<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 05:37:44 +0000</lastBuildDate>
    <item>
      <title>743a5018-ea02-4df1-9c2b-018ec732036a</title>
      <link>https://db.gcve.eu/sighting/743a5018-ea02-4df1-9c2b-018ec732036a/export</link>
      <description>{"uuid": "743a5018-ea02-4df1-9c2b-018ec732036a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2269", "content": "https://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nExploit for CVE-2024-9570\n#github #exploit", "creation_timestamp": "2024-10-11T18:10:07.000000Z"}</description>
      <content:encoded>{"uuid": "743a5018-ea02-4df1-9c2b-018ec732036a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2269", "content": "https://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nExploit for CVE-2024-9570\n#github #exploit", "creation_timestamp": "2024-10-11T18:10:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/743a5018-ea02-4df1-9c2b-018ec732036a/export</guid>
      <pubDate>Fri, 11 Oct 2024 18:10:07 +0000</pubDate>
    </item>
    <item>
      <title>6ffd2c59-b5d1-47fb-851c-269a2fa11ec8</title>
      <link>https://db.gcve.eu/sighting/6ffd2c59-b5d1-47fb-851c-269a2fa11ec8/export</link>
      <description>{"uuid": "6ffd2c59-b5d1-47fb-851c-269a2fa11ec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3309", "content": "https://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nExploit for CVE-2024-9570\n#github #exploit", "creation_timestamp": "2024-10-12T09:49:24.000000Z"}</description>
      <content:encoded>{"uuid": "6ffd2c59-b5d1-47fb-851c-269a2fa11ec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3309", "content": "https://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nExploit for CVE-2024-9570\n#github #exploit", "creation_timestamp": "2024-10-12T09:49:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6ffd2c59-b5d1-47fb-851c-269a2fa11ec8/export</guid>
      <pubDate>Sat, 12 Oct 2024 09:49:24 +0000</pubDate>
    </item>
    <item>
      <title>2c4399d0-641a-4361-840f-57afdaee6bae</title>
      <link>https://db.gcve.eu/sighting/2c4399d0-641a-4361-840f-57afdaee6bae/export</link>
      <description>{"uuid": "2c4399d0-641a-4361-840f-57afdaee6bae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "Telegram/Xm3lUY4PBcALvW_rbeUR9-YkKgj4C7jouamnnWDUhYzqHoxb", "content": "", "creation_timestamp": "2024-10-13T05:09:50.000000Z"}</description>
      <content:encoded>{"uuid": "2c4399d0-641a-4361-840f-57afdaee6bae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "Telegram/Xm3lUY4PBcALvW_rbeUR9-YkKgj4C7jouamnnWDUhYzqHoxb", "content": "", "creation_timestamp": "2024-10-13T05:09:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2c4399d0-641a-4361-840f-57afdaee6bae/export</guid>
      <pubDate>Sun, 13 Oct 2024 05:09:50 +0000</pubDate>
    </item>
    <item>
      <title>911fa210-5d5d-4ce2-94df-4afb959ff0c9</title>
      <link>https://db.gcve.eu/sighting/911fa210-5d5d-4ce2-94df-4afb959ff0c9/export</link>
      <description>{"uuid": "911fa210-5d5d-4ce2-94df-4afb959ff0c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "Telegram/FdOsM6pHj80Byb29h9Pdq_8_oSqAtRMNzb7HDAsARtESIA", "content": "", "creation_timestamp": "2024-10-15T05:09:08.000000Z"}</description>
      <content:encoded>{"uuid": "911fa210-5d5d-4ce2-94df-4afb959ff0c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "Telegram/FdOsM6pHj80Byb29h9Pdq_8_oSqAtRMNzb7HDAsARtESIA", "content": "", "creation_timestamp": "2024-10-15T05:09:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/911fa210-5d5d-4ce2-94df-4afb959ff0c9/export</guid>
      <pubDate>Tue, 15 Oct 2024 05:09:08 +0000</pubDate>
    </item>
    <item>
      <title>c18f34b3-5686-4474-ad99-653f66954ac9</title>
      <link>https://db.gcve.eu/sighting/c18f34b3-5686-4474-ad99-653f66954ac9/export</link>
      <description>{"uuid": "c18f34b3-5686-4474-ad99-653f66954ac9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3807", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.\u00a0 \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T04:34:04.000000Z"}</description>
