<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 14:21:09 +0000</lastBuildDate>
    <item>
      <title>15294e34-e58b-4ba8-9934-dead7983d7f6</title>
      <link>https://vulnerability.circl.lu/sighting/15294e34-e58b-4ba8-9934-dead7983d7f6/export</link>
      <description>{"uuid": "15294e34-e58b-4ba8-9934-dead7983d7f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "seen", "source": "https://t.me/crackcodes/1040", "content": "Updates On Hackbyte Forum:-\n\n1. Universidad IEU Mexico Leak Files\n2. SCS-Siberia \u201c\u0421\u041a\u0421-\u0421\u0438\u0431\u0438\u0440\u044c\u201d \u2013 Telecommunications Company Russia Leak\n3. D.RDynamicShellcode\n4. DashOverride\n5. CVE-2022-33980 - Apache Commons RCE can use url,dns,script key-words to connect any server\n6. lfimap - Local file inclusion discovery and exploitation tool\n7. MSMAP - Msmap is a Memory WebShell Generator\n8. CVE-2022-29968\n9. CVE-2022-21894 - Secure Boot Security Feature Bypass Vulnerability\n10. PowerHuntShares\n11. chrome_password Js script - Steal Get username &amp;amp; password from Chrome. (Now Only Windows)\n12. Fatebot - Fate is IRC botnet\n13. JNDI-Injection-Exploit-Plus\n14. CVE-2022-27255 - Realtek eCos SDK SIP ALG buffer overflow\n15. Bypass-Sandbox-Evasion\n16. blackhat-arsenal-tools\n17. Blackhat 2022 recap \u2013 cloud, eBPF, global conflicts, supply chain, and more\n18. Hacking Zyxel IP cameras to gain a root shell\n19. CobaltStrike4.5\n20. DUOCELL Leak\n21. KisasaCredit Leak\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffbAll Updates On :- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-08-18T15:53:26.000000Z"}</description>
      <content:encoded>{"uuid": "15294e34-e58b-4ba8-9934-dead7983d7f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "seen", "source": "https://t.me/crackcodes/1040", "content": "Updates On Hackbyte Forum:-\n\n1. Universidad IEU Mexico Leak Files\n2. SCS-Siberia \u201c\u0421\u041a\u0421-\u0421\u0438\u0431\u0438\u0440\u044c\u201d \u2013 Telecommunications Company Russia Leak\n3. D.RDynamicShellcode\n4. DashOverride\n5. CVE-2022-33980 - Apache Commons RCE can use url,dns,script key-words to connect any server\n6. lfimap - Local file inclusion discovery and exploitation tool\n7. MSMAP - Msmap is a Memory WebShell Generator\n8. CVE-2022-29968\n9. CVE-2022-21894 - Secure Boot Security Feature Bypass Vulnerability\n10. PowerHuntShares\n11. chrome_password Js script - Steal Get username &amp;amp; password from Chrome. (Now Only Windows)\n12. Fatebot - Fate is IRC botnet\n13. JNDI-Injection-Exploit-Plus\n14. CVE-2022-27255 - Realtek eCos SDK SIP ALG buffer overflow\n15. Bypass-Sandbox-Evasion\n16. blackhat-arsenal-tools\n17. Blackhat 2022 recap \u2013 cloud, eBPF, global conflicts, supply chain, and more\n18. Hacking Zyxel IP cameras to gain a root shell\n19. CobaltStrike4.5\n20. DUOCELL Leak\n21. KisasaCredit Leak\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffbAll Updates On :- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-08-18T15:53:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/15294e34-e58b-4ba8-9934-dead7983d7f6/export</guid>
      <pubDate>Thu, 18 Aug 2022 15:53:26 +0000</pubDate>
    </item>
    <item>
      <title>657400c5-a3cc-42e7-9a83-23cc2d7449df</title>
      <link>https://vulnerability.circl.lu/sighting/657400c5-a3cc-42e7-9a83-23cc2d7449df/export</link>
      <description>{"uuid": "657400c5-a3cc-42e7-9a83-23cc2d7449df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "seen", "source": "Telegram/Uieng4hhAZFXjH9lPmah2RHnRpBbF9ZOA1GgoU9giQZ2kg", "content": "", "creation_timestamp": "2022-08-18T15:56:07.000000Z"}</description>
      <content:encoded>{"uuid": "657400c5-a3cc-42e7-9a83-23cc2d7449df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "seen", "source": "Telegram/Uieng4hhAZFXjH9lPmah2RHnRpBbF9ZOA1GgoU9giQZ2kg", "content": "", "creation_timestamp": "2022-08-18T15:56:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/657400c5-a3cc-42e7-9a83-23cc2d7449df/export</guid>
      <pubDate>Thu, 18 Aug 2022 15:56:07 +0000</pubDate>
    </item>
    <item>
      <title>6842e27b-ff9a-47b2-b9b7-cefdca2b737f</title>
      <link>https://vulnerability.circl.lu/sighting/6842e27b-ff9a-47b2-b9b7-cefdca2b737f/export</link>
      <description>{"uuid": "6842e27b-ff9a-47b2-b9b7-cefdca2b737f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "Telegram/rBR2P_tF_WhAviQzUjXoVNSmzF3vhzm8hoa2za_pE1mJ1w", "content": "", "creation_timestamp": "2022-08-19T12:07:04.000000Z"}</description>
