<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T20:10:43.430675+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ed4d7019-7d97-4053-90bc-d56b265aa838/export</id>
    <title>ed4d7019-7d97-4053-90bc-d56b265aa838</title>
    <updated>2026-05-07T20:10:43.736734+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ed4d7019-7d97-4053-90bc-d56b265aa838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/204", "content": "Hello, cats.  \ud83d\udc31\nI decided to make this post as a collection of stuff, but don't get upset, there is a lot of useful stuff here. \nFor example various other compilations of material, various vulnerabilities and poc, and of course cool articles!\ud83d\udd11\n\nLink - A good article about exceeding a threshold and how it works \n\nLink - A good article about overriding privileges on the wind.  It deals with topics such as:  Flow control and reverse flow protection; SMEP, preventing execution of trivial kernel code; ASLR, DEP and stuff like that, including limiting kernel leaks; Using memory corruption \n\nLink - A collection of matertials on the githab about privilege overruns there are matertials like: Tools for this; Enumerating users; Enumerating the EoP network - named channels; EoP - Exploiting the kernel. And a lot more, I think someone will definitely find it useful \n\nLink - This script is for listing common Windows configuration problems that can be used to raise privileges locally. It also collects different information which can be useful for exploiting privilege overrides \n\nLink - A collection of windows privilege override vulnerabilities and poc on them.  There are quite a few different \n\nLink - About security, WADComs cheat sheet containing a list of offensive security tools you can use in Windows environments.\n\nLink - About  CVE 2022-29072 - Powershell detection/mitigation\n\nLink - Exploit for CVE-2022-21999 - Windows Print Queue Manager vulnerability related to privilege gaining \n\nLink - Exploit for notorious CVE-2022-21882\n\nLink - Little manulet with exploits for privilege escalation\n#windows #attacks #cve #exploit", "creation_timestamp": "2022-11-19T11:29:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ed4d7019-7d97-4053-90bc-d56b265aa838/export"/>
    <published>2022-11-19T11:29:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/876b16de-19fb-472f-aea5-f39a820318ef/export</id>
    <title>876b16de-19fb-472f-aea5-f39a820318ef</title>
    <updated>2026-05-07T20:10:43.736652+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "876b16de-19fb-472f-aea5-f39a820318ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/876b16de-19fb-472f-aea5-f39a820318ef/export"/>
    <published>2023-06-14T21:10:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/82d81613-5ba2-46ec-a5c5-0651538a03a9/export</id>
    <title>82d81613-5ba2-46ec-a5c5-0651538a03a9</title>
    <updated>2026-05-07T20:10:43.736568+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "82d81613-5ba2-46ec-a5c5-0651538a03a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/bd1c3290-9486-4bf9-ae59-fe17c0948133", "content": "", "creation_timestamp": "2023-09-06T13:44:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/82d81613-5ba2-46ec-a5c5-0651538a03a9/export"/>
    <published>2023-09-06T13:44:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b5d25e7a-f021-42d7-abf8-58d9808fbe5a/export</id>
    <title>b5d25e7a-f021-42d7-abf8-58d9808fbe5a</title>
    <updated>2026-05-07T20:10:43.736476+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b5d25e7a-f021-42d7-abf8-58d9808fbe5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5380", "content": "#exploit\n1. CVE-2022-21241:\nCSV+ 0.8.0 - 2-Click Arbitrary Code Execution\nhttps://github.com/satoki/csv-plus_vulnerability\n\n2. CVE-2022-21999, CVE-2022-22718:\nSpoolFool - Windows Print Spooler Privilege Escalation\nhttps://research.ifcr.dk/spoolfool-windows-print-spooler-privilege-escalation-cve-2022-22718-bf7752b68d81\n]-&amp;gt; The functional exploit and DLL:\nhttps://github.com/ly4k/SpoolFool", "creation_timestamp": "2024-10-11T22:00:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b5d25e7a-f021-42d7-abf8-58d9808fbe5a/export"/>
    <published>2024-10-11T22:00:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb6f7b48-5ba5-419b-ab77-9370d27503a2/export</id>
    <title>eb6f7b48-5ba5-419b-ab77-9370d27503a2</title>
    <updated>2026-05-07T20:10:43.736396+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb6f7b48-5ba5-419b-ab77-9370d27503a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971452", "content": "", "creation_timestamp": "2024-12-24T20:29:33.212237Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb6f7b48-5ba5-419b-ab77-9370d27503a2/export"/>
    <published>2024-12-24T20:29:33.212237+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1efa2235-23b0-4737-b721-2a95f499d35c/export</id>
    <title>1efa2235-23b0-4737-b721-2a95f499d35c</title>
    <updated>2026-05-07T20:10:43.736311+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1efa2235-23b0-4737-b721-2a95f499d35c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "Telegram/aWPQ6S4atnyDD3dUH3K-x1BU3R5-n4OL9JH-9OFaA4Rgfst8", "content": "", "creation_timestamp": "2025-01-30T02:17:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1efa2235-23b0-4737-b721-2a95f499d35c/export"/>
    <published>2025-01-30T02:17:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3b68a024-8be9-4026-af40-2b7de0ffdf42/export</id>
    <title>3b68a024-8be9-4026-af40-2b7de0ffdf42</title>
    <updated>2026-05-07T20:10:43.736223+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3b68a024-8be9-4026-af40-2b7de0ffdf42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3b68a024-8be9-4026-af40-2b7de0ffdf42/export"/>
    <published>2025-02-06T03:13:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/308bc1b5-1b49-44bc-b3ef-ca940972d42f/export</id>
    <title>308bc1b5-1b49-44bc-b3ef-ca940972d42f</title>
    <updated>2026-05-07T20:10:43.736101+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "308bc1b5-1b49-44bc-b3ef-ca940972d42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/308bc1b5-1b49-44bc-b3ef-ca940972d42f/export"/>
    <published>2025-02-23T02:10:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/45da05b3-98db-4419-8849-d23b3cb9f0fb/export</id>
    <title>45da05b3-98db-4419-8849-d23b3cb9f0fb</title>
    <updated>2026-05-07T20:10:43.734111+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "45da05b3-98db-4419-8849-d23b3cb9f0fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/45da05b3-98db-4419-8849-d23b3cb9f0fb/export"/>
    <published>2025-02-23T04:10:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a13d1a45-f832-49a5-a4b4-7513aa2158e3/export</id>
    <title>a13d1a45-f832-49a5-a4b4-7513aa2158e3</title>
    <updated>2026-05-07T20:10:43.731696+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://cve.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "a13d1a45-f832-49a5-a4b4-7513aa2158e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-21999", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/54c7f9b1-8660-4360-82f7-8a9d0f201afa", "content": "", "creation_timestamp": "2026-02-02T12:27:58.841823Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a13d1a45-f832-49a5-a4b4-7513aa2158e3/export"/>
    <published>2026-02-02T12:27:58.841823+00:00</published>
  </entry>
</feed>
