<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 12:08:24 +0000</lastBuildDate>
    <item>
      <title>10d18e19-15cc-4001-be8d-b691b742b16d</title>
      <link>https://vulnerability.circl.lu/sighting/10d18e19-15cc-4001-be8d-b691b742b16d/export</link>
      <description>{"uuid": "10d18e19-15cc-4001-be8d-b691b742b16d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20693", "type": "seen", "source": "https://t.me/arpsyndicate/4475", "content": "#ExploitObserverAlert\n\nCVE-2024-20693\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-20693. Windows Kernel Elevation of Privilege Vulnerability\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-04-11T08:05:47.000000Z"}</description>
      <content:encoded>{"uuid": "10d18e19-15cc-4001-be8d-b691b742b16d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20693", "type": "seen", "source": "https://t.me/arpsyndicate/4475", "content": "#ExploitObserverAlert\n\nCVE-2024-20693\n\nDESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-20693. Windows Kernel Elevation of Privilege Vulnerability\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-04-11T08:05:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/10d18e19-15cc-4001-be8d-b691b742b16d/export</guid>
      <pubDate>Thu, 11 Apr 2024 08:05:47 +0000</pubDate>
    </item>
    <item>
      <title>9c9752ae-1ff5-4205-8f7a-10c8a636ecad</title>
      <link>https://vulnerability.circl.lu/sighting/9c9752ae-1ff5-4205-8f7a-10c8a636ecad/export</link>
      <description>{"uuid": "9c9752ae-1ff5-4205-8f7a-10c8a636ecad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2343", "content": "https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability\n\nCVE-2024-20697: WINDOWS LIBARCHIVE REMOTE CODE EXECUTION VULNERABILITY\n#\u5206\u6790", "creation_timestamp": "2024-04-18T17:15:40.000000Z"}</description>
      <content:encoded>{"uuid": "9c9752ae-1ff5-4205-8f7a-10c8a636ecad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2343", "content": "https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability\n\nCVE-2024-20697: WINDOWS LIBARCHIVE REMOTE CODE EXECUTION VULNERABILITY\n#\u5206\u6790", "creation_timestamp": "2024-04-18T17:15:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9c9752ae-1ff5-4205-8f7a-10c8a636ecad/export</guid>
      <pubDate>Thu, 18 Apr 2024 17:15:40 +0000</pubDate>
    </item>
    <item>
      <title>c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f</title>
      <link>https://vulnerability.circl.lu/sighting/c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f/export</link>
      <description>{"uuid": "c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10357", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-19T16:41:11.000000Z"}</description>
      <content:encoded>{"uuid": "c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10357", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-19T16:41:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c4e9f27b-b8c7-4b7c-a7b4-a820b2d0bb6f/export</guid>
      <pubDate>Fri, 19 Apr 2024 16:41:11 +0000</pubDate>
    </item>
    <item>
      <title>2b7499f6-5b5b-42b0-8982-ca4073557583</title>
      <link>https://vulnerability.circl.lu/sighting/2b7499f6-5b5b-42b0-8982-ca4073557583/export</link>
      <description>{"uuid": "2b7499f6-5b5b-42b0-8982-ca4073557583", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/3623", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-20T13:07:57.000000Z"}</description>
      <content:encoded>{"uuid": "2b7499f6-5b5b-42b0-8982-ca4073557583", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/3623", "content": "#exploit\n1. CVE-2024-31869:\nApache Airflow: Sensitive configuration for providers displayed when \"non-sensitive-only\" config used\nhttps://seclists.org/oss-sec/2024/q2/138\n\n2. CVE-2024-20697:\nWindows Libarchive RCE\nhttps://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability", "creation_timestamp": "2024-04-20T13:07:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2b7499f6-5b5b-42b0-8982-ca4073557583/export</guid>
      <pubDate>Sat, 20 Apr 2024 13:07:57 +0000</pubDate>
    </item>
    <item>
      <title>6f071bf2-9c7c-4997-88b6-983fbf55438f</title>
      <link>https://vulnerability.circl.lu/sighting/6f071bf2-9c7c-4997-88b6-983fbf55438f/export</link>
      <description>{"uuid": "6f071bf2-9c7c-4997-88b6-983fbf55438f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20693", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10690", "content": "#exploit\n1. CVE-2024-20693:\nWindows cached code signature manipulation\nhttps://sector7.computest.nl/post/2024-06-cve-2024-20693-windows-cached-code-signature-manipulation\n\n2. CVE-2024-27804:\nApple iOS/iPadOS Kernel Memory Corruption\nhttps://github.com/R00tkitSMM/CVE-2024-27804", "creation_timestamp": "2024-06-17T18:10:14.000000Z"}</description>
      <content:encoded>{"uuid": "6f071bf2-9c7c-4997-88b6-983fbf55438f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20693", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10690", "content": "#exploit\n1. CVE-2024-20693:\nWindows cached code signature manipulation\nhttps://sector7.computest.nl/post/2024-06-cve-2024-20693-windows-cached-code-signature-manipulation\n\n2. CVE-2024-27804:\nApple iOS/iPadOS Kernel Memory Corruption\nhttps://github.com/R00tkitSMM/CVE-2024-27804", "creation_timestamp": "2024-06-17T18:10:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6f071bf2-9c7c-4997-88b6-983fbf55438f/export</guid>
      <pubDate>Mon, 17 Jun 2024 18:10:14 +0000</pubDate>
    </item>
    <item>
      <title>196c0ab1-a7d1-4731-968c-b40ce6bacb7c</title>