      <content:encoded>{"uuid": "6842e27b-ff9a-47b2-b9b7-cefdca2b737f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "Telegram/rBR2P_tF_WhAviQzUjXoVNSmzF3vhzm8hoa2za_pE1mJ1w", "content": "", "creation_timestamp": "2022-08-19T12:07:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6842e27b-ff9a-47b2-b9b7-cefdca2b737f/export</guid>
      <pubDate>Fri, 19 Aug 2022 12:07:04 +0000</pubDate>
    </item>
    <item>
      <title>1c601105-ca03-43ae-b3d6-a7cc70fcd1cb</title>
      <link>https://vulnerability.circl.lu/sighting/1c601105-ca03-43ae-b3d6-a7cc70fcd1cb/export</link>
      <description>{"uuid": "1c601105-ca03-43ae-b3d6-a7cc70fcd1cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/wireshark_hacking/572", "content": "CVE-2022-27255\n\nhttps://github.com/infobyte/cve-2022-27255/tree/main/exploits_nexxt", "creation_timestamp": "2022-08-19T21:10:08.000000Z"}</description>
      <content:encoded>{"uuid": "1c601105-ca03-43ae-b3d6-a7cc70fcd1cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/wireshark_hacking/572", "content": "CVE-2022-27255\n\nhttps://github.com/infobyte/cve-2022-27255/tree/main/exploits_nexxt", "creation_timestamp": "2022-08-19T21:10:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1c601105-ca03-43ae-b3d6-a7cc70fcd1cb/export</guid>
      <pubDate>Fri, 19 Aug 2022 21:10:08 +0000</pubDate>
    </item>
    <item>
      <title>412f0628-de04-4718-bfca-d8470eaac6ac</title>
      <link>https://vulnerability.circl.lu/sighting/412f0628-de04-4718-bfca-d8470eaac6ac/export</link>
      <description>{"uuid": "412f0628-de04-4718-bfca-d8470eaac6ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1053", "content": "This repository contains the materials for the talk \"Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek\u2019s SDK for eCos OS.\", which was presented at\u00a0DEFCON30.\n\nhttps://github.com/infobyte/cve-2022-27255", "creation_timestamp": "2022-08-21T00:15:14.000000Z"}</description>
      <content:encoded>{"uuid": "412f0628-de04-4718-bfca-d8470eaac6ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1053", "content": "This repository contains the materials for the talk \"Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek\u2019s SDK for eCos OS.\", which was presented at\u00a0DEFCON30.\n\nhttps://github.com/infobyte/cve-2022-27255", "creation_timestamp": "2022-08-21T00:15:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/412f0628-de04-4718-bfca-d8470eaac6ac/export</guid>
      <pubDate>Sun, 21 Aug 2022 00:15:14 +0000</pubDate>
    </item>
    <item>
      <title>fb38227c-5dbb-4213-9dae-94a35abb9cc3</title>
      <link>https://vulnerability.circl.lu/sighting/fb38227c-5dbb-4213-9dae-94a35abb9cc3/export</link>
      <description>{"uuid": "fb38227c-5dbb-4213-9dae-94a35abb9cc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/wireshark_hacking/603", "content": "This repository contains the materials for the talk \"Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek\u2019s SDK for eCos OS.\", which was presented at\u00a0DEFCON30.\n\nhttps://github.com/infobyte/cve-2022-27255", "creation_timestamp": "2022-08-21T06:13:51.000000Z"}</description>
      <content:encoded>{"uuid": "fb38227c-5dbb-4213-9dae-94a35abb9cc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/wireshark_hacking/603", "content": "This repository contains the materials for the talk \"Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek\u2019s SDK for eCos OS.\", which was presented at\u00a0DEFCON30.\n\nhttps://github.com/infobyte/cve-2022-27255", "creation_timestamp": "2022-08-21T06:13:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fb38227c-5dbb-4213-9dae-94a35abb9cc3/export</guid>
      <pubDate>Sun, 21 Aug 2022 06:13:51 +0000</pubDate>
    </item>
    <item>
      <title>660e6388-819a-4474-950a-9517c27cb26a</title>
      <link>https://vulnerability.circl.lu/sighting/660e6388-819a-4474-950a-9517c27cb26a/export</link>
      <description>{"uuid": "660e6388-819a-4474-950a-9517c27cb26a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/wireshark_hacking/605", "content": "This repository contains the materials for the talk \"Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek\u2019s SDK for eCos OS.\", which was presented at\u00a0DEFCON30.\n\nhttps://github.com/infobyte/cve-2022-27255", "creation_timestamp": "2022-08-21T06:19:20.000000Z"}</description>
