<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 22:09:00 +0000</lastBuildDate>
    <item>
      <title>ba749163-baad-4efc-817e-eaf59c155e38</title>
      <link>https://vulnerability.circl.lu/sighting/ba749163-baad-4efc-817e-eaf59c155e38/export</link>
      <description>{"uuid": "ba749163-baad-4efc-817e-eaf59c155e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4435", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDocker environment and exploit the CVE-2023-30212 vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks\nURL\uff1ahttps://github.com/libasmon/create-a-vulnerable-Docker-environment-that-is-susceptible-to-CVE-2023-30212\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T06:46:15.000000Z"}</description>
      <content:encoded>{"uuid": "ba749163-baad-4efc-817e-eaf59c155e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4435", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDocker environment and exploit the CVE-2023-30212 vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks\nURL\uff1ahttps://github.com/libasmon/create-a-vulnerable-Docker-environment-that-is-susceptible-to-CVE-2023-30212\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T06:46:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ba749163-baad-4efc-817e-eaf59c155e38/export</guid>
      <pubDate>Sat, 27 May 2023 06:46:15 +0000</pubDate>
    </item>
    <item>
      <title>1f4fd0b0-8672-46e2-9441-0b4dd5ae40a3</title>
      <link>https://vulnerability.circl.lu/sighting/1f4fd0b0-8672-46e2-9441-0b4dd5ae40a3/export</link>
      <description>{"uuid": "1f4fd0b0-8672-46e2-9441-0b4dd5ae40a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4436", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDocker environment and exploit the CVE-2023-30212 vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks\nURL\uff1ahttps://github.com/libasmon/-CVE-2023-30212-Vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T07:00:38.000000Z"}</description>
      <content:encoded>{"uuid": "1f4fd0b0-8672-46e2-9441-0b4dd5ae40a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4436", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDocker environment and exploit the CVE-2023-30212 vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks\nURL\uff1ahttps://github.com/libasmon/-CVE-2023-30212-Vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T07:00:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1f4fd0b0-8672-46e2-9441-0b4dd5ae40a3/export</guid>
      <pubDate>Sat, 27 May 2023 07:00:38 +0000</pubDate>
    </item>
    <item>
      <title>ba8f530f-eb6c-4bc1-abc1-0cb2e7f6a082</title>
      <link>https://vulnerability.circl.lu/sighting/ba8f530f-eb6c-4bc1-abc1-0cb2e7f6a082/export</link>
      <description>{"uuid": "ba8f530f-eb6c-4bc1-abc1-0cb2e7f6a082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4437", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aVulnerable Docker Environment CVE-2023-30212\nURL\uff1ahttps://github.com/libas7994/Exploit-the-CVE-2023-30212-vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T09:38:49.000000Z"}</description>
      <content:encoded>{"uuid": "ba8f530f-eb6c-4bc1-abc1-0cb2e7f6a082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4437", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aVulnerable Docker Environment CVE-2023-30212\nURL\uff1ahttps://github.com/libas7994/Exploit-the-CVE-2023-30212-vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T09:38:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ba8f530f-eb6c-4bc1-abc1-0cb2e7f6a082/export</guid>
      <pubDate>Sat, 27 May 2023 09:38:49 +0000</pubDate>
    </item>
    <item>
      <title>3615c7c9-aa7f-4344-807d-27679868f67c</title>
      <link>https://vulnerability.circl.lu/sighting/3615c7c9-aa7f-4344-807d-27679868f67c/export</link>
      <description>{"uuid": "3615c7c9-aa7f-4344-807d-27679868f67c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4438", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExploit-the-CVE-2023-30212-vulnerability\nURL\uff1ahttps://github.com/libasv/Exploite-CVE-2023-30212-vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T09:57:38.000000Z"}</description>
