<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 07:27:08 +0000</lastBuildDate>
    <item>
      <title>5798450a-b14f-405d-985b-238b6d0b2eef</title>
      <link>https://vulnerability.circl.lu/sighting/5798450a-b14f-405d-985b-238b6d0b2eef/export</link>
      <description>{"uuid": "5798450a-b14f-405d-985b-238b6d0b2eef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "seen", "source": "https://t.me/cibsecurity/53367", "content": "\u203c CVE-2022-39066 \u203c\n\nThere is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-22T20:13:12.000000Z"}</description>
      <content:encoded>{"uuid": "5798450a-b14f-405d-985b-238b6d0b2eef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "seen", "source": "https://t.me/cibsecurity/53367", "content": "\u203c CVE-2022-39066 \u203c\n\nThere is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-22T20:13:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5798450a-b14f-405d-985b-238b6d0b2eef/export</guid>
      <pubDate>Tue, 22 Nov 2022 20:13:12 +0000</pubDate>
    </item>
    <item>
      <title>badcddaa-76eb-4725-9d6c-af5c24cb1fa7</title>
      <link>https://vulnerability.circl.lu/sighting/badcddaa-76eb-4725-9d6c-af5c24cb1fa7/export</link>
      <description>{"uuid": "badcddaa-76eb-4725-9d6c-af5c24cb1fa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1754", "content": "#exploit\n1. CVE-2022-45025:\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n2. Exploring Chrome\u2019s CVE-2020-6418\nhttps://blog.haboob.sa/blog/exploring-chromes-cve-2020-6418-part1\n\n3. CVE-2022-39066:\nSQL Injection Vulnerability in ZTE MF286R\nhttps://github.com/v0lp3/CVE-2022-39066", "creation_timestamp": "2022-12-13T04:12:39.000000Z"}</description>
      <content:encoded>{"uuid": "badcddaa-76eb-4725-9d6c-af5c24cb1fa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1754", "content": "#exploit\n1. CVE-2022-45025:\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n2. Exploring Chrome\u2019s CVE-2020-6418\nhttps://blog.haboob.sa/blog/exploring-chromes-cve-2020-6418-part1\n\n3. CVE-2022-39066:\nSQL Injection Vulnerability in ZTE MF286R\nhttps://github.com/v0lp3/CVE-2022-39066", "creation_timestamp": "2022-12-13T04:12:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/badcddaa-76eb-4725-9d6c-af5c24cb1fa7/export</guid>
      <pubDate>Tue, 13 Dec 2022 04:12:39 +0000</pubDate>
    </item>
    <item>
      <title>70d84db0-197e-4f0b-b8aa-a40ddc484529</title>
      <link>https://vulnerability.circl.lu/sighting/70d84db0-197e-4f0b-b8aa-a40ddc484529/export</link>
      <description>{"uuid": "70d84db0-197e-4f0b-b8aa-a40ddc484529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7348", "content": "#exploit\n1. CVE-2022-45025:\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n2. Exploring Chrome\u2019s CVE-2020-6418\nhttps://blog.haboob.sa/blog/exploring-chromes-cve-2020-6418-part1\n\n3. CVE-2022-39066:\nSQL Injection Vulnerability in ZTE MF286R\nhttps://github.com/v0lp3/CVE-2022-39066", "creation_timestamp": "2022-12-13T11:01:01.000000Z"}</description>
      <content:encoded>{"uuid": "70d84db0-197e-4f0b-b8aa-a40ddc484529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7348", "content": "#exploit\n1. CVE-2022-45025:\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n2. Exploring Chrome\u2019s CVE-2020-6418\nhttps://blog.haboob.sa/blog/exploring-chromes-cve-2020-6418-part1\n\n3. CVE-2022-39066:\nSQL Injection Vulnerability in ZTE MF286R\nhttps://github.com/v0lp3/CVE-2022-39066", "creation_timestamp": "2022-12-13T11:01:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/70d84db0-197e-4f0b-b8aa-a40ddc484529/export</guid>
      <pubDate>Tue, 13 Dec 2022 11:01:01 +0000</pubDate>
    </item>
    <item>
      <title>dca579c6-3ed7-4ab9-b46b-6a1a7f2c382e</title>
      <link>https://vulnerability.circl.lu/sighting/dca579c6-3ed7-4ab9-b46b-6a1a7f2c382e/export</link>
