<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T15:46:47.965328+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/024ba258-6cdf-475a-b5a6-c5be765bfdb4/export</id>
    <title>024ba258-6cdf-475a-b5a6-c5be765bfdb4</title>
    <updated>2026-05-06T15:46:48.339306+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "024ba258-6cdf-475a-b5a6-c5be765bfdb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29417", "type": "seen", "source": "https://t.me/CNArsenal/2397", "content": "https://blog.pridesec.com.br/en/horacius-unauthenticated-privilege-escalation/\n\nHoracius (IAM) - Local privilege escalation, even without a Windows account.\nCVE-2024-29417\n#\u5206\u6790", "creation_timestamp": "2024-04-29T11:22:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/024ba258-6cdf-475a-b5a6-c5be765bfdb4/export"/>
    <published>2024-04-29T11:22:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/79443a92-81ec-4a10-a1e3-62eea3c85e5e/export</id>
    <title>79443a92-81ec-4a10-a1e3-62eea3c85e5e</title>
    <updated>2026-05-06T15:46:48.339221+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "79443a92-81ec-4a10-a1e3-62eea3c85e5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29417", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10418", "content": "#exploit\n1. Windows 11 24H2 NT Exploit\nhttps://github.com/exploits-forsale/24h2-nt-exploit\n\n2. CVE-2024-29417:\nUnauth privilege escalation in Horacius\nhttps://blog.pridesec.com.br/en/horacius-unauthenticated-privilege-escalation", "creation_timestamp": "2024-05-03T11:22:35.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/79443a92-81ec-4a10-a1e3-62eea3c85e5e/export"/>
    <published>2024-05-03T11:22:35+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/774c3b25-e6be-4a88-b5e6-3b1bb5d4eb00/export</id>
    <title>774c3b25-e6be-4a88-b5e6-3b1bb5d4eb00</title>
    <updated>2026-05-06T15:46:48.339106+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "774c3b25-e6be-4a88-b5e6-3b1bb5d4eb00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29417", "type": "seen", "source": "https://t.me/proxy_bar/2031", "content": "Horacius (IAM) - Local privilege escalation, \u0431\u0435\u0437 \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 Windows.\n*\nCVE-2024-29417\n*\n\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435, \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c", "creation_timestamp": "2024-05-05T06:36:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/774c3b25-e6be-4a88-b5e6-3b1bb5d4eb00/export"/>
    <published>2024-05-05T06:36:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/af7a74aa-f8a8-43b6-b347-961a693092aa/export</id>
    <title>af7a74aa-f8a8-43b6-b347-961a693092aa</title>
    <updated>2026-05-06T15:46:48.336353+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "af7a74aa-f8a8-43b6-b347-961a693092aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29417", "type": "published-proof-of-concept", "source": "Telegram/sQ2aypQTZSBTGGGWc01_TnIji_qO7lDde4NCa8-TiF1wxoE", "content": "", "creation_timestamp": "2024-06-05T05:24:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/af7a74aa-f8a8-43b6-b347-961a693092aa/export"/>
    <published>2024-06-05T05:24:55+00:00</published>
  </entry>
</feed>