      <content:encoded>{"uuid": "660e6388-819a-4474-950a-9517c27cb26a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/wireshark_hacking/605", "content": "This repository contains the materials for the talk \"Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek\u2019s SDK for eCos OS.\", which was presented at\u00a0DEFCON30.\n\nhttps://github.com/infobyte/cve-2022-27255", "creation_timestamp": "2022-08-21T06:19:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/660e6388-819a-4474-950a-9517c27cb26a/export</guid>
      <pubDate>Sun, 21 Aug 2022 06:19:20 +0000</pubDate>
    </item>
    <item>
      <title>81b8eb58-95df-4f7d-af0e-56f094372960</title>
      <link>https://vulnerability.circl.lu/sighting/81b8eb58-95df-4f7d-af0e-56f094372960/export</link>
      <description>{"uuid": "81b8eb58-95df-4f7d-af0e-56f094372960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3051", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aSimple checker for CVE-2022-27255 using poc_crash and telnet availability\nURL\uff1ahttps://github.com/stryker-project/CVE-2022-27255-checker\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-27T16:05:01.000000Z"}</description>
      <content:encoded>{"uuid": "81b8eb58-95df-4f7d-af0e-56f094372960", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3051", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aSimple checker for CVE-2022-27255 using poc_crash and telnet availability\nURL\uff1ahttps://github.com/stryker-project/CVE-2022-27255-checker\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-27T16:05:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/81b8eb58-95df-4f7d-af0e-56f094372960/export</guid>
      <pubDate>Sat, 27 Aug 2022 16:05:01 +0000</pubDate>
    </item>
    <item>
      <title>5efefbc5-a3e6-4a85-93ba-cb0cf2c6daf7</title>
      <link>https://vulnerability.circl.lu/sighting/5efefbc5-a3e6-4a85-93ba-cb0cf2c6daf7/export</link>
      <description>{"uuid": "5efefbc5-a3e6-4a85-93ba-cb0cf2c6daf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/strykerapp/276", "content": "https://github.com/stryker-project/CVE-2022-27255-checker\n\u043c\u043e\u0436\u0435\u0442\u0435 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0442\u044c \u0432 \u0441\u0442\u0440\u0430\u0439\u043a\u0435\u0440 \u043f\u043e\u043a\u0430 \u0436\u0434\u0451\u0442\u0435 \u0440\u0435\u043b\u0438\u0437)", "creation_timestamp": "2022-08-28T21:20:58.000000Z"}</description>
      <content:encoded>{"uuid": "5efefbc5-a3e6-4a85-93ba-cb0cf2c6daf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "published-proof-of-concept", "source": "https://t.me/strykerapp/276", "content": "https://github.com/stryker-project/CVE-2022-27255-checker\n\u043c\u043e\u0436\u0435\u0442\u0435 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0442\u044c \u0432 \u0441\u0442\u0440\u0430\u0439\u043a\u0435\u0440 \u043f\u043e\u043a\u0430 \u0436\u0434\u0451\u0442\u0435 \u0440\u0435\u043b\u0438\u0437)", "creation_timestamp": "2022-08-28T21:20:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5efefbc5-a3e6-4a85-93ba-cb0cf2c6daf7/export</guid>
      <pubDate>Sun, 28 Aug 2022 21:20:58 +0000</pubDate>
    </item>
    <item>
      <title>d515d5da-7929-410a-8076-c23ef16f6954</title>
      <link>https://vulnerability.circl.lu/sighting/d515d5da-7929-410a-8076-c23ef16f6954/export</link>
      <description>{"uuid": "d515d5da-7929-410a-8076-c23ef16f6954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "seen", "source": "https://t.me/poxek/2421", "content": "#CVE\n\nExploit for Improper Input Validation in Realtek Ecos Rsdk Firmware\nCVE-2022-27255\n\nIn Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.", "creation_timestamp": "2022-09-01T11:00:04.000000Z"}</description>
      <content:encoded>{"uuid": "d515d5da-7929-410a-8076-c23ef16f6954", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27255", "type": "seen", "source": "https://t.me/poxek/2421", "content": "#CVE\n\nExploit for Improper Input Validation in Realtek Ecos Rsdk Firmware\nCVE-2022-27255\n\nIn Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.", "creation_timestamp": "2022-09-01T11:00:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d515d5da-7929-410a-8076-c23ef16f6954/export</guid>
      <pubDate>Thu, 01 Sep 2022 11:00:04 +0000</pubDate>
    </item>
  </channel>
</rss>
