<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 21:35:12 +0000</lastBuildDate>
    <item>
      <title>cad6cebd-3841-41c5-8ed8-3e2777bef8f6</title>
      <link>https://vulnerability.circl.lu/sighting/cad6cebd-3841-41c5-8ed8-3e2777bef8f6/export</link>
      <description>{"uuid": "cad6cebd-3841-41c5-8ed8-3e2777bef8f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3325", "content": "https://github.com/mbog14/CVE-2024-44193\n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n#github #\u5206\u6790", "creation_timestamp": "2024-10-17T11:38:41.000000Z"}</description>
      <content:encoded>{"uuid": "cad6cebd-3841-41c5-8ed8-3e2777bef8f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3325", "content": "https://github.com/mbog14/CVE-2024-44193\n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n#github #\u5206\u6790", "creation_timestamp": "2024-10-17T11:38:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cad6cebd-3841-41c5-8ed8-3e2777bef8f6/export</guid>
      <pubDate>Thu, 17 Oct 2024 11:38:41 +0000</pubDate>
    </item>
    <item>
      <title>4325d26b-136f-4e7e-9302-84ed3a507fe4</title>
      <link>https://vulnerability.circl.lu/sighting/4325d26b-136f-4e7e-9302-84ed3a507fe4/export</link>
      <description>{"uuid": "4325d26b-136f-4e7e-9302-84ed3a507fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/Unik4tsG4ng/9801", "content": "Tools \n\nIntroducing \ud835\udde5\ud835\ude02\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\uddd7\ud835\ude02\ud835\uddfa\ud835\uddfd\u2014LSASS memory dumper in pure Rust, using \ud835\uddfc\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\udde1\ud835\udde7 \ud835\uddd4\ud835\udde3\ud835\udddc\ud835\ude00, creating a \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddfa\ud835\uddee\ud835\uddf9 \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddf1\ud835\ude02\ud835\uddfa\ud835\uddfd from scratch, with no std, no CRT, and just \ud835\udfed\ud835\udff4\ud835\uddde\ud835\uddd5! \n\nhttps://github.com/safedv/RustiveDumph\n\nRustRedOps : a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team (with a specific focus on the Rust programming language)\n\nhttps://github.com/joaoviictorti/RustRedOps \n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day \n\nhttps://github.com/mbog14/CVE-2024-44193\n\nStuxnet extracted binaries by reversing &amp;amp; Stuxnet Rootkit Analysis \n\nhttps://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit\n\nA Powerful web scraper powered by LLM | OpenAI, Gemini &amp;amp; Ollama \n\nhttps://github.com/itsOwen/CyberScraper-2077\n\nZaps arguments and environment from the process list \n\nhttps://github.com/hackerschoice/zapper?tab=readme-ov-file\n\nReverse Engineering the AM335x Boot ROM\n\nhttps://github.com/sjgallagher2/am335xbootrom", "creation_timestamp": "2024-10-25T04:26:57.000000Z"}</description>
      <content:encoded>{"uuid": "4325d26b-136f-4e7e-9302-84ed3a507fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/Unik4tsG4ng/9801", "content": "Tools \n\nIntroducing \ud835\udde5\ud835\ude02\ud835\ude00\ud835\ude01\ud835\uddf6\ud835\ude03\ud835\uddf2\ud835\uddd7\ud835\ude02\ud835\uddfa\ud835\uddfd\u2014LSASS memory dumper in pure Rust, using \ud835\uddfc\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\udde1\ud835\udde7 \ud835\uddd4\ud835\udde3\ud835\udddc\ud835\ude00, creating a \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddfa\ud835\uddee\ud835\uddf9 \ud835\uddfa\ud835\uddf6\ud835\uddfb\ud835\uddf6\ud835\uddf1\ud835\ude02\ud835\uddfa\ud835\uddfd from scratch, with no std, no CRT, and just \ud835\udfed\ud835\udff4\ud835\uddde\ud835\uddd5! \n\nhttps://github.com/safedv/RustiveDumph\n\nRustRedOps : a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team (with a specific focus on the Rust programming language)\n\nhttps://github.com/joaoviictorti/RustRedOps \n\nHacking Windows through iTunes\u200a - Local Privilege Escalation 0-day \n\nhttps://github.com/mbog14/CVE-2024-44193\n\nStuxnet extracted binaries by reversing &amp;amp; Stuxnet Rootkit Analysis \n\nhttps://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit\n\nA Powerful web scraper powered by LLM | OpenAI, Gemini &amp;amp; Ollama \n\nhttps://github.com/itsOwen/CyberScraper-2077\n\nZaps arguments and environment from the process list \n\nhttps://github.com/hackerschoice/zapper?tab=readme-ov-file\n\nReverse Engineering the AM335x Boot ROM\n\nhttps://github.com/sjgallagher2/am335xbootrom", "creation_timestamp": "2024-10-25T04:26:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4325d26b-136f-4e7e-9302-84ed3a507fe4/export</guid>