      <description>{"uuid": "dca579c6-3ed7-4ab9-b46b-6a1a7f2c382e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/154", "content": "Parshu\n\nFilter URLs to save your time using regex\n\nParshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.\n\nhttps://github.com/R0X4R/Parshu\n\n\u200b\u200bIATelligence\n\nIATelligence is a Python script that extracts the Import Address Table (IAT) from a PE file and uses OpenAI's GPT-3 model to provide details about each Windows API imported by the file. The script also searches for related MITRE ATT&amp;amp;CK techniques and explains how the API could potentially be used by attackers.\n\nIt also displays the hashes of the file and estimates the cost of the GPT-3 requests. IATelligence is a proof of concept for using GPT-3 for malware analysis and quickly assessing the behavior of a malware based on its IAT.\n\nhttps://github.com/fr0gger/IATelligence\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bZeek-Formatted Threat Intelligence Feeds\n\nThis is a public feed based on Public Threat Feeds and CRITICAL PATH SECURITY gathered data. This feed will be updated as often as possible.\n\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds\n\n\u200b\u200binject-globals\n\nA function for injecting global variables into function calls.\n\nhttps://github.com/victorwss/inject-globals\n\n\u200b\u200bPublic version of Redblood C2\n\nThis is a simple command and control server to handle sessions and your victims.\n\nhttps://github.com/kira2040k/RedbloodC2\n\n\u200b\u200bShadow\n\nA jailbreak detection bypass for modern iOS jailbreaks.\n\nPlease note that Shadow is not designed as an app-specific bypass. Issues mainly in consideration are non-detection related app crashes, regressions from previous versions, and compatibility issues.\n\nhttps://github.com/jjolano/shadow\n\n\u200aDomainDouche - OSINT Tool to Abuse SecurityTrails Domain Suggestion API To Find Potentially Related Domains By Keyword And Brute Force\n\nhttp://www.kitploit.com/2022/12/domaindouche-osint-tool-to-abuse.html\n\nCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\nDonate\nhttps://t.me/c/1634518258/5\nhttps://t.me/HackerFactory/114\n\n#redteam #infosec #cybersec #\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n3/3", "creation_timestamp": "2022-12-14T10:16:53.000000Z"}</description>
      <content:encoded>{"uuid": "dca579c6-3ed7-4ab9-b46b-6a1a7f2c382e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/154", "content": "Parshu\n\nFilter URLs to save your time using regex\n\nParshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.\n\nhttps://github.com/R0X4R/Parshu\n\n\u200b\u200bIATelligence\n\nIATelligence is a Python script that extracts the Import Address Table (IAT) from a PE file and uses OpenAI's GPT-3 model to provide details about each Windows API imported by the file. The script also searches for related MITRE ATT&amp;amp;CK techniques and explains how the API could potentially be used by attackers.\n\nIt also displays the hashes of the file and estimates the cost of the GPT-3 requests. IATelligence is a proof of concept for using GPT-3 for malware analysis and quickly assessing the behavior of a malware based on its IAT.\n\nhttps://github.com/fr0gger/IATelligence\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bZeek-Formatted Threat Intelligence Feeds\n\nThis is a public feed based on Public Threat Feeds and CRITICAL PATH SECURITY gathered data. This feed will be updated as often as possible.\n\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds\n\n\u200b\u200binject-globals\n\nA function for injecting global variables into function calls.\n\nhttps://github.com/victorwss/inject-globals\n\n\u200b\u200bPublic version of Redblood C2\n\nThis is a simple command and control server to handle sessions and your victims.\n\nhttps://github.com/kira2040k/RedbloodC2\n\n\u200b\u200bShadow\n\nA jailbreak detection bypass for modern iOS jailbreaks.\n\nPlease note that Shadow is not designed as an app-specific bypass. Issues mainly in consideration are non-detection related app crashes, regressions from previous versions, and compatibility issues.\n\nhttps://github.com/jjolano/shadow\n\n\u200aDomainDouche - OSINT Tool to Abuse SecurityTrails Domain Suggestion API To Find Potentially Related Domains By Keyword And Brute Force\n\nhttp://www.kitploit.com/2022/12/domaindouche-osint-tool-to-abuse.html\n\nCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\nDonate\nhttps://t.me/c/1634518258/5\nhttps://t.me/HackerFactory/114\n\n#redteam #infosec #cybersec #\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n3/3", "creation_timestamp": "2022-12-14T10:16:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dca579c6-3ed7-4ab9-b46b-6a1a7f2c382e/export</guid>
