<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T07:48:14.763610+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5454ffd1-08a3-4959-ac89-9845bd882c1a/export</id>
    <title>5454ffd1-08a3-4959-ac89-9845bd882c1a</title>
    <updated>2026-05-10T07:48:14.987162+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5454ffd1-08a3-4959-ac89-9845bd882c1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10959", "content": "#exploit\n1. CVE-2024-38077:\nWindows RDL Service RCE\nhttps://github.com/CloudCrowSec001/CVE-2024-38077-POC\n\n2. CVE-2024-38054:\nWindows Server &amp;lt; 2022 23H2 - Kernel Streaming WOW Thunk Service Driver Memory Corruption\nhttps://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054", "creation_timestamp": "2024-08-10T12:07:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5454ffd1-08a3-4959-ac89-9845bd882c1a/export"/>
    <published>2024-08-10T12:07:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e7aaab82-64a0-49a1-8519-af0941ee1efb/export</id>
    <title>e7aaab82-64a0-49a1-8519-af0941ee1efb</title>
    <updated>2026-05-10T07:48:14.987085+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e7aaab82-64a0-49a1-8519-af0941ee1efb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/147", "content": "https://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054\n\nPermission promotion\n#github #tools #\u63d0\u6743", "creation_timestamp": "2024-08-10T23:02:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e7aaab82-64a0-49a1-8519-af0941ee1efb/export"/>
    <published>2024-08-10T23:02:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d0f58fd7-90c9-405d-830e-db7ba588a66d/export</id>
    <title>d0f58fd7-90c9-405d-830e-db7ba588a66d</title>
    <updated>2026-05-10T07:48:14.987014+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d0f58fd7-90c9-405d-830e-db7ba588a66d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2979", "content": "https://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054\n\nPermission promotion\n#github #tools #\u63d0\u6743", "creation_timestamp": "2024-08-10T23:57:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d0f58fd7-90c9-405d-830e-db7ba588a66d/export"/>
    <published>2024-08-10T23:57:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fcd075ca-04d8-40a8-8415-d9d65e9f1c90/export</id>
    <title>fcd075ca-04d8-40a8-8415-d9d65e9f1c90</title>
    <updated>2026-05-10T07:48:14.986943+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fcd075ca-04d8-40a8-8415-d9d65e9f1c90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/3748", "content": "#exploit\n1. CVE-2024-38077:\nWindows RDL Service RCE\nhttps://github.com/CloudCrowSec001/CVE-2024-38077-POC\n\n2. CVE-2024-38054:\nWindows Server &amp;lt; 2022 23H2 - Kernel Streaming WOW Thunk Service Driver Memory Corruption\nhttps://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054", "creation_timestamp": "2024-08-16T11:23:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fcd075ca-04d8-40a8-8415-d9d65e9f1c90/export"/>
    <published>2024-08-16T11:23:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ebb1d777-12e1-4134-85df-7d88a4f825bc/export</id>
    <title>ebb1d777-12e1-4134-85df-7d88a4f825bc</title>
    <updated>2026-05-10T07:48:14.986871+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ebb1d777-12e1-4134-85df-7d88a4f825bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "seen", "source": "https://t.me/CyberBulletin/452", "content": "\u26a1\ufe0fExploit for CVE-2024-38054 Released: Elevation of Privilege Flaw in Windows Kernel Streaming WOW Thunk.\n\n#CyberBulletin", "creation_timestamp": "2024-08-23T21:29:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ebb1d777-12e1-4134-85df-7d88a4f825bc/export"/>
    <published>2024-08-23T21:29:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ff118b08-10bc-412d-81b5-a37f2a06c613/export</id>
    <title>ff118b08-10bc-412d-81b5-a37f2a06c613</title>
    <updated>2026-05-10T07:48:14.986793+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ff118b08-10bc-412d-81b5-a37f2a06c613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "seen", "source": "https://t.me/BlackHat0Hackers/3035", "content": "CVE-2024-38054 Elevation of Privilege Flaw in Windows Kernel Streaming WOW Thunk\n\nThis high-severity vulnerability in the Kernel Streaming WOW Thunk Service Driver could enable local attackers to escalate privileges to SYSTEM level by exploiting a heap-based buffer overflow.", "creation_timestamp": "2024-08-24T02:07:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ff118b08-10bc-412d-81b5-a37f2a06c613/export"/>
    <published>2024-08-24T02:07:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a06c767-2847-4e97-bbbd-36e78cc380bb/export</id>
    <title>4a06c767-2847-4e97-bbbd-36e78cc380bb</title>
    <updated>2026-05-10T07:48:14.986720+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a06c767-2847-4e97-bbbd-36e78cc380bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/11137", "content": "\u200aExploit for CVE-2024-38054 Released: Elevation of Privilege Flaw in Windows Kernel Streaming WOW Thunk\n\nhttps://securityonline.info/exploit-for-cve-2024-38054-released-elevation-of-privilege-flaw-in-windows-kernel-streaming-wow-thunk/", "creation_timestamp": "2024-08-24T09:50:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a06c767-2847-4e97-bbbd-36e78cc380bb/export"/>
    <published>2024-08-24T09:50:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dadd19e5-7614-4dec-afac-7f71330fe19c/export</id>
    <title>dadd19e5-7614-4dec-afac-7f71330fe19c</title>
    <updated>2026-05-10T07:48:14.986647+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dadd19e5-7614-4dec-afac-7f71330fe19c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "published-proof-of-concept", "source": "Telegram/3RVlFjalLgf68jfIbtGSbXbYrB09rm48w-0iN4PzwYqkMxE", "content": "", "creation_timestamp": "2024-09-08T07:41:49.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dadd19e5-7614-4dec-afac-7f71330fe19c/export"/>
    <published>2024-09-08T07:41:49+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1d4b8f22-69ee-41f2-9b33-05b47e46768c/export</id>
    <title>1d4b8f22-69ee-41f2-9b33-05b47e46768c</title>
    <updated>2026-05-10T07:48:14.986533+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1d4b8f22-69ee-41f2-9b33-05b47e46768c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "seen", "source": "Telegram/eHEnRppccebD6_2LUh9k-1ws4oQN9cwicYGflVclVpLaSzw", "content": "", "creation_timestamp": "2024-09-27T18:49:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1d4b8f22-69ee-41f2-9b33-05b47e46768c/export"/>
    <published>2024-09-27T18:49:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fa7cc334-04f4-44de-af71-44bf95c061db/export</id>
    <title>fa7cc334-04f4-44de-af71-44bf95c061db</title>
    <updated>2026-05-10T07:48:14.984978+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fa7cc334-04f4-44de-af71-44bf95c061db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38054", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/91", "content": "https://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054\n\nPermission promotion\n#github #tools #\u63d0\u6743", "creation_timestamp": "2024-12-21T15:47:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fa7cc334-04f4-44de-af71-44bf95c061db/export"/>
    <published>2024-12-21T15:47:50+00:00</published>
  </entry>
</feed>
