<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 07 May 2026 20:10:42 +0000</lastBuildDate>
    <item>
      <title>ed4d7019-7d97-4053-90bc-d56b265aa838</title>
      <link>https://vulnerability.circl.lu/sighting/ed4d7019-7d97-4053-90bc-d56b265aa838/export</link>
      <description>{"uuid": "ed4d7019-7d97-4053-90bc-d56b265aa838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/204", "content": "Hello, cats.  \ud83d\udc31\nI decided to make this post as a collection of stuff, but don't get upset, there is a lot of useful stuff here. \nFor example various other compilations of material, various vulnerabilities and poc, and of course cool articles!\ud83d\udd11\n\nLink - A good article about exceeding a threshold and how it works \n\nLink - A good article about overriding privileges on the wind.  It deals with topics such as:  Flow control and reverse flow protection; SMEP, preventing execution of trivial kernel code; ASLR, DEP and stuff like that, including limiting kernel leaks; Using memory corruption \n\nLink - A collection of matertials on the githab about privilege overruns there are matertials like: Tools for this; Enumerating users; Enumerating the EoP network - named channels; EoP - Exploiting the kernel. And a lot more, I think someone will definitely find it useful \n\nLink - This script is for listing common Windows configuration problems that can be used to raise privileges locally. It also collects different information which can be useful for exploiting privilege overrides \n\nLink - A collection of windows privilege override vulnerabilities and poc on them.  There are quite a few different \n\nLink - About security, WADComs cheat sheet containing a list of offensive security tools you can use in Windows environments.\n\nLink - About  CVE 2022-29072 - Powershell detection/mitigation\n\nLink - Exploit for CVE-2022-21999 - Windows Print Queue Manager vulnerability related to privilege gaining \n\nLink - Exploit for notorious CVE-2022-21882\n\nLink - Little manulet with exploits for privilege escalation\n#windows #attacks #cve #exploit", "creation_timestamp": "2022-11-19T11:29:33.000000Z"}</description>
      <content:encoded>{"uuid": "ed4d7019-7d97-4053-90bc-d56b265aa838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/204", "content": "Hello, cats.  \ud83d\udc31\nI decided to make this post as a collection of stuff, but don't get upset, there is a lot of useful stuff here. \nFor example various other compilations of material, various vulnerabilities and poc, and of course cool articles!\ud83d\udd11\n\nLink - A good article about exceeding a threshold and how it works \n\nLink - A good article about overriding privileges on the wind.  It deals with topics such as:  Flow control and reverse flow protection; SMEP, preventing execution of trivial kernel code; ASLR, DEP and stuff like that, including limiting kernel leaks; Using memory corruption \n\nLink - A collection of matertials on the githab about privilege overruns there are matertials like: Tools for this; Enumerating users; Enumerating the EoP network - named channels; EoP - Exploiting the kernel. And a lot more, I think someone will definitely find it useful \n\nLink - This script is for listing common Windows configuration problems that can be used to raise privileges locally. It also collects different information which can be useful for exploiting privilege overrides \n\nLink - A collection of windows privilege override vulnerabilities and poc on them.  There are quite a few different \n\nLink - About security, WADComs cheat sheet containing a list of offensive security tools you can use in Windows environments.\n\nLink - About  CVE 2022-29072 - Powershell detection/mitigation\n\nLink - Exploit for CVE-2022-21999 - Windows Print Queue Manager vulnerability related to privilege gaining \n\nLink - Exploit for notorious CVE-2022-21882\n\nLink - Little manulet with exploits for privilege escalation\n#windows #attacks #cve #exploit", "creation_timestamp": "2022-11-19T11:29:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ed4d7019-7d97-4053-90bc-d56b265aa838/export</guid>