      <pubDate>Wed, 14 Dec 2022 10:16:53 +0000</pubDate>
    </item>
    <item>
      <title>b295eeaa-2523-429f-bca1-52b5c96890ce</title>
      <link>https://vulnerability.circl.lu/sighting/b295eeaa-2523-429f-bca1-52b5c96890ce/export</link>
      <description>{"uuid": "b295eeaa-2523-429f-bca1-52b5c96890ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2137", "content": "Parshu\n\nFilter URLs to save your time using regex\n\nParshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.\n\nhttps://github.com/R0X4R/Parshu\n\n\u200b\u200bIATelligence\n\nIATelligence is a Python script that extracts the Import Address Table (IAT) from a PE file and uses OpenAI's GPT-3 model to provide details about each Windows API imported by the file. The script also searches for related MITRE ATT&amp;amp;CK techniques and explains how the API could potentially be used by attackers.\n\nIt also displays the hashes of the file and estimates the cost of the GPT-3 requests. IATelligence is a proof of concept for using GPT-3 for malware analysis and quickly assessing the behavior of a malware based on its IAT.\n\nhttps://github.com/fr0gger/IATelligence\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bZeek-Formatted Threat Intelligence Feeds\n\nThis is a public feed based on Public Threat Feeds and CRITICAL PATH SECURITY gathered data. This feed will be updated as often as possible.\n\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds\n\n\u200b\u200binject-globals\n\nA function for injecting global variables into function calls.\n\nhttps://github.com/victorwss/inject-globals\n\n\u200b\u200bPublic version of Redblood C2\n\nThis is a simple command and control server to handle sessions and your victims.\n\nhttps://github.com/kira2040k/RedbloodC2\n\n\u200b\u200bShadow\n\nA jailbreak detection bypass for modern iOS jailbreaks.\n\nPlease note that Shadow is not designed as an app-specific bypass. Issues mainly in consideration are non-detection related app crashes, regressions from previous versions, and compatibility issues.\n\nhttps://github.com/jjolano/shadow\n\n\u200aDomainDouche - OSINT Tool to Abuse SecurityTrails Domain Suggestion API To Find Potentially Related Domains By Keyword And Brute Force\n\nhttp://www.kitploit.com/2022/12/domaindouche-osint-tool-to-abuse.html\n\nCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\nDonate\nhttps://t.me/c/1634518258/5\nhttps://t.me/HackerFactory/114\n\n#redteam #infosec #cybersec #\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n3/3", "creation_timestamp": "2022-12-14T10:16:53.000000Z"}</description>
      <content:encoded>{"uuid": "b295eeaa-2523-429f-bca1-52b5c96890ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2137", "content": "Parshu\n\nFilter URLs to save your time using regex\n\nParshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.\n\nhttps://github.com/R0X4R/Parshu\n\n\u200b\u200bIATelligence\n\nIATelligence is a Python script that extracts the Import Address Table (IAT) from a PE file and uses OpenAI's GPT-3 model to provide details about each Windows API imported by the file. The script also searches for related MITRE ATT&amp;amp;CK techniques and explains how the API could potentially be used by attackers.\n\nIt also displays the hashes of the file and estimates the cost of the GPT-3 requests. IATelligence is a proof of concept for using GPT-3 for malware analysis and quickly assessing the behavior of a malware based on its IAT.\n\nhttps://github.com/fr0gger/IATelligence\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bZeek-Formatted Threat Intelligence Feeds\n\nThis is a public feed based on Public Threat Feeds and CRITICAL PATH SECURITY gathered data. This feed will be updated as often as possible.