<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 07:27:25 +0000</lastBuildDate>
    <item>
      <title>f065a57c-29ab-4747-8899-cd1d5229c3e1</title>
      <link>https://db.gcve.eu/sighting/f065a57c-29ab-4747-8899-cd1d5229c3e1/export</link>
      <description>{"uuid": "f065a57c-29ab-4747-8899-cd1d5229c3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8723", "content": "#exploit\n1. CVE-2021-44736:\nEmbedded web server command injection vulnerability in Lexmark devices\nhttps://github.com/defensor/CVE-2021-44735\n\n2. CVE-2021-44736:\nLexmark devices - unauthenticated access\nhttps://github.com/defensor/CVE-2021-44736", "creation_timestamp": "2023-07-24T10:59:01.000000Z"}</description>
      <content:encoded>{"uuid": "f065a57c-29ab-4747-8899-cd1d5229c3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8723", "content": "#exploit\n1. CVE-2021-44736:\nEmbedded web server command injection vulnerability in Lexmark devices\nhttps://github.com/defensor/CVE-2021-44735\n\n2. CVE-2021-44736:\nLexmark devices - unauthenticated access\nhttps://github.com/defensor/CVE-2021-44736", "creation_timestamp": "2023-07-24T10:59:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f065a57c-29ab-4747-8899-cd1d5229c3e1/export</guid>
      <pubDate>Mon, 24 Jul 2023 10:59:01 +0000</pubDate>
    </item>
    <item>
      <title>414366f0-477a-4689-b7e3-6a55f87796f3</title>
      <link>https://db.gcve.eu/sighting/414366f0-477a-4689-b7e3-6a55f87796f3/export</link>
      <description>{"uuid": "414366f0-477a-4689-b7e3-6a55f87796f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44735", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8723", "content": "#exploit\n1. CVE-2021-44736:\nEmbedded web server command injection vulnerability in Lexmark devices\nhttps://github.com/defensor/CVE-2021-44735\n\n2. CVE-2021-44736:\nLexmark devices - unauthenticated access\nhttps://github.com/defensor/CVE-2021-44736", "creation_timestamp": "2023-07-24T10:59:01.000000Z"}</description>
      <content:encoded>{"uuid": "414366f0-477a-4689-b7e3-6a55f87796f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44735", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8723", "content": "#exploit\n1. CVE-2021-44736:\nEmbedded web server command injection vulnerability in Lexmark devices\nhttps://github.com/defensor/CVE-2021-44735\n\n2. CVE-2021-44736:\nLexmark devices - unauthenticated access\nhttps://github.com/defensor/CVE-2021-44736", "creation_timestamp": "2023-07-24T10:59:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/414366f0-477a-4689-b7e3-6a55f87796f3/export</guid>
      <pubDate>Mon, 24 Jul 2023 10:59:01 +0000</pubDate>
    </item>
    <item>
      <title>7ba7428c-2ebf-4f75-ba17-109ac652fa7b</title>
      <link>https://db.gcve.eu/sighting/7ba7428c-2ebf-4f75-ba17-109ac652fa7b/export</link>
      <description>{"uuid": "7ba7428c-2ebf-4f75-ba17-109ac652fa7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3128", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bRICC \n\nRobust Collective Classification of Sybil Accounts\n\nhttps://github.com/WSP-LAB/RICC\n\n#cybersecurity #infosec\n\n\u200b\u200bopen-appsec \n\nA machine learning security engine that preemptively and automatically prevents threats against Web Application &amp;amp; APIs. This repo include the main code and logic.\n\nhttps://github.com/openappsec/openappsec\n\n#cybersecurity #infosec\n\n\u200b\u200bcypherhound\n\nPython3 terminal application that contains 270+ Neo4j cyphers for BloodHound data sets and 254 GUI cyphers.\n\nhttps://github.com/fin3ss3g0d/cypherhound\n\n#infosec #pentesting #redteam\n\n\u200b\u200bProxy-checker\n\nProxyChecker Made in NodeJS\n\nhttps://github.com/rawbypa/proxychecker\n\n#infosec #privacy\n\n\u200b\u200bCVE-2021-44736\n\nEmbedded web server command injection vulnerability in Lexmark devices.\n\nhttps://github.com/defensor/CVE-2021-44735\n\n#cve #poc #cybersecurity #infosec\n\n\u200b\u200boutlook_email_auth_bypass\n\nIn Outlook desktop and web app , \"display name\" of email's \"From\" header can manipulate the from email which is displayed to the user, that can result in more convincing phish emails.