<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T14:44:30.080476+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e6d7adb9-257c-442b-bc83-1fbb9318a799/export</id>
    <title>e6d7adb9-257c-442b-bc83-1fbb9318a799</title>
    <updated>2026-05-09T14:44:30.447447+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e6d7adb9-257c-442b-bc83-1fbb9318a799", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32030", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2704", "content": "https://securitylab.github.com/advisories/GHSL-2023-229_GHSL-2023-230_kafka-ui/\n\nRemote Code Execution (RCE) in Apache Kafka User Interface-CVE-2023-52251, CVE-2024-32030\n#\u5206\u6790", "creation_timestamp": "2024-06-24T15:07:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e6d7adb9-257c-442b-bc83-1fbb9318a799/export"/>
    <published>2024-06-24T15:07:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a4cb6937-dd06-4d30-b602-6db4b8eb40cf/export</id>
    <title>a4cb6937-dd06-4d30-b602-6db4b8eb40cf</title>
    <updated>2026-05-09T14:44:30.447332+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a4cb6937-dd06-4d30-b602-6db4b8eb40cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32030", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10876", "content": "#exploit\n1. CVE-2024-41003:\nLinux Kernel Vulnerability in the eBPF verifier register limit tracking\nhttps://github.com/google/security-research/security/advisories/GHSA-hfqc-63c7-rj9f\n\n2. CVE-2023-52251,\nCVE-2023-25194,\nCVE-2024-32030:\n3 ways to get RCE in Kafka UI\nhttps://github.blog/security/vulnerability-research/3-ways-to-get-remote-code-execution-in-kafka-ui\n\n3. CVE-2019-8805:\nApple EndpointSecurity Privilege Escalation\nhttps://blog.securelayer7.net/applied-endpointsecurity-framework-previlege-escalation\n]-&amp;gt; PoC: https://github.com/securelayer7/CVE-2019-8805", "creation_timestamp": "2024-07-24T12:51:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a4cb6937-dd06-4d30-b602-6db4b8eb40cf/export"/>
    <published>2024-07-24T12:51:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1913fcb5-fd9f-491c-846d-083669e8bb23/export</id>
    <title>1913fcb5-fd9f-491c-846d-083669e8bb23</title>
    <updated>2026-05-09T14:44:30.444353+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1913fcb5-fd9f-491c-846d-083669e8bb23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32030", "type": "published-proof-of-concept", "source": "Telegram/VZbEcJjk_8VPNmTbjxcqG21XAk561-TUu6SDqzneFS53n0s", "content": "", "creation_timestamp": "2024-08-01T00:41:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1913fcb5-fd9f-491c-846d-083669e8bb23/export"/>
    <published>2024-08-01T00:41:31+00:00</published>
  </entry>
</feed>