      <content:encoded>{"uuid": "3615c7c9-aa7f-4344-807d-27679868f67c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4438", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExploit-the-CVE-2023-30212-vulnerability\nURL\uff1ahttps://github.com/libasv/Exploite-CVE-2023-30212-vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T09:57:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3615c7c9-aa7f-4344-807d-27679868f67c/export</guid>
      <pubDate>Sat, 27 May 2023 09:57:38 +0000</pubDate>
    </item>
    <item>
      <title>8dd3dc76-17f8-4ffb-b968-7b687eb25246</title>
      <link>https://vulnerability.circl.lu/sighting/8dd3dc76-17f8-4ffb-b968-7b687eb25246/export</link>
      <description>{"uuid": "8dd3dc76-17f8-4ffb-b968-7b687eb25246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4440", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExploit-the-CVE-2023-30212-vulnerability\nURL\uff1ahttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T11:21:03.000000Z"}</description>
      <content:encoded>{"uuid": "8dd3dc76-17f8-4ffb-b968-7b687eb25246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4440", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExploit-the-CVE-2023-30212-vulnerability\nURL\uff1ahttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnerability\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-27T11:21:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8dd3dc76-17f8-4ffb-b968-7b687eb25246/export</guid>
      <pubDate>Sat, 27 May 2023 11:21:03 +0000</pubDate>
    </item>
    <item>
      <title>252e7014-2e5b-4321-b9a0-5a6f83da6eac</title>
      <link>https://vulnerability.circl.lu/sighting/252e7014-2e5b-4321-b9a0-5a6f83da6eac/export</link>
      <description>{"uuid": "252e7014-2e5b-4321-b9a0-5a6f83da6eac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8378", "content": "#exploit\n1. CVE-2022-36449:\nMali GPU Kernel Driver - improper GPU memory processing operations\nhttps://github.blog/2023-05-25-rooting-with-root-cause-finding-a-variant-of-a-project-zero-bug\n\n2. CVE-2023-30212:\nDocker Exploit (XSS)\nhttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnerability\nhttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnera", "creation_timestamp": "2023-06-12T00:58:47.000000Z"}</description>
      <content:encoded>{"uuid": "252e7014-2e5b-4321-b9a0-5a6f83da6eac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8378", "content": "#exploit\n1. CVE-2022-36449:\nMali GPU Kernel Driver - improper GPU memory processing operations\nhttps://github.blog/2023-05-25-rooting-with-root-cause-finding-a-variant-of-a-project-zero-bug\n\n2. CVE-2023-30212:\nDocker Exploit (XSS)\nhttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnerability\nhttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnera", "creation_timestamp": "2023-06-12T00:58:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/252e7014-2e5b-4321-b9a0-5a6f83da6eac/export</guid>
      <pubDate>Mon, 12 Jun 2023 00:58:47 +0000</pubDate>
    </item>
    <item>
      <title>6eb3bbf4-f6cc-4ce5-8122-f28f2c063ac0</title>
      <link>https://vulnerability.circl.lu/sighting/6eb3bbf4-f6cc-4ce5-8122-f28f2c063ac0/export</link>
      <description>{"uuid": "6eb3bbf4-f6cc-4ce5-8122-f28f2c063ac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4598", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aThis contains the necessary files and Docker to replicate A vulnerability in OURPHP that has a XSS Vulnerability (CVE-2023-30212)\nURL\uff1ahttps://github.com/VisDev23/Vulnerable-Docker--CVE-2023-30212-\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-20T09:18:31.000000Z"}</description>
      <content:encoded>{"uuid": "6eb3bbf4-f6cc-4ce5-8122-f28f2c063ac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4598", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aThis contains the necessary files and Docker to replicate A vulnerability in OURPHP that has a XSS Vulnerability (CVE-2023-30212)\nURL\uff1ahttps://github.com/VisDev23/Vulnerable-Docker--CVE-2023-30212-\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-20T09:18:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6eb3bbf4-f6cc-4ce5-8122-f28f2c063ac0/export</guid>
      <pubDate>Tue, 20 Jun 2023 09:18:31 +0000</pubDate>
    </item>
    <item>
      <title>523602ae-e669-4dff-9346-fa490f1528b1</title>
      <link>https://vulnerability.circl.lu/sighting/523602ae-e669-4dff-9346-fa490f1528b1/export</link>