\n\nhttps://gitlab.com/email_bug/outlook_email_auth_bypass\n\n#infosec #pentesting #redteam\n\n\u200b\u200bnetspionage\n\nNetwork Analysis CLI framework that performs Network Scanning, #OSINT, and Attack Detection.\n\nhttps://github.com/ANG13T/netspionage\n\n#infosec #pentesting #cybersecurity\n\n\u200b\u200bCVE-2023-20126\n\nCisco SPA112 2-Port Phone Adapters RCE.\n\nhttps://github.com/fullspectrumdev/RancidCrisco\n\n#cve #infosec #pentesting\n\n\u200b\u200bDCOM DLL Hijacking\n\nWe recently discovered the following DCOM classes that are subject to DLL hijacking. If an attacker can write to the associated path, they can move laterally by instantiating the COM object. Some classes have additional DLL hijacking opportunities that are not listed here.\n\nhttps://github.com/WKL-Sec/dcomhijack\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-27T07:27:15.000000Z"}</description>
      <content:encoded>{"uuid": "7ba7428c-2ebf-4f75-ba17-109ac652fa7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3128", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bRICC \n\nRobust Collective Classification of Sybil Accounts\n\nhttps://github.com/WSP-LAB/RICC\n\n#cybersecurity #infosec\n\n\u200b\u200bopen-appsec \n\nA machine learning security engine that preemptively and automatically prevents threats against Web Application &amp;amp; APIs. This repo include the main code and logic.\n\nhttps://github.com/openappsec/openappsec\n\n#cybersecurity #infosec\n\n\u200b\u200bcypherhound\n\nPython3 terminal application that contains 270+ Neo4j cyphers for BloodHound data sets and 254 GUI cyphers.\n\nhttps://github.com/fin3ss3g0d/cypherhound\n\n#infosec #pentesting #redteam\n\n\u200b\u200bProxy-checker\n\nProxyChecker Made in NodeJS\n\nhttps://github.com/rawbypa/proxychecker\n\n#infosec #privacy\n\n\u200b\u200bCVE-2021-44736\n\nEmbedded web server command injection vulnerability in Lexmark devices.\n\nhttps://github.com/defensor/CVE-2021-44735\n\n#cve #poc #cybersecurity #infosec\n\n\u200b\u200boutlook_email_auth_bypass\n\nIn Outlook desktop and web app , \"display name\" of email's \"From\" header can manipulate the from email which is displayed to the user, that can result in more convincing phish emails.\n\nhttps://gitlab.com/email_bug/outlook_email_auth_bypass\n\n#infosec #pentesting #redteam\n\n\u200b\u200bnetspionage\n\nNetwork Analysis CLI framework that performs Network Scanning, #OSINT, and Attack Detection.\n\nhttps://github.com/ANG13T/netspionage\n\n#infosec #pentesting #cybersecurity\n\n\u200b\u200bCVE-2023-20126\n\nCisco SPA112 2-Port Phone Adapters RCE.\n\nhttps://github.com/fullspectrumdev/RancidCrisco\n\n#cve #infosec #pentesting\n\n\u200b\u200bDCOM DLL Hijacking\n\nWe recently discovered the following DCOM classes that are subject to DLL hijacking. If an attacker can write to the associated path, they can move laterally by instantiating the COM object. Some classes have additional DLL hijacking opportunities that are not listed here.\n\nhttps://github.com/WKL-Sec/dcomhijack\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-27T07:27:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7ba7428c-2ebf-4f75-ba17-109ac652fa7b/export</guid>
      <pubDate>Thu, 27 Jul 2023 07:27:15 +0000</pubDate>
    </item>
    <item>
      <title>2ff7420d-ef92-42ac-b47e-530c9a1785d4</title>
      <link>https://db.gcve.eu/sighting/2ff7420d-ef92-42ac-b47e-530c9a1785d4/export</link>
