<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 14:53:05 +0000</lastBuildDate>
    <item>
      <title>e6d7adb9-257c-442b-bc83-1fbb9318a799</title>
      <link>https://vulnerability.circl.lu/sighting/e6d7adb9-257c-442b-bc83-1fbb9318a799/export</link>
      <description>{"uuid": "e6d7adb9-257c-442b-bc83-1fbb9318a799", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32030", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2704", "content": "https://securitylab.github.com/advisories/GHSL-2023-229_GHSL-2023-230_kafka-ui/\n\nRemote Code Execution (RCE) in Apache Kafka User Interface-CVE-2023-52251, CVE-2024-32030\n#\u5206\u6790", "creation_timestamp": "2024-06-24T15:07:04.000000Z"}</description>
      <content:encoded>{"uuid": "e6d7adb9-257c-442b-bc83-1fbb9318a799", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32030", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2704", "content": "https://securitylab.github.com/advisories/GHSL-2023-229_GHSL-2023-230_kafka-ui/\n\nRemote Code Execution (RCE) in Apache Kafka User Interface-CVE-2023-52251, CVE-2024-32030\n#\u5206\u6790", "creation_timestamp": "2024-06-24T15:07:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e6d7adb9-257c-442b-bc83-1fbb9318a799/export</guid>
      <pubDate>Mon, 24 Jun 2024 15:07:04 +0000</pubDate>
    </item>
    <item>
      <title>a4cb6937-dd06-4d30-b602-6db4b8eb40cf</title>
      <link>https://vulnerability.circl.lu/sighting/a4cb6937-dd06-4d30-b602-6db4b8eb40cf/export</link>
      <description>{"uuid": "a4cb6937-dd06-4d30-b602-6db4b8eb40cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32030", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10876", "content": "#exploit\n1. CVE-2024-41003:\nLinux Kernel Vulnerability in the eBPF verifier register limit tracking\nhttps://github.com/google/security-research/security/advisories/GHSA-hfqc-63c7-rj9f\n\n2. CVE-2023-52251,\nCVE-2023-25194,\nCVE-2024-32030:\n3 ways to get RCE in Kafka UI\nhttps://github.blog/security/vulnerability-research/3-ways-to-get-remote-code-execution-in-kafka-ui\n\n3. CVE-2019-8805:\nApple EndpointSecurity Privilege Escalation\nhttps://blog.securelayer7.net/applied-endpointsecurity-framework-previlege-escalation\n]-&amp;gt; PoC: https://github.com/securelayer7/CVE-2019-8805", "creation_timestamp": "2024-07-24T12:51:30.000000Z"}</description>
      <content:encoded>{"uuid": "a4cb6937-dd06-4d30-b602-6db4b8eb40cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32030", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10876", "content": "#exploit\n1. CVE-2024-41003:\nLinux Kernel Vulnerability in the eBPF verifier register limit tracking\nhttps://github.com/google/security-research/security/advisories/GHSA-hfqc-63c7-rj9f\n\n2. CVE-2023-52251,\nCVE-2023-25194,\nCVE-2024-32030:\n3 ways to get RCE in Kafka UI\nhttps://github.blog/security/vulnerability-research/3-ways-to-get-remote-code-execution-in-kafka-ui\n\n3. CVE-2019-8805:\nApple EndpointSecurity Privilege Escalation\nhttps://blog.securelayer7.net/applied-endpointsecurity-framework-previlege-escalation\n]-&amp;gt; PoC: https://github.com/securelayer7/CVE-2019-8805", "creation_timestamp": "2024-07-24T12:51:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a4cb6937-dd06-4d30-b602-6db4b8eb40cf/export</guid>
      <pubDate>Wed, 24 Jul 2024 12:51:30 +0000</pubDate>
    </item>
    <item>
      <title>1913fcb5-fd9f-491c-846d-083669e8bb23</title>
      <link>https://vulnerability.circl.lu/sighting/1913fcb5-fd9f-491c-846d-083669e8bb23/export</link>
      <description>{"uuid": "1913fcb5-fd9f-491c-846d-083669e8bb23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32030", "type": "published-proof-of-concept", "source": "Telegram/VZbEcJjk_8VPNmTbjxcqG21XAk561-TUu6SDqzneFS53n0s", "content": "", "creation_timestamp": "2024-08-01T00:41:31.000000Z"}</description>
      <content:encoded>{"uuid": "1913fcb5-fd9f-491c-846d-083669e8bb23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-32030", "type": "published-proof-of-concept", "source": "Telegram/VZbEcJjk_8VPNmTbjxcqG21XAk561-TUu6SDqzneFS53n0s", "content": "", "creation_timestamp": "2024-08-01T00:41:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1913fcb5-fd9f-491c-846d-083669e8bb23/export</guid>
      <pubDate>Thu, 01 Aug 2024 00:41:31 +0000</pubDate>
    </item>
  </channel>
</rss>
