<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T12:57:29.006584+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/10d18e19-15cc-4001-be8d-b691b742b16d/export</id>
    <title>10d18e19-15cc-4001-be8d-b691b742b16d</title>
    <updated>2026-05-10T12:57:29.262139+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "10d18e19-15cc-4001-be8d-b691b742b16d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20693", "type": "seen", "source": "https://t.me/arpsyndicate/4475", "content": "#ExploitObserverAlert\n\nCVE-2024-20693\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-20693. Windows Kernel Elevation of Privilege Vulnerability\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-04-11T08:05:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/10d18e19-15cc-4001-be8d-b691b742b16d/export"/>
    <published>2024-04-11T08:05:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9c9752ae-1ff5-4205-8f7a-10c8a636ecad/export</id>
    <title>9c9752ae-1ff5-4205-8f7a-10c8a636ecad</title>
    <updated>2026-05-10T12:57:29.262049+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9c9752ae-1ff5-4205-8f7a-10c8a636ecad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2343", "content": "https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability\n\nCVE-2024-20697: WINDOWS LIBARCHIVE REMOTE CODE EXECUTION VULNERABILITY\n#\u5206\u6790", "creation_timestamp": "2024-04-18T17:15:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9c9752ae-1ff5-4205-8f7a-10c8a636ecad/export"/>
    <published>2024-04-18T17:15:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f/export</id>
    <title>c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f</title>
    <updated>2026-05-10T12:57:29.261956+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10357", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-19T16:41:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f/export"/>
    <published>2024-04-19T16:41:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2b7499f6-5b5b-42b0-8982-ca4073557583/export</id>
    <title>2b7499f6-5b5b-42b0-8982-ca4073557583</title>
    <updated>2026-05-10T12:57:29.261864+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2b7499f6-5b5b-42b0-8982-ca4073557583", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/3623", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-20T13:07:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2b7499f6-5b5b-42b0-8982-ca4073557583/export"/>
    <published>2024-04-20T13:07:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6f071bf2-9c7c-4997-88b6-983fbf55438f/export</id>
    <title>6f071bf2-9c7c-4997-88b6-983fbf55438f</title>
    <updated>2026-05-10T12:57:29.261766+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6f071bf2-9c7c-4997-88b6-983fbf55438f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20693", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10690", "content": "#exploit\n1. CVE-2024-20693:\nWindows cached code signature manipulation\nhttps://sector7.computest.nl/post/2024-06-cve-2024-20693-windows-cached-code-signature-manipulation\n\n2. CVE-2024-27804:\nApple iOS/iPadOS Kernel Memory Corruption\nhttps://github.com/R00tkitSMM/CVE-2024-27804", "creation_timestamp": "2024-06-17T18:10:14.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6f071bf2-9c7c-4997-88b6-983fbf55438f/export"/>
    <published>2024-06-17T18:10:14+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/196c0ab1-a7d1-4731-968c-b40ce6bacb7c/export</id>
    <title>196c0ab1-a7d1-4731-968c-b40ce6bacb7c</title>
    <updated>2026-05-10T12:57:29.261667+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "196c0ab1-a7d1-4731-968c-b40ce6bacb7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2568", "content": "#exploit\n1. CVE-2023-45185:\nRCE via insecure deserialisation in IBM i Access Client Solutions &amp;lt; 1.1.9\nhttps://github.com/afine-com/CVE-2023-45185\n\n2. CVE-2023-50445/CVE-2023-50919:\nGL.iNet Unauthenticated RCE\nhttps://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html\n\n3. CVE-2024-20698:\nWindows Kernel EoP\nhttps://github.com/RomanRybachek/CVE-2024-20698", "creation_timestamp": "2024-08-16T09:02:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/196c0ab1-a7d1-4731-968c-b40ce6bacb7c/export"/>
    <published>2024-08-16T09:02:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ed243cc-5813-43c3-a959-c6560066a791/export</id>
    <title>4ed243cc-5813-43c3-a959-c6560066a791</title>
    <updated>2026-05-10T12:57:29.261572+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ed243cc-5813-43c3-a959-c6560066a791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1696/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ed243cc-5813-43c3-a959-c6560066a791/export"/>
    <published>2024-12-19T05:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d99a8931-82a2-4e31-b065-c487850d3a5c/export</id>
    <title>d99a8931-82a2-4e31-b065-c487850d3a5c</title>
    <updated>2026-05-10T12:57:29.261464+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d99a8931-82a2-4e31-b065-c487850d3a5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12292", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20696\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Windows libarchive Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:56:52.848Z\n\ud83d\udccf Modified: 2025-04-17T17:51:31.051Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696", "creation_timestamp": "2025-04-17T17:57:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d99a8931-82a2-4e31-b065-c487850d3a5c/export"/>
    <published>2025-04-17T17:57:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a41ac1d1-ec8a-4168-af3f-d8867121585f/export</id>
    <title>a41ac1d1-ec8a-4168-af3f-d8867121585f</title>
    <updated>2026-05-10T12:57:29.261315+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a41ac1d1-ec8a-4168-af3f-d8867121585f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20692", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14672", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20692\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:57:07.695Z\n\ud83d\udccf Modified: 2025-05-03T01:46:49.131Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20692", "creation_timestamp": "2025-05-03T02:16:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a41ac1d1-ec8a-4168-af3f-d8867121585f/export"/>
    <published>2025-05-03T02:16:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/abdc5233-a8ec-4125-9b72-a58b80444efa/export</id>
    <title>abdc5233-a8ec-4125-9b72-a58b80444efa</title>
    <updated>2026-05-10T12:57:29.258286+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "abdc5233-a8ec-4125-9b72-a58b80444efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20696", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/abdc5233-a8ec-4125-9b72-a58b80444efa/export"/>
    <published>2025-08-26T18:36:20+00:00</published>
  </entry>
</feed>