      <description>{"uuid": "2ff7420d-ef92-42ac-b47e-530c9a1785d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44735", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3128", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bRICC \n\nRobust Collective Classification of Sybil Accounts\n\nhttps://github.com/WSP-LAB/RICC\n\n#cybersecurity #infosec\n\n\u200b\u200bopen-appsec \n\nA machine learning security engine that preemptively and automatically prevents threats against Web Application &amp;amp; APIs. This repo include the main code and logic.\n\nhttps://github.com/openappsec/openappsec\n\n#cybersecurity #infosec\n\n\u200b\u200bcypherhound\n\nPython3 terminal application that contains 270+ Neo4j cyphers for BloodHound data sets and 254 GUI cyphers.\n\nhttps://github.com/fin3ss3g0d/cypherhound\n\n#infosec #pentesting #redteam\n\n\u200b\u200bProxy-checker\n\nProxyChecker Made in NodeJS\n\nhttps://github.com/rawbypa/proxychecker\n\n#infosec #privacy\n\n\u200b\u200bCVE-2021-44736\n\nEmbedded web server command injection vulnerability in Lexmark devices.\n\nhttps://github.com/defensor/CVE-2021-44735\n\n#cve #poc #cybersecurity #infosec\n\n\u200b\u200boutlook_email_auth_bypass\n\nIn Outlook desktop and web app , \"display name\" of email's \"From\" header can manipulate the from email which is displayed to the user, that can result in more convincing phish emails.\n\nhttps://gitlab.com/email_bug/outlook_email_auth_bypass\n\n#infosec #pentesting #redteam\n\n\u200b\u200bnetspionage\n\nNetwork Analysis CLI framework that performs Network Scanning, #OSINT, and Attack Detection.\n\nhttps://github.com/ANG13T/netspionage\n\n#infosec #pentesting #cybersecurity\n\n\u200b\u200bCVE-2023-20126\n\nCisco SPA112 2-Port Phone Adapters RCE.\n\nhttps://github.com/fullspectrumdev/RancidCrisco\n\n#cve #infosec #pentesting\n\n\u200b\u200bDCOM DLL Hijacking\n\nWe recently discovered the following DCOM classes that are subject to DLL hijacking. If an attacker can write to the associated path, they can move laterally by instantiating the COM object. Some classes have additional DLL hijacking opportunities that are not listed here.\n\nhttps://github.com/WKL-Sec/dcomhijack\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-27T07:27:15.000000Z"}</description>
      <content:encoded>{"uuid": "2ff7420d-ef92-42ac-b47e-530c9a1785d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44735", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3128", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bRICC \n\nRobust Collective Classification of Sybil Accounts\n\nhttps://github.com/WSP-LAB/RICC\n\n#cybersecurity #infosec\n\n\u200b\u200bopen-appsec \n\nA machine learning security engine that preemptively and automatically prevents threats against Web Application &amp;amp; APIs. This repo include the main code and logic.\n\nhttps://github.com/openappsec/openappsec\n\n#cybersecurity #infosec\n\n\u200b\u200bcypherhound\n\nPython3 terminal application that contains 270+ Neo4j cyphers for BloodHound data sets and 254 GUI cyphers.\n\nhttps://github.com/fin3ss3g0d/cypherhound\n\n#infosec #pentesting #redteam\n\n\u200b\u200bProxy-checker\n\nProxyChecker Made in NodeJS\n\nhttps://github.com/rawbypa/proxychecker\n\n#infosec #privacy\n\n\u200b\u200bCVE-2021-44736\n\nEmbedded web server command injection vulnerability in Lexmark devices.\n\nhttps://github.com/defensor/CVE-2021-44735\n\n#cve #poc #cybersecurity #infosec\n\n\u200b\u200boutlook_email_auth_bypass\n\nIn Outlook desktop and web app , \"display name\" of email's \"From\" header can manipulate the from email which is displayed to the user, that can result in more convincing phish emails.\n\nhttps://gitlab.com/email_bug/outlook_email_auth_bypass\n\n#infosec #pentesting #redteam\n\n\u200b\u200bnetspionage\n\nNetwork Analysis CLI framework that performs Network Scanning, #OSINT, and Attack Detection.\n\nhttps://github.com/ANG13T/netspionage\n\n#infosec #pentesting #cybersecurity\n\n\u200b\u200bCVE-2023-20126\n\nCisco SPA112 2-Port Phone Adapters RCE.\n\nhttps://github.com/fullspectrumdev/RancidCrisco\n\n#cve #infosec #pentesting\n\n\u200b\u200bDCOM DLL Hijacking\n\nWe recently discovered the following DCOM classes that are subject to DLL hijacking. If an attacker can write to the associated path, they can move laterally by instantiating the COM object. Some classes have additional DLL hijacking opportunities that are not listed here.\n\nhttps://github.com/WKL-Sec/dcomhijack\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-27T07:27:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2ff7420d-ef92-42ac-b47e-530c9a1785d4/export</guid>
