<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 10:33:18 +0000</lastBuildDate>
    <item>
      <title>8cb7d660-b904-4326-b3f7-4ce10421de26</title>
      <link>https://vulnerability.circl.lu/sighting/8cb7d660-b904-4326-b3f7-4ce10421de26/export</link>
      <description>{"uuid": "8cb7d660-b904-4326-b3f7-4ce10421de26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24069", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:01.000000Z"}</description>
      <content:encoded>{"uuid": "8cb7d660-b904-4326-b3f7-4ce10421de26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24069", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8cb7d660-b904-4326-b3f7-4ce10421de26/export</guid>
      <pubDate>Sun, 13 Oct 2024 05:36:01 +0000</pubDate>
    </item>
    <item>
      <title>eb2932a3-9b36-4876-af30-5dd489c3162d</title>
      <link>https://vulnerability.circl.lu/sighting/eb2932a3-9b36-4876-af30-5dd489c3162d/export</link>
      <description>{"uuid": "eb2932a3-9b36-4876-af30-5dd489c3162d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/496", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:02.000000Z"}</description>
      <content:encoded>{"uuid": "eb2932a3-9b36-4876-af30-5dd489c3162d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/496", "content": "Tools Hackers Factory \n\nRecords an executable's network activity into a Full Packet Capture file (.pcap) and much more. \n\nhttps://github.com/H4NM/WhoYouCalling\u00a0 \n\nLinux kernel Netfilter Use-After-Free leads to LPE \n\nhttps://github.com/google/security-research/blob/master/pocs/linux/kernelctf/CVE-2024-26808_cos/docs/exploit.md\n\nFrom object transition to RCE in the Chrome renderer \n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\u00a0 \n\nDeep Linux runtime visibility meets Wireshark \n\nhttps://github.com/aquasecurity/traceeshark\u00a0 \n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nCVE-2024-38816: Path traversal vulnerability in Spring Frameworks\n\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\nexploit_dev/browsers/v8/CVE-2024-5830 at main \u00b7 uf0o/exploit_dev'\n\nhttps://github.com/uf0o/exploit_dev/tree/main/browsers/v8/CVE-2024-5830\n\nNameless C2 - A C2 with all its components written in Rust\n\nhttps://github.com/trickster0/NamelessC2\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-13T05:36:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eb2932a3-9b36-4876-af30-5dd489c3162d/export</guid>
      <pubDate>Sun, 13 Oct 2024 05:36:02 +0000</pubDate>
    </item>
    <item>
      <title>1f092c76-6fa6-4cd1-a74f-97578fdcb816</title>
      <link>https://vulnerability.circl.lu/sighting/1f092c76-6fa6-4cd1-a74f-97578fdcb816/export</link>
      <description>{"uuid": "1f092c76-6fa6-4cd1-a74f-97578fdcb816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58307", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpgia7gt2c", "content": "", "creation_timestamp": "2025-12-11T23:17:23.597841Z"}</description>
      <content:encoded>{"uuid": "1f092c76-6fa6-4cd1-a74f-97578fdcb816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58307", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpgia7gt2c", "content": "", "creation_timestamp": "2025-12-11T23:17:23.597841Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1f092c76-6fa6-4cd1-a74f-97578fdcb816/export</guid>
      <pubDate>Thu, 11 Dec 2025 23:17:23 +0000</pubDate>
    </item>
    <item>
      <title>0d0864a9-1db3-4005-b3e3-5618631f4cb3</title>
      <link>https://vulnerability.circl.lu/sighting/0d0864a9-1db3-4005-b3e3-5618631f4cb3/export</link>
      <description>{"uuid": "0d0864a9-1db3-4005-b3e3-5618631f4cb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58302", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpk2yl3q2m", "content": "", "creation_timestamp": "2025-12-11T23:19:24.300940Z"}</description>
      <content:encoded>{"uuid": "0d0864a9-1db3-4005-b3e3-5618631f4cb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58302", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpk2yl3q2m", "content": "", "creation_timestamp": "2025-12-11T23:19:24.300940Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0d0864a9-1db3-4005-b3e3-5618631f4cb3/export</guid>
      <pubDate>Thu, 11 Dec 2025 23:19:24 +0000</pubDate>
    </item>
    <item>
      <title>312064c1-10b9-4bd5-9cbc-902f5b78d0ad</title>
      <link>https://vulnerability.circl.lu/sighting/312064c1-10b9-4bd5-9cbc-902f5b78d0ad/export</link>
      <description>{"uuid": "312064c1-10b9-4bd5-9cbc-902f5b78d0ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58303", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpnvwbve2o", "content": "", "creation_timestamp": "2025-12-11T23:21:32.976683Z"}</description>