      <pubDate>Sat, 19 Nov 2022 11:29:33 +0000</pubDate>
    </item>
    <item>
      <title>876b16de-19fb-472f-aea5-f39a820318ef</title>
      <link>https://vulnerability.circl.lu/sighting/876b16de-19fb-472f-aea5-f39a820318ef/export</link>
      <description>{"uuid": "876b16de-19fb-472f-aea5-f39a820318ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}</description>
      <content:encoded>{"uuid": "876b16de-19fb-472f-aea5-f39a820318ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/876b16de-19fb-472f-aea5-f39a820318ef/export</guid>
      <pubDate>Wed, 14 Jun 2023 21:10:04 +0000</pubDate>
    </item>
    <item>
      <title>82d81613-5ba2-46ec-a5c5-0651538a03a9</title>
      <link>https://vulnerability.circl.lu/sighting/82d81613-5ba2-46ec-a5c5-0651538a03a9/export</link>
      <description>{"uuid": "82d81613-5ba2-46ec-a5c5-0651538a03a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/bd1c3290-9486-4bf9-ae59-fe17c0948133", "content": "", "creation_timestamp": "2023-09-06T13:44:31.000000Z"}</description>
      <content:encoded>{"uuid": "82d81613-5ba2-46ec-a5c5-0651538a03a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/bd1c3290-9486-4bf9-ae59-fe17c0948133", "content": "", "creation_timestamp": "2023-09-06T13:44:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/82d81613-5ba2-46ec-a5c5-0651538a03a9/export</guid>
      <pubDate>Wed, 06 Sep 2023 13:44:31 +0000</pubDate>
    </item>
    <item>
      <title>b5d25e7a-f021-42d7-abf8-58d9808fbe5a</title>
      <link>https://vulnerability.circl.lu/sighting/b5d25e7a-f021-42d7-abf8-58d9808fbe5a/export</link>
      <description>{"uuid": "b5d25e7a-f021-42d7-abf8-58d9808fbe5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5380", "content": "#exploit\n1. CVE-2022-21241:\nCSV+ 0.8.0 - 2-Click Arbitrary Code Execution\nhttps://github.com/satoki/csv-plus_vulnerability\n\n2. CVE-2022-21999, CVE-2022-22718:\nSpoolFool - Windows Print Spooler Privilege Escalation\nhttps://research.ifcr.dk/spoolfool-windows-print-spooler-privilege-escalation-cve-2022-22718-bf7752b68d81\n]-&amp;gt; The functional exploit and DLL:\nhttps://github.com/ly4k/SpoolFool", "creation_timestamp": "2024-10-11T22:00:31.000000Z"}</description>
      <content:encoded>{"uuid": "b5d25e7a-f021-42d7-abf8-58d9808fbe5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5380", "content": "#exploit\n1. CVE-2022-21241:\nCSV+ 0.8.0 - 2-Click Arbitrary Code Execution\nhttps://github.com/satoki/csv-plus_vulnerability\n\n2. CVE-2022-21999, CVE-2022-22718:\nSpoolFool - Windows Print Spooler Privilege Escalation\nhttps://research.ifcr.dk/spoolfool-windows-print-spooler-privilege-escalation-cve-2022-22718-bf7752b68d81\n]-&amp;gt; The functional exploit and DLL:\nhttps://github.com/ly4k/SpoolFool", "creation_timestamp": "2024-10-11T22:00:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b5d25e7a-f021-42d7-abf8-58d9808fbe5a/export</guid>
      <pubDate>Fri, 11 Oct 2024 22:00:31 +0000</pubDate>
    </item>
    <item>
      <title>eb6f7b48-5ba5-419b-ab77-9370d27503a2</title>
      <link>https://vulnerability.circl.lu/sighting/eb6f7b48-5ba5-419b-ab77-9370d27503a2/export</link>
      <description>{"uuid": "eb6f7b48-5ba5-419b-ab77-9370d27503a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971452", "content": "", "creation_timestamp": "2024-12-24T20:29:33.212237Z"}</description>