      <pubDate>Thu, 27 Jul 2023 07:27:15 +0000</pubDate>
    </item>
    <item>
      <title>499d7eec-db36-471f-85c8-52d5f48fb859</title>
      <link>https://db.gcve.eu/sighting/499d7eec-db36-471f-85c8-52d5f48fb859/export</link>
      <description>{"uuid": "499d7eec-db36-471f-85c8-52d5f48fb859", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/772", "content": "https://github.com/defensor/CVE-2021-44736\n#github", "creation_timestamp": "2023-07-27T12:01:02.000000Z"}</description>
      <content:encoded>{"uuid": "499d7eec-db36-471f-85c8-52d5f48fb859", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44736", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/772", "content": "https://github.com/defensor/CVE-2021-44736\n#github", "creation_timestamp": "2023-07-27T12:01:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/499d7eec-db36-471f-85c8-52d5f48fb859/export</guid>
      <pubDate>Thu, 27 Jul 2023 12:01:02 +0000</pubDate>
    </item>
    <item>
      <title>8b00fa5d-88cd-4358-9974-f0da84556466</title>
      <link>https://db.gcve.eu/sighting/8b00fa5d-88cd-4358-9974-f0da84556466/export</link>
      <description>{"uuid": "8b00fa5d-88cd-4358-9974-f0da84556466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44734", "type": "published-proof-of-concept", "source": "https://t.me/cultofwire/1099", "content": "Your printer is not your printer! \u0420\u0430\u0439\u0442\u0430\u043f\u044b \u043e\u0442 Devcore \u0441 Pwn2Own \u0432 \u0434\u0432\u0443\u0445 \u0447\u0430\u0441\u0442\u044f\u0445. \n\n\u0417\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043b\u0435\u0442 \u043f\u0440\u0438\u043d\u0442\u0435\u0440 \u0441\u0442\u0430\u043b \u043e\u0434\u043d\u0438\u043c \u0438\u0437 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0439 \u0438\u043d\u0442\u0440\u0430\u0441\u0435\u0442\u0438, \u0438 \u0435\u0433\u043e \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0442\u0430\u043a\u0436\u0435 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0430\u0441\u0448\u0438\u0440\u0438\u043b\u0438\u0441\u044c. \u0414\u043b\u044f \u0443\u0434\u043e\u0431\u0441\u0442\u0432\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0435\u0447\u0430\u0442\u044c \u0438\u043b\u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0430 \u0444\u0430\u043a\u0441\u043e\u0432, \u043d\u043e \u0438 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0435 \u0441\u0435\u0440\u0432\u0438\u0441\u044b \u043f\u0435\u0447\u0430\u0442\u0438, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 AirPrint. \u041f\u0440\u044f\u043c\u0430\u044f \u043f\u0435\u0447\u0430\u0442\u044c \u0441 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0441\u0442\u0430\u043b\u0430 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u043c \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432 \u044d\u043f\u043e\u0445\u0443 IoT. \u0418\u0445 \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0435\u0433\u043e \u0434\u043b\u044f \u043f\u0435\u0447\u0430\u0442\u0438 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0445 \u0434\u0435\u043b\u043e\u0432\u044b\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u043e\u0432 \u0435\u0449\u0435 \u0431\u043e\u043b\u0435\u0435 \u0432\u0430\u0436\u043d\u044b\u043c \u0437\u0430\u043d\u044f\u0442\u0438\u0435\u043c.\n\n\u041d\u043e \u0447\u0435\u043c \u0441\u043b\u043e\u0436\u043d\u0435\u0439 \u0438 \u0443\u043c\u043d\u0435\u0439 \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u044b \u0438 \u041c\u0424\u0423, \u0442\u0435\u043c \u0431\u043e\u043b\u044c\u0448\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043e\u043d\u0438 \u043c\u043e\u0433\u0443\u0442 \u0438 \u0441\u043e\u0437\u0434\u0430\u0442\u044c.