      <content:encoded>{"uuid": "c18f34b3-5686-4474-ad99-653f66954ac9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3807", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.\u00a0 \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T04:34:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/c18f34b3-5686-4474-ad99-653f66954ac9/export</guid>
      <pubDate>Thu, 24 Oct 2024 04:34:04 +0000</pubDate>
    </item>
    <item>
      <title>9a7640d9-6f8e-409b-877b-2a88ade9da5d</title>
      <link>https://db.gcve.eu/sighting/9a7640d9-6f8e-409b-877b-2a88ade9da5d/export</link>
      <description>{"uuid": "9a7640d9-6f8e-409b-877b-2a88ade9da5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1086", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T04:34:04.000000Z"}</description>
      <content:encoded>{"uuid": "9a7640d9-6f8e-409b-877b-2a88ade9da5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1086", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T04:34:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9a7640d9-6f8e-409b-877b-2a88ade9da5d/export</guid>
      <pubDate>Thu, 24 Oct 2024 04:34:04 +0000</pubDate>
    </item>
    <item>
      <title>6ba9fb75-68a7-4a79-8a6f-d0c6879724e0</title>
      <link>https://db.gcve.eu/sighting/6ba9fb75-68a7-4a79-8a6f-d0c6879724e0/export</link>
      <description>{"uuid": "6ba9fb75-68a7-4a79-8a6f-d0c6879724e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7528", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:06.000000Z"}</description>
      <content:encoded>{"uuid": "6ba9fb75-68a7-4a79-8a6f-d0c6879724e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7528", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6ba9fb75-68a7-4a79-8a6f-d0c6879724e0/export</guid>
      <pubDate>Thu, 24 Oct 2024 05:38:06 +0000</pubDate>
    </item>
    <item>
      <title>4ab3d6d8-9ac8-41f8-a17c-66a501e19520</title>
      <link>https://db.gcve.eu/sighting/4ab3d6d8-9ac8-41f8-a17c-66a501e19520/export</link>
      <description>{"uuid": "4ab3d6d8-9ac8-41f8-a17c-66a501e19520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8900", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:06.000000Z"}</description>
      <content:encoded>{"uuid": "4ab3d6d8-9ac8-41f8-a17c-66a501e19520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8900", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4ab3d6d8-9ac8-41f8-a17c-66a501e19520/export</guid>
      <pubDate>Thu, 24 Oct 2024 05:38:06 +0000</pubDate>
    </item>
    <item>
      <title>66781ac2-1aa7-4410-b11e-a8af638f56e9</title>
      <link>https://db.gcve.eu/sighting/66781ac2-1aa7-4410-b11e-a8af638f56e9/export</link>
      <description>{"uuid": "66781ac2-1aa7-4410-b11e-a8af638f56e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24165", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:11.000000Z"}</description>
      <content:encoded>{"uuid": "66781ac2-1aa7-4410-b11e-a8af638f56e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24165", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/66781ac2-1aa7-4410-b11e-a8af638f56e9/export</guid>
      <pubDate>Thu, 24 Oct 2024 05:38:11 +0000</pubDate>
    </item>
    <item>
      <title>887c75f8-2f6a-495d-be68-c4a37cb3b94e</title>
      <link>https://db.gcve.eu/sighting/887c75f8-2f6a-495d-be68-c4a37cb3b94e/export</link>
      <description>{"uuid": "887c75f8-2f6a-495d-be68-c4a37cb3b94e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/551", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:11.000000Z"}</description>
      <content:encoded>{"uuid": "887c75f8-2f6a-495d-be68-c4a37cb3b94e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/551", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/887c75f8-2f6a-495d-be68-c4a37cb3b94e/export</guid>
      <pubDate>Thu, 24 Oct 2024 05:38:11 +0000</pubDate>
    </item>
  </channel>
</rss>
