<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T15:22:43.009605+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/0704c9ee-f713-4543-8c9d-35ecf67afb74/export</id>
    <title>0704c9ee-f713-4543-8c9d-35ecf67afb74</title>
    <updated>2026-05-07T15:22:43.781071+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0704c9ee-f713-4543-8c9d-35ecf67afb74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45988", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7857", "content": "#exploit\n1. CVE-2022-45988:\nStarSoftComm HP CooCare - EoP vulnerability\nhttps://github.com/happy0717/CVE-2022-45988\n\n2. ASUS ASMB8 iKVM firmware v.1.14.51 - SNMP Remote Root\nhttps://packetstormsecurity.com/files/171137/ASUS-ASMB8-iKVM-1.14.51-SNMP-Remote-Root.html\n\n3. CVE-2022-42856:\nRoot Cause Analysis of the in the wild JIT bug\nhttps://voidistaff.github.io/safari/2023/02/20/CVE-2022-42856.html", "creation_timestamp": "2023-03-03T18:11:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0704c9ee-f713-4543-8c9d-35ecf67afb74/export"/>
    <published>2023-03-03T18:11:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/992d657a-856b-439d-8962-7d0ee54bf924/export</id>
    <title>992d657a-856b-439d-8962-7d0ee54bf924</title>
    <updated>2026-05-07T15:22:43.780967+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "992d657a-856b-439d-8962-7d0ee54bf924", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45988", "type": "seen", "source": "https://t.me/cibsecurity/59386", "content": "\u203c CVE-2022-45988 \u203c\n\nstarsoftcomm CooCare 5.304 allows local attackers to escalate privileges and execute arbitrary commands via a crafted file upload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-03T18:34:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/992d657a-856b-439d-8962-7d0ee54bf924/export"/>
    <published>2023-03-03T18:34:43+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6cedebc2-0f89-4a65-b77e-9bf9d848f188/export</id>
    <title>6cedebc2-0f89-4a65-b77e-9bf9d848f188</title>
    <updated>2026-05-07T15:22:43.780839+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6cedebc2-0f89-4a65-b77e-9bf9d848f188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45988", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2380", "content": "#Tools - Hackers Factory\n\n\u200b\u200bDroppedConnection\n\nEmulates a Cisco ASA Anyconnect VPN service, accepting any credentials (and logging them) before serving VBS to the client that gets executed in the context of the user.\n\nhttps://github.com/nccgroup/DroppedConnection\n\n#redteam\n\n\u200b\u200bShinigami\n\nShinigami is an experimental tool to detect and dump malware implants that are injected via process hollowing. It works by hooking common functions like CreateProcessInternal, WriteProcessMemory, and ResumeThread.\n\nIt creates the target executable in a suspended state and injects a DLL library called \"Ichigo,\" which will hook every needed function to detect and dump the implant. The library automatically kills the process once the hollow is extracted.\n\nhttps://github.com/buzzer-re/Shinigami\n\n\u200b\u200bMalware Indicators of Compromise\n\nHere are indicators of compromise (IOCs) of our various investigations. We are doing this to help the broader security community fight malware wherever it might be.\n\n\u25ab\ufe0f .yar files are Yara rules\n\u25ab\ufe0f .rules files are Snort rules\n\u25ab\ufe0f samples.md5, samples.sha1 and samples.sha256 files are newline separated list of hexadecimal digests of malware samples\n\nhttps://github.com/eset/malware-ioc\n\n\u200b\u200bDecider \n\nA tool to help analysts map adversary behavior to the MITRE ATT&amp;amp;CK framework. Decider makes creating ATT&amp;amp;CK mappings easier to get right by walking users through the mapping process. It does so by asking a series of guided questions about adversary activity to help them arrive at the correct tactic, technique, or subtechnique. \n\nDecider has a powerful search and filter functionality that enables users to focus on the parts of ATT&amp;amp;CK that are relevant to their analysis. Decider also has a cart functionality that lets users export results to commonly used formats, such as tables and ATT&amp;amp;CK Navigator\u2122 heatmaps.