<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T10:54:38.129163+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/50acc356-7760-4a5a-ae16-2ca863dd23b5/export</id>
    <title>50acc356-7760-4a5a-ae16-2ca863dd23b5</title>
    <updated>2026-05-10T10:54:38.525512+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "50acc356-7760-4a5a-ae16-2ca863dd23b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-23479", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3ml53nebovc2j", "content": "redis 8.2.6 patches CVE-2026-23479\nFixes three RCE vulnerabilities caused by memory-safety bugs.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/redis-redis/8-2-6", "creation_timestamp": "2026-05-05T21:05:05.473977Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/50acc356-7760-4a5a-ae16-2ca863dd23b5/export"/>
    <published>2026-05-05T21:05:05.473977+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d4a86a43-55aa-47cf-8ba5-fbd52c65a41a/export</id>
    <title>d4a86a43-55aa-47cf-8ba5-fbd52c65a41a</title>
    <updated>2026-05-10T10:54:38.525292+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d4a86a43-55aa-47cf-8ba5-fbd52c65a41a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-23479", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3ml5fsrua3j23", "content": "redis 8.4.3 patches CVE-2026-23479\nPatches three critical RCE vulnerabilities in client, RESTORE, and Lua operations.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/redis-redis/8-4-3", "creation_timestamp": "2026-05-06T00:07:05.417593Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d4a86a43-55aa-47cf-8ba5-fbd52c65a41a/export"/>
    <published>2026-05-06T00:07:05.417593+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/53beba6d-3c36-4648-aaba-0c0a95876019/export</id>
    <title>53beba6d-3c36-4648-aaba-0c0a95876019</title>
    <updated>2026-05-10T10:54:38.525207+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "53beba6d-3c36-4648-aaba-0c0a95876019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-23479", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3ml5pnlpxo32s", "content": "redis 8.6.3 patches CVE-2026-23479\nMultiple RCE vulnerabilities across client handling, data restore, and scripting.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/redis-redis/8-6-3", "creation_timestamp": "2026-05-06T03:03:07.184230Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/53beba6d-3c36-4648-aaba-0c0a95876019/export"/>
    <published>2026-05-06T03:03:07.184230+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d5fb1697-35ab-466e-94e7-54e825a23025/export</id>
    <title>d5fb1697-35ab-466e-94e7-54e825a23025</title>
    <updated>2026-05-10T10:54:38.525094+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d5fb1697-35ab-466e-94e7-54e825a23025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-23479", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3ml624qsjgu2j", "content": "valkey 9.0.4 patches CVE-2026-23479\nMemory safety bugs in client blocking, data restoration, and Lua execution fixed.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/valkey-io-valkey/9-0-4", "creation_timestamp": "2026-05-06T06:10:33.349807Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d5fb1697-35ab-466e-94e7-54e825a23025/export"/>
    <published>2026-05-06T06:10:33.349807+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5da0cadf-7b82-446b-891e-b374e2aa85ed/export</id>
    <title>5da0cadf-7b82-446b-891e-b374e2aa85ed</title>
    <updated>2026-05-10T10:54:38.525002+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5da0cadf-7b82-446b-891e-b374e2aa85ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-23479", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3ml6wd7neux2u", "content": "\ud83d\udd17 CVE : CVE-2026-23479, CVE-2026-23631, CVE-2026-25243", "creation_timestamp": "2026-05-06T14:35:15.032686Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5da0cadf-7b82-446b-891e-b374e2aa85ed/export"/>
    <published>2026-05-06T14:35:15.032686+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5e5ff60d-f7ff-4445-b119-621019cdd444/export</id>
    <title>5e5ff60d-f7ff-4445-b119-621019cdd444</title>
    <updated>2026-05-10T10:54:38.524904+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "5e5ff60d-f7ff-4445-b119-621019cdd444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-23479", "type": "seen", "source": "https://www.acn.gov.it/portale/w/rilevate-vulnerabilita-in-redis", "content": "", "creation_timestamp": "2026-05-07T05:34:51.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5e5ff60d-f7ff-4445-b119-621019cdd444/export"/>
    <published>2026-05-07T05:34:51+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ee648dac-ca84-44cd-ad4f-96ee3cf4a3f0/export</id>
    <title>ee648dac-ca84-44cd-ad4f-96ee3cf4a3f0</title>
    <updated>2026-05-10T10:54:38.524774+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ee648dac-ca84-44cd-ad4f-96ee3cf4a3f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-23479", "type": "seen", "source": "https://bsky.app/profile/xint-io.bsky.social/post/3mlbyiej4ks2a", "content": "CVE-2026-23479 was one of the high severity bugs we found when we won at Wiz's ZeroDay Cloud competition. Be on the lookout soon for the technical deep dive on ZDC blog \n\nredis.io/blog/securit...", "creation_timestamp": "2026-05-07T19:51:58.300232Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ee648dac-ca84-44cd-ad4f-96ee3cf4a3f0/export"/>
    <published>2026-05-07T19:51:58.300232+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/769e2c00-3a47-4b70-9f56-4e0703e9cf10/export</id>
    <title>769e2c00-3a47-4b70-9f56-4e0703e9cf10</title>
    <updated>2026-05-10T10:54:38.523480+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "769e2c00-3a47-4b70-9f56-4e0703e9cf10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-23479", "type": "seen", "source": "https://bsky.app/profile/xint-io.bsky.social/post/3mlbyigdiq22a", "content": "CVE-2026-23479 was one of the high severity bugs we found when we won at Wiz's ZeroDay Cloud competition. Be on the lookout soon for the technical deep dive on ZDC blog \n\nredis.io/blog/securit...", "creation_timestamp": "2026-05-07T19:51:58.846264Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/769e2c00-3a47-4b70-9f56-4e0703e9cf10/export"/>
    <published>2026-05-07T19:51:58.846264+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/78197e7a-05e1-4faf-a16e-ce6d910146a5/export</id>
    <title>78197e7a-05e1-4faf-a16e-ce6d910146a5</title>
    <updated>2026-05-10T10:54:38.520548+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "78197e7a-05e1-4faf-a16e-ce6d910146a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-23479", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/redis-products-multiple-vulnerabilities_20260508", "content": "", "creation_timestamp": "2026-05-07T20:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/78197e7a-05e1-4faf-a16e-ce6d910146a5/export"/>
    <published>2026-05-07T20:00:00+00:00</published>
  </entry>
</feed>