      <pubDate>Fri, 25 Oct 2024 04:26:57 +0000</pubDate>
    </item>
    <item>
      <title>7e347e7d-4593-4195-95f1-d2e15ea86084</title>
      <link>https://vulnerability.circl.lu/sighting/7e347e7d-4593-4195-95f1-d2e15ea86084/export</link>
      <description>{"uuid": "7e347e7d-4593-4195-95f1-d2e15ea86084", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3873", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:33:05.000000Z"}</description>
      <content:encoded>{"uuid": "7e347e7d-4593-4195-95f1-d2e15ea86084", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3873", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:33:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7e347e7d-4593-4195-95f1-d2e15ea86084/export</guid>
      <pubDate>Mon, 04 Nov 2024 03:33:05 +0000</pubDate>
    </item>
    <item>
      <title>71692a84-3f14-451d-bd85-a23500c70236</title>
      <link>https://vulnerability.circl.lu/sighting/71692a84-3f14-451d-bd85-a23500c70236/export</link>
      <description>{"uuid": "71692a84-3f14-451d-bd85-a23500c70236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1172", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:33:05.000000Z"}</description>
      <content:encoded>{"uuid": "71692a84-3f14-451d-bd85-a23500c70236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1172", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:33:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/71692a84-3f14-451d-bd85-a23500c70236/export</guid>
      <pubDate>Mon, 04 Nov 2024 03:33:05 +0000</pubDate>
    </item>
    <item>
      <title>d553cc6f-6711-4e66-b1f8-c86d7428b5a0</title>
      <link>https://vulnerability.circl.lu/sighting/d553cc6f-6711-4e66-b1f8-c86d7428b5a0/export</link>
      <description>{"uuid": "d553cc6f-6711-4e66-b1f8-c86d7428b5a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7604", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:04.000000Z"}</description>
      <content:encoded>{"uuid": "d553cc6f-6711-4e66-b1f8-c86d7428b5a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7604", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d553cc6f-6711-4e66-b1f8-c86d7428b5a0/export</guid>
      <pubDate>Mon, 04 Nov 2024 03:37:04 +0000</pubDate>
    </item>
    <item>
      <title>1a42841d-9097-48b5-b173-34a3cdb50f55</title>
      <link>https://vulnerability.circl.lu/sighting/1a42841d-9097-48b5-b173-34a3cdb50f55/export</link>
      <description>{"uuid": "1a42841d-9097-48b5-b173-34a3cdb50f55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8979", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:04.000000Z"}</description>
      <content:encoded>{"uuid": "1a42841d-9097-48b5-b173-34a3cdb50f55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8979", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1a42841d-9097-48b5-b173-34a3cdb50f55/export</guid>
      <pubDate>Mon, 04 Nov 2024 03:37:04 +0000</pubDate>
    </item>
    <item>
      <title>f560e872-40ba-4339-aa4c-28353ab0bb76</title>
      <link>https://vulnerability.circl.lu/sighting/f560e872-40ba-4339-aa4c-28353ab0bb76/export</link>
      <description>{"uuid": "f560e872-40ba-4339-aa4c-28353ab0bb76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24289", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:09.000000Z"}</description>
      <content:encoded>{"uuid": "f560e872-40ba-4339-aa4c-28353ab0bb76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24289", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f560e872-40ba-4339-aa4c-28353ab0bb76/export</guid>
      <pubDate>Mon, 04 Nov 2024 03:37:09 +0000</pubDate>
    </item>
    <item>
      <title>b98ecb71-50a8-4049-b929-df7cbce3af84</title>
      <link>https://vulnerability.circl.lu/sighting/b98ecb71-50a8-4049-b929-df7cbce3af84/export</link>
      <description>{"uuid": "b98ecb71-50a8-4049-b929-df7cbce3af84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/636", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:09.000000Z"}</description>
      <content:encoded>{"uuid": "b98ecb71-50a8-4049-b929-df7cbce3af84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/636", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b98ecb71-50a8-4049-b929-df7cbce3af84/export</guid>
      <pubDate>Mon, 04 Nov 2024 03:37:09 +0000</pubDate>
    </item>
    <item>
      <title>c74b3ce1-de76-49d1-9241-c6715216657f</title>
      <link>https://vulnerability.circl.lu/sighting/c74b3ce1-de76-49d1-9241-c6715216657f/export</link>