      <description>{"uuid": "523602ae-e669-4dff-9346-fa490f1528b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4432", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aTOP All bugbounty pentesting CVE-2023- POC Exp  RCE example payload  Things\nURL\uff1ahttps://github.com/libas7994/CVE-2023-30212\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-23T01:19:44.000000Z"}</description>
      <content:encoded>{"uuid": "523602ae-e669-4dff-9346-fa490f1528b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4432", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aTOP All bugbounty pentesting CVE-2023- POC Exp  RCE example payload  Things\nURL\uff1ahttps://github.com/libas7994/CVE-2023-30212\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-23T01:19:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/523602ae-e669-4dff-9346-fa490f1528b1/export</guid>
      <pubDate>Fri, 23 Jun 2023 01:19:44 +0000</pubDate>
    </item>
    <item>
      <title>b72313f4-95e9-4407-a1f4-3ff1f3477b7d</title>
      <link>https://vulnerability.circl.lu/sighting/b72313f4-95e9-4407-a1f4-3ff1f3477b7d/export</link>
      <description>{"uuid": "b72313f4-95e9-4407-a1f4-3ff1f3477b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4433", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDocker environment and exploit the CVE-2023-30212 vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks\nURL\uff1ahttps://github.com/libasmon/Vulnerable-Docker-Environment-CVE-2023-30212\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-23T01:19:53.000000Z"}</description>
      <content:encoded>{"uuid": "b72313f4-95e9-4407-a1f4-3ff1f3477b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4433", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDocker environment and exploit the CVE-2023-30212 vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks\nURL\uff1ahttps://github.com/libasmon/Vulnerable-Docker-Environment-CVE-2023-30212\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-23T01:19:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b72313f4-95e9-4407-a1f4-3ff1f3477b7d/export</guid>
      <pubDate>Fri, 23 Jun 2023 01:19:53 +0000</pubDate>
    </item>
    <item>
      <title>a32e2531-89dc-4fde-b4a8-a1b61167f171</title>
      <link>https://vulnerability.circl.lu/sighting/a32e2531-89dc-4fde-b4a8-a1b61167f171/export</link>
      <description>{"uuid": "a32e2531-89dc-4fde-b4a8-a1b61167f171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3068", "content": "Tools - Hackers Factory \n\nChameleon\n\nChameleon provides better content discovery by using wappalyzer's set of technology fingerprints alongside custom wordlists tailored to each detected technologies. The tool is highly customizable and allows users to add in their own custom wordlists, extensions or fingerprints.\n\nhttps://github.com/iustin24/chameleon\n\n#infosec #pentesting #bugbounty\n\ngoogle-dorks\n\nhttps://github.com/CorrieOnly/google-dorks\n\n#infosec #pentesting #bugbounty\n\nPresentation Slides\n\nCollections of Dhiyaneshwaran public presentation slides.\n\nhttps://github.com/DhiyaneshGeek/My-Presentation-Slides\n\n#cybersecurity #infosec #pentesting\n\nwebsurfx\n\nAn open source alternative to searx which provides a modern-looking, lightning-fast, privacy respecting, secure, self-hostable meta search engine with ad free clean results, high level of customizability and many other features while keeping privacy and security in mind.\n\nhttps://github.com/neon-mmd/websurfx\n\n#cybersecurity #infosec #privacy\n\nCheekyBlinder\n\nEnumerating/removing kernel callbacks using signed vulnerable drivers.\n\nhttps://github.com/br-sn/CheekyBlinder\n\n#cybersecurity #infosec\n\nCVE-2023-30212\n\nDocker environment and exploit the vulnerability CVE-2023-30212 is a security vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks.\n\nhttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnerability\n\n#cve #infosec #exploit\n\nssh-key-backdoor\n\nThis program generates a backdoor to hide inside an SSH public key (e.g. id_rsa.pub or authorized_keys). The backdoor will execute once when the user next logs in.\n\nhttps://github.com/hackerschoice/ssh-key-backdoor\n\n#infosec #pentesting #redteam\n\nrathole\n\nA lightweight and high-performance reverse proxy for NAT traversal, written in Rust. An alternative to frp and ngrok.