      <content:encoded>{"uuid": "312064c1-10b9-4bd5-9cbc-902f5b78d0ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58303", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qpnvwbve2o", "content": "", "creation_timestamp": "2025-12-11T23:21:32.976683Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/312064c1-10b9-4bd5-9cbc-902f5b78d0ad/export</guid>
      <pubDate>Thu, 11 Dec 2025 23:21:32 +0000</pubDate>
    </item>
    <item>
      <title>401b64db-5cf4-4e65-8076-9b08c4930973</title>
      <link>https://vulnerability.circl.lu/sighting/401b64db-5cf4-4e65-8076-9b08c4930973/export</link>
      <description>{"uuid": "401b64db-5cf4-4e65-8076-9b08c4930973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58308", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqascrhb2e", "content": "", "creation_timestamp": "2025-12-11T23:32:06.542390Z"}</description>
      <content:encoded>{"uuid": "401b64db-5cf4-4e65-8076-9b08c4930973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58308", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqascrhb2e", "content": "", "creation_timestamp": "2025-12-11T23:32:06.542390Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/401b64db-5cf4-4e65-8076-9b08c4930973/export</guid>
      <pubDate>Thu, 11 Dec 2025 23:32:06 +0000</pubDate>
    </item>
    <item>
      <title>696f43f1-98af-47a8-a7d0-e627073f1389</title>
      <link>https://vulnerability.circl.lu/sighting/696f43f1-98af-47a8-a7d0-e627073f1389/export</link>
      <description>{"uuid": "696f43f1-98af-47a8-a7d0-e627073f1389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58304", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqnic5ze2o", "content": "", "creation_timestamp": "2025-12-11T23:39:12.370348Z"}</description>
      <content:encoded>{"uuid": "696f43f1-98af-47a8-a7d0-e627073f1389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58304", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqnic5ze2o", "content": "", "creation_timestamp": "2025-12-11T23:39:12.370348Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/696f43f1-98af-47a8-a7d0-e627073f1389/export</guid>
      <pubDate>Thu, 11 Dec 2025 23:39:12 +0000</pubDate>
    </item>
    <item>
      <title>fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5</title>
      <link>https://vulnerability.circl.lu/sighting/fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5/export</link>
      <description>{"uuid": "fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58309", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqv5vo3k2y", "content": "", "creation_timestamp": "2025-12-11T23:43:29.939062Z"}</description>
      <content:encoded>{"uuid": "fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58309", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qqv5vo3k2y", "content": "", "creation_timestamp": "2025-12-11T23:43:29.939062Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fe7f71c3-3b8f-4bb6-958f-2bedd950c5d5/export</guid>
      <pubDate>Thu, 11 Dec 2025 23:43:29 +0000</pubDate>
    </item>
    <item>
      <title>37c2ee5a-df98-41ad-a631-8cb48d98e2b3</title>
      <link>https://vulnerability.circl.lu/sighting/37c2ee5a-df98-41ad-a631-8cb48d98e2b3/export</link>
      <description>{"uuid": "37c2ee5a-df98-41ad-a631-8cb48d98e2b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58306", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qsbwdfmd2q", "content": "", "creation_timestamp": "2025-12-12T00:08:32.071581Z"}</description>
      <content:encoded>{"uuid": "37c2ee5a-df98-41ad-a631-8cb48d98e2b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58306", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7qsbwdfmd2q", "content": "", "creation_timestamp": "2025-12-12T00:08:32.071581Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/37c2ee5a-df98-41ad-a631-8cb48d98e2b3/export</guid>
      <pubDate>Fri, 12 Dec 2025 00:08:32 +0000</pubDate>
    </item>
    <item>
      <title>39455b36-ea19-4cd9-beba-fba7e512ed44</title>
      <link>https://vulnerability.circl.lu/sighting/39455b36-ea19-4cd9-beba-fba7e512ed44/export</link>
      <description>{"uuid": "39455b36-ea19-4cd9-beba-fba7e512ed44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58305", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7sy6huv4x2y", "content": "", "creation_timestamp": "2025-12-12T20:59:18.537174Z"}</description>
      <content:encoded>{"uuid": "39455b36-ea19-4cd9-beba-fba7e512ed44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58305", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7sy6huv4x2y", "content": "", "creation_timestamp": "2025-12-12T20:59:18.537174Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/39455b36-ea19-4cd9-beba-fba7e512ed44/export</guid>
      <pubDate>Fri, 12 Dec 2025 20:59:18 +0000</pubDate>
    </item>
  </channel>
</rss>