\n\n\u0412 \u043f\u0440\u0438\u0446\u0435\u043b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043f\u043e\u043f\u0430\u043b\u0438 \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u044b:\n- HP Color LaserJet Pro M479fdw\n- Lexmark MC3224i\n- Canon imageCLASS MF743Cdw\n\n\u0412 2021 \u0433\u043e\u0434\u0443 \u0440\u0435\u0431\u044f\u0442\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 RCE (CVE-2022-24673 \u0438 CVE-2022-3942) \u0432 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u0430\u0445 Canon \u0438 HP, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2021-44734) \u0432 Lexmark. \u041e\u043d\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 Canon ImageCLASS MF644Cdw, HP Color LaserJet Pro MFP M283fdw \u0438 Lexmark MC3224i \u043d\u0430 Pwn2Own Austin 2021. \n\n\u0421\u0442\u0430\u0442\u044c\u0438 \u0432 \u0438\u0445 \u0431\u043b\u043e\u0433\u0435:\n- Your printer is not your printer! - Hacking Printers at Pwn2Own Part I \n- Your printer is not your printer! - Hacking Printers at Pwn2Own Part II", "creation_timestamp": "2023-11-09T13:12:24.000000Z"}</description>
      <content:encoded>{"uuid": "8b00fa5d-88cd-4358-9974-f0da84556466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44734", "type": "published-proof-of-concept", "source": "https://t.me/cultofwire/1099", "content": "Your printer is not your printer! \u0420\u0430\u0439\u0442\u0430\u043f\u044b \u043e\u0442 Devcore \u0441 Pwn2Own \u0432 \u0434\u0432\u0443\u0445 \u0447\u0430\u0441\u0442\u044f\u0445. \n\n\u0417\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043b\u0435\u0442 \u043f\u0440\u0438\u043d\u0442\u0435\u0440 \u0441\u0442\u0430\u043b \u043e\u0434\u043d\u0438\u043c \u0438\u0437 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0439 \u0438\u043d\u0442\u0440\u0430\u0441\u0435\u0442\u0438, \u0438 \u0435\u0433\u043e \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0442\u0430\u043a\u0436\u0435 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0430\u0441\u0448\u0438\u0440\u0438\u043b\u0438\u0441\u044c. \u0414\u043b\u044f \u0443\u0434\u043e\u0431\u0441\u0442\u0432\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0435\u0447\u0430\u0442\u044c \u0438\u043b\u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0430 \u0444\u0430\u043a\u0441\u043e\u0432, \u043d\u043e \u0438 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0435 \u0441\u0435\u0440\u0432\u0438\u0441\u044b \u043f\u0435\u0447\u0430\u0442\u0438, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 AirPrint. \u041f\u0440\u044f\u043c\u0430\u044f \u043f\u0435\u0447\u0430\u0442\u044c \u0441 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0441\u0442\u0430\u043b\u0430 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u043c \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432 \u044d\u043f\u043e\u0445\u0443 IoT. \u0418\u0445 \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0435\u0433\u043e \u0434\u043b\u044f \u043f\u0435\u0447\u0430\u0442\u0438 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0445 \u0434\u0435\u043b\u043e\u0432\u044b\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u043e\u0432 \u0435\u0449\u0435 \u0431\u043e\u043b\u0435\u0435 \u0432\u0430\u0436\u043d\u044b\u043c \u0437\u0430\u043d\u044f\u0442\u0438\u0435\u043c.\n\n\u041d\u043e \u0447\u0435\u043c \u0441\u043b\u043e\u0436\u043d\u0435\u0439 \u0438 \u0443\u043c\u043d\u0435\u0439 \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u044b \u0438 \u041c\u0424\u0423, \u0442\u0435\u043c \u0431\u043e\u043b\u044c\u0448\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043e\u043d\u0438 \u043c\u043e\u0433\u0443\u0442 \u0438 \u0441\u043e\u0437\u0434\u0430\u0442\u044c.\n\n\u0412 \u043f\u0440\u0438\u0446\u0435\u043b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043f\u043e\u043f\u0430\u043b\u0438 \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u044b:\n- HP Color LaserJet Pro M479fdw\n- Lexmark MC3224i\n- Canon imageCLASS MF743Cdw\n\n\u0412 2021 \u0433\u043e\u0434\u0443 \u0440\u0435\u0431\u044f\u0442\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 RCE (CVE-2022-24673 \u0438 CVE-2022-3942) \u0432 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u0430\u0445 Canon \u0438 HP, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2021-44734) \u0432 Lexmark. \u041e\u043d\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 Canon ImageCLASS MF644Cdw, HP Color LaserJet Pro MFP M283fdw \u0438 Lexmark MC3224i \u043d\u0430 Pwn2Own Austin 2021. \n\n\u0421\u0442\u0430\u0442\u044c\u0438 \u0432 \u0438\u0445 \u0431\u043b\u043e\u0433\u0435:\n- Your printer is not your printer! - Hacking Printers at Pwn2Own Part I \n- Your printer is not your printer! - Hacking Printers at Pwn2Own Part II", "creation_timestamp": "2023-11-09T13:12:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8b00fa5d-88cd-4358-9974-f0da84556466/export</guid>
