c-8d20-275bb555ccd5/export</link>
      <description>{"uuid": "7c8cdffc-d4a5-4f0c-8d20-275bb555ccd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "Telegram/PQfK35LzGlTqCn-1qhL2xtMgvwpuI0Nru-tsM7f5ymd2", "content": "", "creation_timestamp": "2024-07-21T20:59:16.000000Z"}</description>
      <content:encoded>{"uuid": "7c8cdffc-d4a5-4f0c-8d20-275bb555ccd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "Telegram/PQfK35LzGlTqCn-1qhL2xtMgvwpuI0Nru-tsM7f5ymd2", "content": "", "creation_timestamp": "2024-07-21T20:59:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c8cdffc-d4a5-4f0c-8d20-275bb555ccd5/export</guid>
      <pubDate>Sun, 21 Jul 2024 20:59:16 +0000</pubDate>
    </item>
    <item>
      <title>cd41a36c-67bd-4dd2-be9e-bb34ed104907</title>
      <link>https://vulnerability.circl.lu/sighting/cd41a36c-67bd-4dd2-be9e-bb34ed104907/export</link>
      <description>{"uuid": "cd41a36c-67bd-4dd2-be9e-bb34ed104907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "seen", "source": "Telegram/ByNbbDHZjaT1COluAalmuvxSwCeNvtmrdNcPTCLUkjjZc2iP", "content": "", "creation_timestamp": "2024-08-18T11:36:19.000000Z"}</description>
      <content:encoded>{"uuid": "cd41a36c-67bd-4dd2-be9e-bb34ed104907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "seen", "source": "Telegram/ByNbbDHZjaT1COluAalmuvxSwCeNvtmrdNcPTCLUkjjZc2iP", "content": "", "creation_timestamp": "2024-08-18T11:36:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cd41a36c-67bd-4dd2-be9e-bb34ed104907/export</guid>
      <pubDate>Sun, 18 Aug 2024 11:36:19 +0000</pubDate>
    </item>
    <item>
      <title>c3b9872b-fb63-46b8-905e-5975c88c2cbb</title>
      <link>https://vulnerability.circl.lu/sighting/c3b9872b-fb63-46b8-905e-5975c88c2cbb/export</link>
      <description>{"uuid": "c3b9872b-fb63-46b8-905e-5975c88c2cbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "seen", "source": "Telegram/O8RJaZzuBZKodTP5o0k24qkcoG7b-8TflqJotgjjX4AbLmhC", "content": "", "creation_timestamp": "2024-09-18T23:44:37.000000Z"}</description>
      <content:encoded>{"uuid": "c3b9872b-fb63-46b8-905e-5975c88c2cbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "seen", "source": "Telegram/O8RJaZzuBZKodTP5o0k24qkcoG7b-8TflqJotgjjX4AbLmhC", "content": "", "creation_timestamp": "2024-09-18T23:44:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c3b9872b-fb63-46b8-905e-5975c88c2cbb/export</guid>
      <pubDate>Wed, 18 Sep 2024 23:44:37 +0000</pubDate>
    </item>
    <item>
      <title>1b89f4dc-ea20-4f3a-81ec-1a51b1ee4a8f</title>
      <link>https://vulnerability.circl.lu/sighting/1b89f4dc-ea20-4f3a-81ec-1a51b1ee4a8f/export</link>
      <description>{"uuid": "1b89f4dc-ea20-4f3a-81ec-1a51b1ee4a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8677", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aPOC for RCE with CVE-2020-35489\nURL\uff1ahttps://github.com/aitech66/poc-CVE-2020-35489\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-10-04T20:11:39.000000Z"}</description>
      <content:encoded>{"uuid": "1b89f4dc-ea20-4f3a-81ec-1a51b1ee4a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35489", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8677", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aPOC for RCE with CVE-2020-35489\nURL\uff1ahttps://github.com/aitech66/poc-CVE-2020-35489\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-10-04T20:11:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1b89f4dc-ea20-4f3a-81ec-1a51b1ee4a8f/export</guid>
      <pubDate>Fri, 04 Oct 2024 20:11:39 +0000</pubDate>
    </item>
  </channel>
</rss>