      <description>{"uuid": "c74b3ce1-de76-49d1-9241-c6715216657f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://t.me/S_E_Reborn/5335", "content": "\u0412\u0441\u0435\u043c \u043f\u0440\u0438\u0432\u0435\u0442! \n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows, \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u0433\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0442 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432: \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441\u043b\u0435\u0436\u0435\u043d\u0438\u044f, \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0438\u0433\u0440\u0443\u0448\u043a\u0438. \u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u0432\u043e\u0435\u043c \u043e\u043d\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u0440\u0430\u0431\u043e\u0442\u0430\u044f \u043e\u0442 \u043b\u0438\u0446\u0430 NT AUTHORITY\\SYSTEM. \n\n\u041f\u0440\u0438\u0447\u0435\u043c, \u043a\u0430\u043a \u044f \u043f\u043e\u043d\u0438\u043c\u0430\u044e, \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0444\u0438\u0440\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u041f\u041e, \u0447\u0442\u043e \u0443\u0441\u043b\u043e\u0436\u043d\u044f\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0434\u0430\u0435\u0442 \u043d\u0430\u043c \u0435\u0449\u0435 \u043e\u0434\u0438\u043d \u0432\u0435\u043a\u0442\u043e\u0440 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \n\n\u0415\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0441\u0431\u043e\u0440\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u041f\u041e \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435:\n# \u0418\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 \u0438\u0437 \u0440\u0435\u0435\u0441\u0442\u0440\u0430\nGet-ChildItem \"HKLM:\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" | Get-ItemProperty | Where-Object {$_.DisplayName -ne $null} | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate\n\n# wmi\nwmic product get name,version,vendor  \n\n# Seatbelt\n.\\SeatBelt.exe InstalledProducts\n\n\u0425\u043e\u0447\u0443 \u043f\u043e\u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u0441 \u0432\u0430\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c \u0441\u043f\u0438\u0441\u043e\u0447\u043a\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u043b\u0443\u0436\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u0432\u0437\u044f\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u0430\u0447\u043a\u0435. \u041e\u0434\u043d\u043e\u0437\u043d\u0430\u0447\u043d\u043e \u043d\u0443\u0436\u043d\u043e \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 Exploit-Street, \u043d\u043e \u044f \u0447\u0442\u043e-\u0442\u043e \u043d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0440\u0438\u0434\u0443\u043c\u0430\u0442\u044c \u043a\u0430\u043a. \u041c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0438\u0434\u0435\u0438?\n\nManageEngine ServiceDesk\n- https://github.com/horizon3ai/CVE-2021-44077\n\nManageEngine ADSelfService\n- https://github.com/synacktiv/CVE-2021-40539\n- CVE-2022-47966\n- CVE-XXXX-XXXX (\u0441 \u0432\u0435\u0440\u0441\u0438\u0438 ADSelfService Plus 4.2.9, 2012 \u0438 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.3 Build 6301)\n\nUserManager\n- CVE-2023-36047\n\nITunes\n- CVE-2024-44193\n\nRazer ( \u0434\u043e 3.7.1209.121307)\n- RazerEoP\n\nDatacard XPS Card Printer Driver \n- CVE-2024-34329\n\nAppGate\n- CVE-2019-19793\n\nSeagate\n- CVE-2022-40286\n\nAWS VPN Client\n- CVE-2022-25165\n\nAIDA (\u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438 \u043d\u0438\u0436\u0435 7.00.6742)\n- AIDA64DRIVER-EOP\n\nVboxSDS\n- CVE-2024-21111\n\nTeamViewer\n- CVE-2024-7479 CVE-2024-7481\n\nGamingService \u043e\u0442 XBOX\n- GamingServiceEoP\n- GamingServiceEoP5\n\nChrome Updater\n- CVE-2023-7261\n\nPlantronics Desktop Hub\n- CVE-2024-27460", "creation_timestamp": "2024-12-26T13:38:29.000000Z"}</description>