      <pubDate>Thu, 09 Nov 2023 13:12:24 +0000</pubDate>
    </item>
    <item>
      <title>54ab5b2a-257f-465d-a6a5-874f2a915f9a</title>
      <link>https://db.gcve.eu/sighting/54ab5b2a-257f-465d-a6a5-874f2a915f9a/export</link>
      <description>{"uuid": "54ab5b2a-257f-465d-a6a5-874f2a915f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-4473", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3miw5gorvxq22", "content": "", "creation_timestamp": "2026-04-07T15:58:08.132778Z"}</description>
      <content:encoded>{"uuid": "54ab5b2a-257f-465d-a6a5-874f2a915f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-4473", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3miw5gorvxq22", "content": "", "creation_timestamp": "2026-04-07T15:58:08.132778Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/54ab5b2a-257f-465d-a6a5-874f2a915f9a/export</guid>
      <pubDate>Tue, 07 Apr 2026 15:58:08 +0000</pubDate>
    </item>
    <item>
      <title>0af81a12-8e45-4eca-838a-3482eb36935c</title>
      <link>https://db.gcve.eu/sighting/0af81a12-8e45-4eca-838a-3482eb36935c/export</link>
      <description>{"uuid": "0af81a12-8e45-4eca-838a-3482eb36935c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-4473", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3miz6wtjcpe2p", "content": "", "creation_timestamp": "2026-04-08T21:03:01.369580Z"}</description>
      <content:encoded>{"uuid": "0af81a12-8e45-4eca-838a-3482eb36935c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-4473", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3miz6wtjcpe2p", "content": "", "creation_timestamp": "2026-04-08T21:03:01.369580Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0af81a12-8e45-4eca-838a-3482eb36935c/export</guid>
      <pubDate>Wed, 08 Apr 2026 21:03:01 +0000</pubDate>
    </item>
    <item>
      <title>2c7a1128-2fa3-4d11-a605-e73b8941857f</title>
      <link>https://db.gcve.eu/sighting/2c7a1128-2fa3-4d11-a605-e73b8941857f/export</link>
      <description>{"uuid": "2c7a1128-2fa3-4d11-a605-e73b8941857f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-4473", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkgkw2aszd2s", "content": "", "creation_timestamp": "2026-04-26T22:07:07.886405Z"}</description>
      <content:encoded>{"uuid": "2c7a1128-2fa3-4d11-a605-e73b8941857f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-4473", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkgkw2aszd2s", "content": "", "creation_timestamp": "2026-04-26T22:07:07.886405Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2c7a1128-2fa3-4d11-a605-e73b8941857f/export</guid>
      <pubDate>Sun, 26 Apr 2026 22:07:07 +0000</pubDate>
    </item>
    <item>
      <title>67681e14-5f73-4c5a-8875-05763270fbe1</title>
      <link>https://db.gcve.eu/sighting/67681e14-5f73-4c5a-8875-05763270fbe1/export</link>
      <description>{"uuid": "67681e14-5f73-4c5a-8875-05763270fbe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-4473", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mkgkw2wiuw2x", "content": "", "creation_timestamp": "2026-04-26T22:07:08.762051Z"}</description>
      <content:encoded>{"uuid": "67681e14-5f73-4c5a-8875-05763270fbe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-4473", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mkgkw2wiuw2x", "content": "", "creation_timestamp": "2026-04-26T22:07:08.762051Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/67681e14-5f73-4c5a-8875-05763270fbe1/export</guid>
      <pubDate>Sun, 26 Apr 2026 22:07:08 +0000</pubDate>
    </item>
  </channel>
</rss>