\n\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds\n\n\u200b\u200binject-globals\n\nA function for injecting global variables into function calls.\n\nhttps://github.com/victorwss/inject-globals\n\n\u200b\u200bPublic version of Redblood C2\n\nThis is a simple command and control server to handle sessions and your victims.\n\nhttps://github.com/kira2040k/RedbloodC2\n\n\u200b\u200bShadow\n\nA jailbreak detection bypass for modern iOS jailbreaks.\n\nPlease note that Shadow is not designed as an app-specific bypass. Issues mainly in consideration are non-detection related app crashes, regressions from previous versions, and compatibility issues.\n\nhttps://github.com/jjolano/shadow\n\n\u200aDomainDouche - OSINT Tool to Abuse SecurityTrails Domain Suggestion API To Find Potentially Related Domains By Keyword And Brute Force\n\nhttp://www.kitploit.com/2022/12/domaindouche-osint-tool-to-abuse.html\n\nCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\nDonate\nhttps://t.me/c/1634518258/5\nhttps://t.me/HackerFactory/114\n\n#redteam #infosec #cybersec #\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n3/3", "creation_timestamp": "2022-12-14T10:16:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b295eeaa-2523-429f-bca1-52b5c96890ce/export</guid>
      <pubDate>Wed, 14 Dec 2022 10:16:53 +0000</pubDate>
    </item>
    <item>
      <title>1fb0bae5-a951-4e0c-92b4-7d5d78923f53</title>
      <link>https://vulnerability.circl.lu/sighting/1fb0bae5-a951-4e0c-92b4-7d5d78923f53/export</link>
      <description>{"uuid": "1fb0bae5-a951-4e0c-92b4-7d5d78923f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/3436", "content": "\u200b\u200bCVE-2022-25765 \n\npdfkit Exploit Reverse Shell\n\npdfkit &amp;lt;0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized. (Tested on ver 0.8.6) - CVE-2022-25765\n\nhttps://github.com/CyberArchitect1/CVE-2022-25765-pdfkit-Exploit-Reverse-Shell\n\n\u200b\u200bCVE-2022-45025\n\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\n\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n\u200b\u200bCVE-2022-36537\n\nZK Framework - Exposure of Sensitive Information to an Unauthorized Actor\n\nhttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT\n\n\u200b\u200bCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bCVE-2022-45771 - Pwndoc LFI to RCE\n\nPwndoc local file inclusion to remote code execution of Node.js code on the server.\n\nhttps://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE\n\n\u200b\u200bCVE-2022-46169\n\nCacti remote_agent.php Unauthenticated Command Injection.\n\nhttps://github.com/0xf4n9x/CVE-2022-46169\n\n\u200b\u200bCVE-2022-45451\n\nPoC for CVE-2022-45451 Acronis Arbitrary File Read\n\nhttps://github.com/alfarom256/CVE-2022-45451\n\nCVE-2022-28672\n\nThis bug was Use after Free caused by improper handling of javascript object memory references.\n\nhttps://github.com/hacksysteam/CVE-2022-28672\n\nUse after Free - RCE Exploit: https://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672\n\n\u200b\u200bCVE-2003-0358\n\nBuffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges &amp;gt; via a long -s command line option.\n\nhttps://github.com/snowcra5h/CVE-2003-0358\n\n\u200b\u200bCVE-2022-39253\n\nDocker host file read\n\nhttps://github.com/ssst0n3/docker-cve-2022-39253-poc\n\n\u200b\u200bCVE-2022-48870\n\nmaccms admin+ xss attacks\n\nhttps://github.com/Cedric1314/CVE-2022-48870\n\n\u200b\u200bCVE-2022-2602\n\nPoC Kernel Privilege Escalation Linux\n\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n\u200b\u200bEvilWfshbr\n\nCVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation\n\nhttps://github.com/kkent030315/CVE-2022-42046\n\n\u200b\u200bCVE-2022-2602\n\nThis repository contains exploits for CVE-2022-2602. There are two versions of it:\n\n\u25ab\ufe0f Exploit using userfaultfd technique.\n\u25ab\ufe0f Exploit using inode locking technique.\n\nhttps://github.com/LukeGix/CVE-2022-2602\n\n#cve #poc \n@pfkgit", "creation_timestamp": "2023-01-28T19:14:38.000000Z"}</description>