      <content:encoded>{"uuid": "c74b3ce1-de76-49d1-9241-c6715216657f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://t.me/S_E_Reborn/5335", "content": "\u0412\u0441\u0435\u043c \u043f\u0440\u0438\u0432\u0435\u0442! \n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 Windows, \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u0433\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0442 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432: \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441\u043b\u0435\u0436\u0435\u043d\u0438\u044f, \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0438\u0433\u0440\u0443\u0448\u043a\u0438. \u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u0432\u043e\u0435\u043c \u043e\u043d\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c, \u0440\u0430\u0431\u043e\u0442\u0430\u044f \u043e\u0442 \u043b\u0438\u0446\u0430 NT AUTHORITY\\SYSTEM. \n\n\u041f\u0440\u0438\u0447\u0435\u043c, \u043a\u0430\u043a \u044f \u043f\u043e\u043d\u0438\u043c\u0430\u044e, \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u0430\u043c\u043e\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0444\u0438\u0440\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u041f\u041e, \u0447\u0442\u043e \u0443\u0441\u043b\u043e\u0436\u043d\u044f\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0434\u0430\u0435\u0442 \u043d\u0430\u043c \u0435\u0449\u0435 \u043e\u0434\u0438\u043d \u0432\u0435\u043a\u0442\u043e\u0440 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \n\n\u0415\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0441\u0431\u043e\u0440\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u041f\u041e \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435:\n# \u0418\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 \u0438\u0437 \u0440\u0435\u0435\u0441\u0442\u0440\u0430\nGet-ChildItem \"HKLM:\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" | Get-ItemProperty | Where-Object {$_.DisplayName -ne $null} | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate\n\n# wmi\nwmic product get name,version,vendor  \n\n# Seatbelt\n.\\SeatBelt.exe InstalledProducts\n\n\u0425\u043e\u0447\u0443 \u043f\u043e\u0434\u0435\u043b\u0438\u0442\u044c\u0441\u044f \u0441 \u0432\u0430\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c \u0441\u043f\u0438\u0441\u043e\u0447\u043a\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u043b\u0443\u0436\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u0432\u0437\u044f\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u0430\u0447\u043a\u0435. \u041e\u0434\u043d\u043e\u0437\u043d\u0430\u0447\u043d\u043e \u043d\u0443\u0436\u043d\u043e \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 Exploit-Street, \u043d\u043e \u044f \u0447\u0442\u043e-\u0442\u043e \u043d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0440\u0438\u0434\u0443\u043c\u0430\u0442\u044c \u043a\u0430\u043a. \u041c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0438\u0434\u0435\u0438?\n\nManageEngine ServiceDesk\n- https://github.com/horizon3ai/CVE-2021-44077\n\nManageEngine ADSelfService\n- https://github.com/synacktiv/CVE-2021-40539\n- CVE-2022-47966\n- CVE-XXXX-XXXX (\u0441 \u0432\u0435\u0440\u0441\u0438\u0438 ADSelfService Plus 4.2.9, 2012 \u0438 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 6.3 Build 6301)\n\nUserManager\n- CVE-2023-36047\n\nITunes\n- CVE-2024-44193\n\nRazer ( \u0434\u043e 3.7.1209.121307)\n- RazerEoP\n\nDatacard XPS Card Printer Driver \n- CVE-2024-34329\n\nAppGate\n- CVE-2019-19793\n\nSeagate\n- CVE-2022-40286\n\nAWS VPN Client\n- CVE-2022-25165\n\nAIDA (\u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438 \u043d\u0438\u0436\u0435 7.00.6742)\n- AIDA64DRIVER-EOP\n\nVboxSDS\n- CVE-2024-21111\n\nTeamViewer\n- CVE-2024-7479 CVE-2024-7481\n\nGamingService \u043e\u0442 XBOX\n- GamingServiceEoP\n- GamingServiceEoP5\n\nChrome Updater\n- CVE-2023-7261\n\nPlantronics Desktop Hub\n- CVE-2024-27460", "creation_timestamp": "2024-12-26T13:38:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c74b3ce1-de76-49d1-9241-c6715216657f/export</guid>
      <pubDate>Thu, 26 Dec 2024 13:38:29 +0000</pubDate>
    </item>
    <item>
      <title>5fe96c62-9ee3-497b-ae24-87a203b5616e</title>
      <link>https://vulnerability.circl.lu/sighting/5fe96c62-9ee3-497b-ae24-87a203b5616e/export</link>
      <description>{"uuid": "5fe96c62-9ee3-497b-ae24-87a203b5616e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miltud3din2f", "content": "", "creation_timestamp": "2026-04-03T13:40:09.436657Z"}</description>
      <content:encoded>{"uuid": "5fe96c62-9ee3-497b-ae24-87a203b5616e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44193", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3miltud3din2f", "content": "", "creation_timestamp": "2026-04-03T13:40:09.436657Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5fe96c62-9ee3-497b-ae24-87a203b5616e/export</guid>
      <pubDate>Fri, 03 Apr 2026 13:40:09 +0000</pubDate>
    </item>
  </channel>
</rss>
