<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T11:31:34.147236+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5fa5f83c-4b20-4935-adb9-c6a356f043bf/export</id>
    <title>5fa5f83c-4b20-4935-adb9-c6a356f043bf</title>
    <updated>2026-05-06T11:31:34.376236+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5fa5f83c-4b20-4935-adb9-c6a356f043bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "exploited", "source": "https://t.me/true_secator/5960", "content": "\u0421\u043b\u0435\u0434\u0443\u044f \u0432\u044b\u0448\u0435\u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u043c \u0443\u043c\u043e\u0437\u0430\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f\u043c \u0413\u0440\u0438\u0431\u043e\u0432, \u041f\u043e\u0437\u0438\u0442\u0438\u0432\u044b \u043f\u0440\u043e\u0448\u0435\u0440\u0441\u0442\u0438\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0438\u0437 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0432\u0435\u043d\u0434\u043e\u0440\u043e\u0432, \u0441\u043e\u0446\u0441\u0435\u0442\u0435\u0439, \u0431\u043b\u043e\u0433\u043e\u0432, \u0422\u0413-\u043a\u0430\u043d\u0430\u043b\u043e\u0432, \u0431\u0430\u0437 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0445 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0435\u0432 \u043a\u043e\u0434\u0430, \u0432\u044b\u0434\u0435\u043b\u0438\u0432 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u044e\u043d\u044f.\n\n\u041f\u043e \u0441\u0443\u0442\u0438 \u044d\u0442\u043e \u0441\u0430\u043c\u044b\u0435 \u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043b\u0438\u0431\u043e \u0443\u0436\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e, \u043b\u0438\u0431\u043e \u043c\u043e\u0433\u0443\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0435\u0435 \u0432\u0440\u0435\u043c\u044f.\n\n\u0412 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 \u0442\u0430\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u2014 \u0434\u0435\u0432\u044f\u0442\u044c:\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Microsoft Windows, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439: \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 CSC (CVE-2024-26229), \u0441\u043b\u0443\u0436\u0431\u0435 Error Reporting (CVE-2024-26169) \u0438 \u044f\u0434\u0440\u0435 \u041e\u0421 (CVE-2024-30088);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u0432 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432\u043e\u043c \u044f\u0437\u044b\u043a\u0435 PHP \u043d\u0430 \u0443\u0437\u043b\u0430\u0445 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows (CVE-2024-4577);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u0432 \u044f\u0434\u0440\u0435 Linux (CVE-2024-1086);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0432 Check Point Quantum Security Gateways (CVE-2024-24919);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 VMware vCenter, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 (CVE-2024-37079, CVE-2024-37080);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Veeam Backup &amp;amp; Replication, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u043e\u0431\u0445\u043e\u0434\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 (CVE-2024-29849).\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u043f\u043e \u043a\u0430\u0436\u0434\u043e\u0439 \u0441 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0443 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0436\u0435\u0440\u0442\u0432, \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0438 \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u043c\u0435\u0440 - \u0432 \u0431\u043b\u043e\u0433\u0435\u00a0Positive Technologies.", "creation_timestamp": "2024-07-11T18:50:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5fa5f83c-4b20-4935-adb9-c6a356f043bf/export"/>
    <published>2024-07-11T18:50:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a914e0e3-584b-4da2-b196-1b418a91efb8/export</id>
    <title>a914e0e3-584b-4da2-b196-1b418a91efb8</title>
    <updated>2026-05-06T11:31:34.376150+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a914e0e3-584b-4da2-b196-1b418a91efb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "published-proof-of-concept", "source": "Telegram/8z2jQUECZyIboGcdQcV8r6jYgvTfnQbs0Ypxk_upjXcP6m8", "content": "", "creation_timestamp": "2024-07-16T19:34:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a914e0e3-584b-4da2-b196-1b418a91efb8/export"/>
    <published>2024-07-16T19:34:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2ed837c9-96de-440e-b1d0-1d6aa2d1e823/export</id>
    <title>2ed837c9-96de-440e-b1d0-1d6aa2d1e823</title>