      <content:encoded>{"uuid": "1fb0bae5-a951-4e0c-92b4-7d5d78923f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/3436", "content": "\u200b\u200bCVE-2022-25765 \n\npdfkit Exploit Reverse Shell\n\npdfkit &amp;lt;0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized. (Tested on ver 0.8.6) - CVE-2022-25765\n\nhttps://github.com/CyberArchitect1/CVE-2022-25765-pdfkit-Exploit-Reverse-Shell\n\n\u200b\u200bCVE-2022-45025\n\nCommand injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)\n\nhttps://github.com/yuriisanin/CVE-2022-45025\n\n\u200b\u200bCVE-2022-36537\n\nZK Framework - Exposure of Sensitive Information to an Unauthorized Actor\n\nhttps://github.com/agnihackers/CVE-2022-36537-EXPLOIT\n\n\u200b\u200bCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bCVE-2022-45771 - Pwndoc LFI to RCE\n\nPwndoc local file inclusion to remote code execution of Node.js code on the server.\n\nhttps://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE\n\n\u200b\u200bCVE-2022-46169\n\nCacti remote_agent.php Unauthenticated Command Injection.\n\nhttps://github.com/0xf4n9x/CVE-2022-46169\n\n\u200b\u200bCVE-2022-45451\n\nPoC for CVE-2022-45451 Acronis Arbitrary File Read\n\nhttps://github.com/alfarom256/CVE-2022-45451\n\nCVE-2022-28672\n\nThis bug was Use after Free caused by improper handling of javascript object memory references.\n\nhttps://github.com/hacksysteam/CVE-2022-28672\n\nUse after Free - RCE Exploit: https://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672\n\n\u200b\u200bCVE-2003-0358\n\nBuffer overflow in (1) nethack 3.4.0 and earlier, and (2) falconseye 1.9.3 and earlier, which is based on nethack, allows local users to gain privileges &amp;gt; via a long -s command line option.\n\nhttps://github.com/snowcra5h/CVE-2003-0358\n\n\u200b\u200bCVE-2022-39253\n\nDocker host file read\n\nhttps://github.com/ssst0n3/docker-cve-2022-39253-poc\n\n\u200b\u200bCVE-2022-48870\n\nmaccms admin+ xss attacks\n\nhttps://github.com/Cedric1314/CVE-2022-48870\n\n\u200b\u200bCVE-2022-2602\n\nPoC Kernel Privilege Escalation Linux\n\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n\u200b\u200bEvilWfshbr\n\nCVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation\n\nhttps://github.com/kkent030315/CVE-2022-42046\n\n\u200b\u200bCVE-2022-2602\n\nThis repository contains exploits for CVE-2022-2602. There are two versions of it:\n\n\u25ab\ufe0f Exploit using userfaultfd technique.\n\u25ab\ufe0f Exploit using inode locking technique.\n\nhttps://github.com/LukeGix/CVE-2022-2602\n\n#cve #poc \n@pfkgit", "creation_timestamp": "2023-01-28T19:14:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1fb0bae5-a951-4e0c-92b4-7d5d78923f53/export</guid>
      <pubDate>Sat, 28 Jan 2023 19:14:38 +0000</pubDate>
    </item>
    <item>
      <title>9bb52f58-6440-43a4-a85d-d052ae98a14d</title>
      <link>https://vulnerability.circl.lu/sighting/9bb52f58-6440-43a4-a85d-d052ae98a14d/export</link>
      <description>{"uuid": "9bb52f58-6440-43a4-a85d-d052ae98a14d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13791", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39066\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.\n\ud83d\udccf Published: 2022-11-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T04:32:36.772Z\n\ud83d\udd17 References:\n1. https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027744", "creation_timestamp": "2025-04-29T05:11:35.000000Z"}</description>
      <content:encoded>{"uuid": "9bb52f58-6440-43a4-a85d-d052ae98a14d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39066", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13791", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-39066\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.\n\ud83d\udccf Published: 2022-11-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T04:32:36.772Z\n\ud83d\udd17 References:\n1. https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1027744", "creation_timestamp": "2025-04-29T05:11:35.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9bb52f58-6440-43a4-a85d-d052ae98a14d/export</guid>
      <pubDate>Tue, 29 Apr 2025 05:11:35 +0000</pubDate>
    </item>
  </channel>
</rss>