\n\nhttps://github.com/cisagov/decider\n\n\u200b \u200b Awesome Bug Bounty Tools \n\nhttps://github.com/vavkamil/awesome-bugbounty-tools\n\n\u200b\u200bMubeng\n\nAn incredibly fast #proxy #checker &amp;amp; IP rotator with ease.\n\nFeatures:\n\u25ab\ufe0f Proxy IP rotator: Rotates your IP address for every specific request.\n\u25ab\ufe0f Proxy checker: Check your proxy IP which is still alive.\n\u25ab\ufe0f All HTTP/S methods are supported.\n\u25ab\ufe0f HTTP, SOCKS v4(A) &amp;amp; v5 proxy protocols apply.\n\u25ab\ufe0f All parameters &amp;amp; URIs are passed.\n\u25ab\ufe0f Easy to use: You can just run it against your proxy file, and choose the action you want!\n\u25ab\ufe0f Cross-platform: whether you are Windows, Linux, Mac, or even Raspberry Pi, you can run it very well.\n\nhttps://github.com/kitabisa/mubeng\n\n\u200b\u200bEnlightn\n\nA Laravel Tool To Boost Your App's Performance &amp;amp; Security\n\nThink of Enlightn as your performance and security consultant. Enlightn will \"review\" your code and server configurations, and give you actionable recommendations on improving performance, security and reliability!\n\nThe Enlightn OSS (open source software) version has 64 automated checks that scan your application code, web server configurations and routes to identify performance bottlenecks, possible security vulnerabilities and code reliability issues.\n\nhttps://github.com/enlightn/enlightn\n\n\u200b\u200bTimeroast and Trustroast scripts\n\nPython scripts accompanying the whitepaper Timeroasting, trustroasting and computer spraying: taking advantage of weak computer and trust account passwords in Active Directory. These support the timeroasting and trustroasting attack techniques by discovering weak computer or trust passwords within an Active Directory domain.\n\nhttps://github.com/SecuraBV/Timeroast\n\n\u200b\u200buser js\n\nFirefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening.\n\nhttps://github.com/arkenfox/user.js\n\n\u200b\u200bCVE-2022-45988\n\nStarSoftComm HP CooCare An elevation of privilege vulnerability exists.\n\nhttps://github.com/happy0717/CVE-2022-45988\n\n\u200b\u200bFav-up\n\nLookups for real IP starting from the favicon icon and using #Shodan.\n\nhttps://github.com/pielco11/fav-up\n\n\u200b\u200bllm-security\n\nNew ways of breaking app-integrated LLMs.\n\nhttps://github.com/greshake/llm-security\n\nDetails:\nhttps://greshake.github.io/\n\n\n1/2", "creation_timestamp": "2023-03-05T09:31:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6cedebc2-0f89-4a65-b77e-9bf9d848f188/export"/>
    <published>2023-03-05T09:31:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/54db4337-abca-4a3a-8695-fb646c4c1f05/export</id>
    <title>54db4337-abca-4a3a-8695-fb646c4c1f05</title>
    <updated>2026-05-07T15:22:43.780710+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "54db4337-abca-4a3a-8695-fb646c4c1f05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45988", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6847", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45988\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: starsoftcomm CooCare 5.304 allows local attackers to escalate privileges and execute arbitrary commands via a crafted file upload.\n\ud83d\udccf Published: 2023-03-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-07T16:27:19.494Z\n\ud83d\udd17 References:\n1. https://github.com/happy0717/StarSoftComm_HP_CooCare_An_elevation_of_privilege_vulnerability_exists/edit/main/README.md\n2. https://github.com/happy0717/CVE-2022-45988", "creation_timestamp": "2025-03-07T16:35:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/54db4337-abca-4a3a-8695-fb646c4c1f05/export"/>
    <published>2025-03-07T16:35:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ad11cf3b-5665-4965-8879-88c6a8f3e553/export</id>
    <title>ad11cf3b-5665-4965-8879-88c6a8f3e553</title>
    <updated>2026-05-07T15:22:43.775651+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ad11cf3b-5665-4965-8879-88c6a8f3e553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45988", "type": "seen", "source": "Telegram/2TGpga7gzIbY-j_t4YhsUf6Xj79tUD1CEE_OKq_zR5GEFI47", "content": "", "creation_timestamp": "2025-03-08T04:35:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ad11cf3b-5665-4965-8879-88c6a8f3e553/export"/>
    <published>2025-03-08T04:35:51+00:00</published>
  </entry>
</feed>
