<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T17:11:36.235374+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8cb7d660-b904-4326-b3f7-4ce10421de26/export</id>
    <title>8cb7d660-b904-4326-b3f7-4ce10421de26</title>
    <updated>2026-05-05T17:11:36.474219+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8cb7d660-b904-4326-b3f7-4ce10421de26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24069", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8cb7d660-b904-4326-b3f7-4ce10421de26/export"/>
    <published>2024-10-13T05:36:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb2932a3-9b36-4876-af30-5dd489c3162d/export</id>
    <title>eb2932a3-9b36-4876-af30-5dd489c3162d</title>
    <updated>2026-05-05T17:11:36.474125+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb2932a3-9b36-4876-af30-5dd489c3162d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/496", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb2932a3-9b36-4876-af30-5dd489c3162d/export"/>
    <published>2024-10-13T05:36:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1f092c76-6fa6-4cd1-a74f-97578fdcb816/export</id>
    <title>1f092c76-6fa6-4cd1-a74f-97578fdcb816</title>
    <updated>2026-05-05T17:11:36.474048+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1f092c76-6fa6-4cd1-a74f-97578fdcb816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58307", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpgia7gt2c", "content": "", "creation_timestamp": "2025-12-11T23:17:23.597841Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1f092c76-6fa6-4cd1-a74f-97578fdcb816/export"/>
    <published>2025-12-11T23:17:23.597841+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0d0864a9-1db3-4005-b3e3-5618631f4cb3/export</id>
    <title>0d0864a9-1db3-4005-b3e3-5618631f4cb3</title>
    <updated>2026-05-05T17:11:36.473957+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0d0864a9-1db3-4005-b3e3-5618631f4cb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58302", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpk2yl3q2m", "content": "", "creation_timestamp": "2025-12-11T23:19:24.300940Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0d0864a9-1db3-4005-b3e3-5618631f4cb3/export"/>
    <published>2025-12-11T23:19:24.300940+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/312064c1-10b9-4bd5-9cbc-902f5b78d0ad/export</id>
    <title>312064c1-10b9-4bd5-9cbc-902f5b78d0ad</title>
    <updated>2026-05-05T17:11:36.473871+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "312064c1-10b9-4bd5-9cbc-902f5b78d0ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58303", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpnvwbve2o", "content": "", "creation_timestamp": "2025-12-11T23:21:32.976683Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/312064c1-10b9-4bd5-9cbc-902f5b78d0ad/export"/>
    <published>2025-12-11T23:21:32.976683+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/401b64db-5cf4-4e65-8076-9b08c4930973/export</id>
    <title>401b64db-5cf4-4e65-8076-9b08c4930973</title>
    <updated>2026-05-05T17:11:36.473786+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "401b64db-5cf4-4e65-8076-9b08c4930973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58308", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqascrhb2e", "content": "", "creation_timestamp": "2025-12-11T23:32:06.542390Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/401b64db-5cf4-4e65-8076-9b08c4930973/export"/>
    <published>2025-12-11T23:32:06.542390+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/696f43f1-98af-47a8-a7d0-e627073f1389/export</id>
    <title>696f43f1-98af-47a8-a7d0-e627073f1389</title>
    <updated>2026-05-05T17:11:36.473682+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "696f43f1-98af-47a8-a7d0-e627073f1389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58304", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqnic5ze2o", "content": "", "creation_timestamp": "2025-12-11T23:39:12.370348Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/696f43f1-98af-47a8-a7d0-e627073f1389/export"/>
    <published>2025-12-11T23:39:12.370348+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5/export</id>
    <title>fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5</title>
    <updated>2026-05-05T17:11:36.473586+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58309", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqv5vo3k2y", "content": "", "creation_timestamp": "2025-12-11T23:43:29.939062Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5/export"/>
    <published>2025-12-11T23:43:29.939062+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/37c2ee5a-df98-41ad-a631-8cb48d98e2b3/export</id>
    <title>37c2ee5a-df98-41ad-a631-8cb48d98e2b3</title>
    <updated>2026-05-05T17:11:36.473430+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "37c2ee5a-df98-41ad-a631-8cb48d98e2b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58306", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qsbwdfmd2q", "content": "", "creation_timestamp": "2025-12-12T00:08:32.071581Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/37c2ee5a-df98-41ad-a631-8cb48d98e2b3/export"/>
    <published>2025-12-12T00:08:32.071581+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/39455b36-ea19-4cd9-beba-fba7e512ed44/export</id>
    <title>39455b36-ea19-4cd9-beba-fba7e512ed44</title>
    <updated>2026-05-05T17:11:36.470824+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "39455b36-ea19-4cd9-beba-fba7e512ed44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58305", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7sy6huv4x2y", "content": "", "creation_timestamp": "2025-12-12T20:59:18.537174Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/39455b36-ea19-4cd9-beba-fba7e512ed44/export"/>
    <published>2025-12-12T20:59:18.537174+00:00</published>
  </entry>
</feed>