\n\nhttps://github.com/rapiz1/rathole\n\n#cybersecurity #infosec #privacy\n\n433Screen-SignalHacker\n\nFull duplex 433 MHz Signal jammer, recorder, decoder and hacking multitool device based on ESP32 microcontroller and RFM69HW radios. This version of the device provides an OLED screen and simple UI to navigate menus and different hacks/modes/settings.\n\nhttps://github.com/luispl77/433Screen-SignalHacker\n\n#cybersecurity #infosec #pentesting\n\nCyberSec Conferences\n\nList of some #cybersecurity conferences.\n\nhttps://github.com/MrM8BRH/CyberSecurity_Conferences\n\n#infosec\n\nSQLiDetector\n\nSimple python script supported with BurpBouty profile that helps you to detect SQL injection \"Error based\" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.\n\nhttps://github.com/eslam3kl/SQLiDetector\n\n#infosec #pentesting #bugbounty\n\nrebindMultiA\n\nA tool to perform a Multiple A Record rebind attack.\n\nhttps://github.com/Rhynorater/rebindMultiA\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-07-04T17:35:37.000000Z"}</description>
      <content:encoded>{"uuid": "a32e2531-89dc-4fde-b4a8-a1b61167f171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30212", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3068", "content": "Tools - Hackers Factory \n\nChameleon\n\nChameleon provides better content discovery by using wappalyzer's set of technology fingerprints alongside custom wordlists tailored to each detected technologies. The tool is highly customizable and allows users to add in their own custom wordlists, extensions or fingerprints.\n\nhttps://github.com/iustin24/chameleon\n\n#infosec #pentesting #bugbounty\n\ngoogle-dorks\n\nhttps://github.com/CorrieOnly/google-dorks\n\n#infosec #pentesting #bugbounty\n\nPresentation Slides\n\nCollections of Dhiyaneshwaran public presentation slides.\n\nhttps://github.com/DhiyaneshGeek/My-Presentation-Slides\n\n#cybersecurity #infosec #pentesting\n\nwebsurfx\n\nAn open source alternative to searx which provides a modern-looking, lightning-fast, privacy respecting, secure, self-hostable meta search engine with ad free clean results, high level of customizability and many other features while keeping privacy and security in mind.\n\nhttps://github.com/neon-mmd/websurfx\n\n#cybersecurity #infosec #privacy\n\nCheekyBlinder\n\nEnumerating/removing kernel callbacks using signed vulnerable drivers.\n\nhttps://github.com/br-sn/CheekyBlinder\n\n#cybersecurity #infosec\n\nCVE-2023-30212\n\nDocker environment and exploit the vulnerability CVE-2023-30212 is a security vulnerability that affects versions of OURPHP prior to or equal to 7.2.0. This vulnerability allows for Cross-Site Scripting (XSS) attacks.\n\nhttps://github.com/libasmon/Exploite-CVE-2023-30212-Vulnerability\n\n#cve #infosec #exploit\n\nssh-key-backdoor\n\nThis program generates a backdoor to hide inside an SSH public key (e.g. id_rsa.pub or authorized_keys). The backdoor will execute once when the user next logs in.\n\nhttps://github.com/hackerschoice/ssh-key-backdoor\n\n#infosec #pentesting #redteam\n\nrathole\n\nA lightweight and high-performance reverse proxy for NAT traversal, written in Rust. An alternative to frp and ngrok.\n\nhttps://github.com/rapiz1/rathole\n\n#cybersecurity #infosec #privacy\n\n433Screen-SignalHacker\n\nFull duplex 433 MHz Signal jammer, recorder, decoder and hacking multitool device based on ESP32 microcontroller and RFM69HW radios. This version of the device provides an OLED screen and simple UI to navigate menus and different hacks/modes/settings.\n\nhttps://github.com/luispl77/433Screen-SignalHacker\n\n#cybersecurity #infosec #pentesting\n\nCyberSec Conferences\n\nList of some #cybersecurity conferences.\n\nhttps://github.com/MrM8BRH/CyberSecurity_Conferences\n\n#infosec\n\nSQLiDetector\n\nSimple python script supported with BurpBouty profile that helps you to detect SQL injection \"Error based\" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.\n\nhttps://github.com/eslam3kl/SQLiDetector\n\n#infosec #pentesting #bugbounty\n\nrebindMultiA\n\nA tool to perform a Multiple A Record rebind attack.\n\nhttps://github.com/Rhynorater/rebindMultiA\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-07-04T17:35:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a32e2531-89dc-4fde-b4a8-a1b61167f171/export</guid>
      <pubDate>Tue, 04 Jul 2023 17:35:37 +0000</pubDate>
    </item>
  </channel>
</rss>