      <link>https://vulnerability.circl.lu/sighting/196c0ab1-a7d1-4731-968c-b40ce6bacb7c/export</link>
      <description>{"uuid": "196c0ab1-a7d1-4731-968c-b40ce6bacb7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2568", "content": "#exploit\n1. CVE-2023-45185:\nRCE via insecure deserialisation in IBM i Access Client Solutions &amp;lt; 1.1.9\nhttps://github.com/afine-com/CVE-2023-45185\n\n2. CVE-2023-50445/CVE-2023-50919:\nGL.iNet Unauthenticated RCE\nhttps://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html\n\n3. CVE-2024-20698:\nWindows Kernel EoP\nhttps://github.com/RomanRybachek/CVE-2024-20698", "creation_timestamp": "2024-08-16T09:02:40.000000Z"}</description>
      <content:encoded>{"uuid": "196c0ab1-a7d1-4731-968c-b40ce6bacb7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2568", "content": "#exploit\n1. CVE-2023-45185:\nRCE via insecure deserialisation in IBM i Access Client Solutions &amp;lt; 1.1.9\nhttps://github.com/afine-com/CVE-2023-45185\n\n2. CVE-2023-50445/CVE-2023-50919:\nGL.iNet Unauthenticated RCE\nhttps://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html\n\n3. CVE-2024-20698:\nWindows Kernel EoP\nhttps://github.com/RomanRybachek/CVE-2024-20698", "creation_timestamp": "2024-08-16T09:02:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/196c0ab1-a7d1-4731-968c-b40ce6bacb7c/export</guid>
      <pubDate>Fri, 16 Aug 2024 09:02:40 +0000</pubDate>
    </item>
    <item>
      <title>4ed243cc-5813-43c3-a959-c6560066a791</title>
      <link>https://vulnerability.circl.lu/sighting/4ed243cc-5813-43c3-a959-c6560066a791/export</link>
      <description>{"uuid": "4ed243cc-5813-43c3-a959-c6560066a791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1696/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "4ed243cc-5813-43c3-a959-c6560066a791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20697", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1696/", "content": "", "creation_timestamp": "2024-12-19T05:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4ed243cc-5813-43c3-a959-c6560066a791/export</guid>
      <pubDate>Thu, 19 Dec 2024 05:00:00 +0000</pubDate>
    </item>
    <item>
      <title>d99a8931-82a2-4e31-b065-c487850d3a5c</title>
      <link>https://vulnerability.circl.lu/sighting/d99a8931-82a2-4e31-b065-c487850d3a5c/export</link>
      <description>{"uuid": "d99a8931-82a2-4e31-b065-c487850d3a5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12292", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20696\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Windows libarchive Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:56:52.848Z\n\ud83d\udccf Modified: 2025-04-17T17:51:31.051Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696", "creation_timestamp": "2025-04-17T17:57:22.000000Z"}</description>
      <content:encoded>{"uuid": "d99a8931-82a2-4e31-b065-c487850d3a5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20696", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12292", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20696\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Windows libarchive Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:56:52.848Z\n\ud83d\udccf Modified: 2025-04-17T17:51:31.051Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696", "creation_timestamp": "2025-04-17T17:57:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d99a8931-82a2-4e31-b065-c487850d3a5c/export</guid>
      <pubDate>Thu, 17 Apr 2025 17:57:22 +0000</pubDate>
    </item>
    <item>
      <title>a41ac1d1-ec8a-4168-af3f-d8867121585f</title>
      <link>https://vulnerability.circl.lu/sighting/a41ac1d1-ec8a-4168-af3f-d8867121585f/export</link>
      <description>{"uuid": "a41ac1d1-ec8a-4168-af3f-d8867121585f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20692", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14672", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20692\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:57:07.695Z\n\ud83d\udccf Modified: 2025-05-03T01:46:49.131Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20692", "creation_timestamp": "2025-05-03T02:16:42.000000Z"}</description>
      <content:encoded>{"uuid": "a41ac1d1-ec8a-4168-af3f-d8867121585f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20692", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14672", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20692\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability\n\ud83d\udccf Published: 2024-01-09T17:57:07.695Z\n\ud83d\udccf Modified: 2025-05-03T01:46:49.131Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20692", "creation_timestamp": "2025-05-03T02:16:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a41ac1d1-ec8a-4168-af3f-d8867121585f/export</guid>
      <pubDate>Sat, 03 May 2025 02:16:42 +0000</pubDate>
    </item>
    <item>
      <title>abdc5233-a8ec-4125-9b72-a58b80444efa</title>
      <link>https://vulnerability.circl.lu/sighting/abdc5233-a8ec-4125-9b72-a58b80444efa/export</link>
      <description>{"uuid": "abdc5233-a8ec-4125-9b72-a58b80444efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20696", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:20.000000Z"}</description>
      <content:encoded>{"uuid": "abdc5233-a8ec-4125-9b72-a58b80444efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20696", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/abdc5233-a8ec-4125-9b72-a58b80444efa/export</guid>
      <pubDate>Tue, 26 Aug 2025 18:36:20 +0000</pubDate>
    </item>
  </channel>
</rss>