      <content:encoded>{"uuid": "eb6f7b48-5ba5-419b-ab77-9370d27503a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971452", "content": "", "creation_timestamp": "2024-12-24T20:29:33.212237Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eb6f7b48-5ba5-419b-ab77-9370d27503a2/export</guid>
      <pubDate>Tue, 24 Dec 2024 20:29:33 +0000</pubDate>
    </item>
    <item>
      <title>1efa2235-23b0-4737-b721-2a95f499d35c</title>
      <link>https://vulnerability.circl.lu/sighting/1efa2235-23b0-4737-b721-2a95f499d35c/export</link>
      <description>{"uuid": "1efa2235-23b0-4737-b721-2a95f499d35c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "Telegram/aWPQ6S4atnyDD3dUH3K-x1BU3R5-n4OL9JH-9OFaA4Rgfst8", "content": "", "creation_timestamp": "2025-01-30T02:17:48.000000Z"}</description>
      <content:encoded>{"uuid": "1efa2235-23b0-4737-b721-2a95f499d35c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "Telegram/aWPQ6S4atnyDD3dUH3K-x1BU3R5-n4OL9JH-9OFaA4Rgfst8", "content": "", "creation_timestamp": "2025-01-30T02:17:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1efa2235-23b0-4737-b721-2a95f499d35c/export</guid>
      <pubDate>Thu, 30 Jan 2025 02:17:48 +0000</pubDate>
    </item>
    <item>
      <title>3b68a024-8be9-4026-af40-2b7de0ffdf42</title>
      <link>https://vulnerability.circl.lu/sighting/3b68a024-8be9-4026-af40-2b7de0ffdf42/export</link>
      <description>{"uuid": "3b68a024-8be9-4026-af40-2b7de0ffdf42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}</description>
      <content:encoded>{"uuid": "3b68a024-8be9-4026-af40-2b7de0ffdf42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3b68a024-8be9-4026-af40-2b7de0ffdf42/export</guid>
      <pubDate>Thu, 06 Feb 2025 03:13:45 +0000</pubDate>
    </item>
    <item>
      <title>308bc1b5-1b49-44bc-b3ef-ca940972d42f</title>
      <link>https://vulnerability.circl.lu/sighting/308bc1b5-1b49-44bc-b3ef-ca940972d42f/export</link>
      <description>{"uuid": "308bc1b5-1b49-44bc-b3ef-ca940972d42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:34.000000Z"}</description>
      <content:encoded>{"uuid": "308bc1b5-1b49-44bc-b3ef-ca940972d42f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/308bc1b5-1b49-44bc-b3ef-ca940972d42f/export</guid>
      <pubDate>Sun, 23 Feb 2025 02:10:34 +0000</pubDate>
    </item>
    <item>
      <title>45da05b3-98db-4419-8849-d23b3cb9f0fb</title>
      <link>https://vulnerability.circl.lu/sighting/45da05b3-98db-4419-8849-d23b3cb9f0fb/export</link>
      <description>{"uuid": "45da05b3-98db-4419-8849-d23b3cb9f0fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:43.000000Z"}</description>
      <content:encoded>{"uuid": "45da05b3-98db-4419-8849-d23b3cb9f0fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21999", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/45da05b3-98db-4419-8849-d23b3cb9f0fb/export</guid>
      <pubDate>Sun, 23 Feb 2025 04:10:43 +0000</pubDate>
    </item>
    <item>
      <title>a13d1a45-f832-49a5-a4b4-7513aa2158e3</title>
      <link>https://vulnerability.circl.lu/sighting/a13d1a45-f832-49a5-a4b4-7513aa2158e3/export</link>
      <description>{"uuid": "a13d1a45-f832-49a5-a4b4-7513aa2158e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-21999", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/54c7f9b1-8660-4360-82f7-8a9d0f201afa", "content": "", "creation_timestamp": "2026-02-02T12:27:58.841823Z"}</description>
      <content:encoded>{"uuid": "a13d1a45-f832-49a5-a4b4-7513aa2158e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-21999", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/54c7f9b1-8660-4360-82f7-8a9d0f201afa", "content": "", "creation_timestamp": "2026-02-02T12:27:58.841823Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a13d1a45-f832-49a5-a4b4-7513aa2158e3/export</guid>
      <pubDate>Mon, 02 Feb 2026 12:27:58 +0000</pubDate>
    </item>
  </channel>
</rss>