    <updated>2026-05-06T11:31:34.376058+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2ed837c9-96de-440e-b1d0-1d6aa2d1e823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8166", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a  privileged user\nURL\uff1ahttps://github.com/Cracked5pider/eop24-26229\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-04T18:12:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2ed837c9-96de-440e-b1d0-1d6aa2d1e823/export"/>
    <published>2024-08-04T18:12:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/09e2789c-08a1-4f64-97a9-98ae7b9437da/export</id>
    <title>09e2789c-08a1-4f64-97a9-98ae7b9437da</title>
    <updated>2026-05-06T11:31:34.375969+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "09e2789c-08a1-4f64-97a9-98ae7b9437da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2949", "content": "https://github.com/Cracked5pider/eop24-26229\n\nA firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged user\n#github #tools", "creation_timestamp": "2024-08-05T16:31:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/09e2789c-08a1-4f64-97a9-98ae7b9437da/export"/>
    <published>2024-08-05T16:31:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6c6a8b4f-824c-48d4-86e9-65d6bb7faab8/export</id>
    <title>6c6a8b4f-824c-48d4-86e9-65d6bb7faab8</title>
    <updated>2026-05-06T11:31:34.375850+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6c6a8b4f-824c-48d4-86e9-65d6bb7faab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8189", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a  privileged user\nURL\uff1ahttps://github.com/fevar54/CVE-2024-42461\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-06T22:20:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6c6a8b4f-824c-48d4-86e9-65d6bb7faab8/export"/>
    <published>2024-08-06T22:20:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9ceb8009-5a9a-47fc-84b6-39d976f5993d/export</id>
    <title>9ceb8009-5a9a-47fc-84b6-39d976f5993d</title>
    <updated>2026-05-06T11:31:34.375758+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9ceb8009-5a9a-47fc-84b6-39d976f5993d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "published-proof-of-concept", "source": "Telegram/Pj_sXWWks8pqooIXWv5eteiJIrk3itTB4Gjh9HyZsszdiVU", "content": "", "creation_timestamp": "2024-08-06T23:48:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9ceb8009-5a9a-47fc-84b6-39d976f5993d/export"/>
    <published>2024-08-06T23:48:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c8b9f90e-16ba-4461-9818-34f3f4463f0c/export</id>
    <title>c8b9f90e-16ba-4461-9818-34f3f4463f0c</title>
    <updated>2026-05-06T11:31:34.375667+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c8b9f90e-16ba-4461-9818-34f3f4463f0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "published-proof-of-concept", "source": "Telegram/oUBzaszS9MB-JD_sZZNZyNTGtV2NSPMQzJoBHpQUXmKKKaE", "content": "", "creation_timestamp": "2024-08-06T23:48:46.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c8b9f90e-16ba-4461-9818-34f3f4463f0c/export"/>
    <published>2024-08-06T23:48:46+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b3dd432f-8375-4d30-9f89-819ed78fed30/export</id>
    <title>b3dd432f-8375-4d30-9f89-819ed78fed30</title>
    <updated>2026-05-06T11:31:34.375525+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b3dd432f-8375-4d30-9f89-819ed78fed30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/93", "content": "https://github.com/varwara/CVE-2024-26229\n\ncve-2024-26229\n#github #tools #\u63d0\u6743", "creation_timestamp": "2024-12-21T15:48:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b3dd432f-8375-4d30-9f89-819ed78fed30/export"/>
    <published>2024-12-21T15:48:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c536d02f-7473-46cf-aa92-1b15c2e40214/export</id>
    <title>c536d02f-7473-46cf-aa92-1b15c2e40214</title>
    <updated>2026-05-06T11:31:34.375299+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c536d02f-7473-46cf-aa92-1b15c2e40214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "seen", "source": "https://gist.github.com/grass341/2e260ed3ffa0eaba00ae2ce3e7c4f087", "content": "", "creation_timestamp": "2025-04-19T11:42:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c536d02f-7473-46cf-aa92-1b15c2e40214/export"/>
    <published>2025-04-19T11:42:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/32beca09-5a85-4d31-a0ca-5684243afd59/export</id>
    <title>32beca09-5a85-4d31-a0ca-5684243afd59</title>
    <updated>2026-05-06T11:31:34.372097+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "32beca09-5a85-4d31-a0ca-5684243afd59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26229", "type": "published-proof-of-concept", "source": "Telegram/w2sQVYJqPhbRHT9akHM-iGzWKC3IsG1yKSbs6TyOkRlzfbo", "content": "", "creation_timestamp": "2026-03-27T15:00:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/32beca09-5a85-4d31-a0ca-5684243afd59/export"/>
    <published>2026-03-27T15:00:06+00:00</published>
  </entry>
</feed>
