<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:39:17.382085+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8a5c127a-4dcb-470e-806f-9e3bca4f3864/export</id>
    <title>8a5c127a-4dcb-470e-806f-9e3bca4f3864</title>
    <updated>2026-05-04T09:39:17.659777+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8a5c127a-4dcb-470e-806f-9e3bca4f3864", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35382", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html", "content": "", "creation_timestamp": "2024-04-18T16:45:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8a5c127a-4dcb-470e-806f-9e3bca4f3864/export"/>
    <published>2024-04-18T16:45:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/120eb096-54de-4b3b-8d50-dfbcd0402c80/export</id>
    <title>120eb096-54de-4b3b-8d50-dfbcd0402c80</title>
    <updated>2026-05-04T09:39:17.659707+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "120eb096-54de-4b3b-8d50-dfbcd0402c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35386", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2024/12/the-windows-registry-adventure-5-regf.html", "content": "", "creation_timestamp": "2024-12-19T18:03:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/120eb096-54de-4b3b-8d50-dfbcd0402c80/export"/>
    <published>2024-12-19T18:03:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ca37eb07-d64f-4f93-8a83-c480e407dd58/export</id>
    <title>ca37eb07-d64f-4f93-8a83-c480e407dd58</title>
    <updated>2026-05-04T09:39:17.659631+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ca37eb07-d64f-4f93-8a83-c480e407dd58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35382", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2024/12/the-windows-registry-adventure-5-regf.html", "content": "", "creation_timestamp": "2024-12-19T18:03:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ca37eb07-d64f-4f93-8a83-c480e407dd58/export"/>
    <published>2024-12-19T18:03:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/18363086-1209-4ffc-991b-38c096ffc175/export</id>
    <title>18363086-1209-4ffc-991b-38c096ffc175</title>
    <updated>2026-05-04T09:39:17.659543+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "18363086-1209-4ffc-991b-38c096ffc175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35382", "type": "seen", "source": "https://projectzero.google/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T05:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/18363086-1209-4ffc-991b-38c096ffc175/export"/>
    <published>2025-05-23T05:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c00af798-7922-4221-9647-91a208b3f71e/export</id>
    <title>c00af798-7922-4221-9647-91a208b3f71e</title>
    <updated>2026-05-04T09:39:17.659461+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c00af798-7922-4221-9647-91a208b3f71e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35386", "type": "seen", "source": "https://projectzero.google/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T05:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c00af798-7922-4221-9647-91a208b3f71e/export"/>
    <published>2025-05-23T05:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b933b253-111a-480e-9133-e8aefd96ee80/export</id>
    <title>b933b253-111a-480e-9133-e8aefd96ee80</title>
    <updated>2026-05-04T09:39:17.659381+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b933b253-111a-480e-9133-e8aefd96ee80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35386", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T07:05:54.874000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b933b253-111a-480e-9133-e8aefd96ee80/export"/>
    <published>2025-05-23T07:05:54.874000+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ecbce542-797c-4115-93c3-099dd5d199a2/export</id>
    <title>ecbce542-797c-4115-93c3-099dd5d199a2</title>
    <updated>2026-05-04T09:39:17.659283+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ecbce542-797c-4115-93c3-099dd5d199a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35382", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T07:05:54.874000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ecbce542-797c-4115-93c3-099dd5d199a2/export"/>
    <published>2025-05-23T07:05:54.874000+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d976df17-84ae-4712-b9c2-4c527cfd96c6/export</id>
    <title>d976df17-84ae-4712-b9c2-4c527cfd96c6</title>
    <updated>2026-05-04T09:39:17.659196+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d976df17-84ae-4712-b9c2-4c527cfd96c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35382", "type": "seen", "source": "https://projectzero.google/2025/05/the-windows-registry-adventure-8-exploitation.html", "content": "", "creation_timestamp": "2025-05-28T05:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d976df17-84ae-4712-b9c2-4c527cfd96c6/export"/>
    <published>2025-05-28T05:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f3fc2705-7429-4c6c-a882-0a952800ba60/export</id>
    <title>f3fc2705-7429-4c6c-a882-0a952800ba60</title>
    <updated>2026-05-04T09:39:17.659074+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f3fc2705-7429-4c6c-a882-0a952800ba60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35382", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-8-exploitation.html", "content": "", "creation_timestamp": "2025-05-28T16:09:15.861000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f3fc2705-7429-4c6c-a882-0a952800ba60/export"/>
    <published>2025-05-28T16:09:15.861000+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/81530d54-89db-42a6-a6ae-25771154c3a9/export</id>
    <title>81530d54-89db-42a6-a6ae-25771154c3a9</title>
    <updated>2026-05-04T09:39:17.657275+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "81530d54-89db-42a6-a6ae-25771154c3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35386", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/81530d54-89db-42a6-a6ae-25771154c3a9/export"/>
    <published>2025-08-31T03:01:11+00:00</published>
  </entry>
</feed>
