<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T08:08:12.423012+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ec76baa3-fb3b-42cd-8d3e-cede07c685bc/export</id>
    <title>ec76baa3-fb3b-42cd-8d3e-cede07c685bc</title>
    <updated>2026-05-08T08:08:12.471196+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ec76baa3-fb3b-42cd-8d3e-cede07c685bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfa6fkpl6w25", "content": "", "creation_timestamp": "2026-02-19T18:01:13.300845Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ec76baa3-fb3b-42cd-8d3e-cede07c685bc/export"/>
    <published>2026-02-19T18:01:13.300845+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/54642e2a-425c-483e-8dbe-86513b599c76/export</id>
    <title>54642e2a-425c-483e-8dbe-86513b599c76</title>
    <updated>2026-05-08T08:08:12.471120+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "54642e2a-425c-483e-8dbe-86513b599c76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-26030", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mfaifoydgk22", "content": "", "creation_timestamp": "2026-02-19T21:00:15.310049Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/54642e2a-425c-483e-8dbe-86513b599c76/export"/>
    <published>2026-02-19T21:00:15.310049+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ac82f3fe-bfb3-4250-ae75-dea5c755d1dc/export</id>
    <title>ac82f3fe-bfb3-4250-ae75-dea5c755d1dc</title>
    <updated>2026-05-08T08:08:12.471038+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ac82f3fe-bfb3-4250-ae75-dea5c755d1dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-26030", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116099305500728064", "content": "", "creation_timestamp": "2026-02-19T21:00:27.004464Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ac82f3fe-bfb3-4250-ae75-dea5c755d1dc/export"/>
    <published>2026-02-19T21:00:27.004464+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/21536600-7094-41df-8b60-45afea940812/export</id>
    <title>21536600-7094-41df-8b60-45afea940812</title>
    <updated>2026-05-08T08:08:12.470965+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "21536600-7094-41df-8b60-45afea940812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://bsky.app/profile/cyber-news-fi.bsky.social/post/3mfb5zqxkdc2q", "content": "", "creation_timestamp": "2026-02-20T03:27:17.267444Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/21536600-7094-41df-8b60-45afea940812/export"/>
    <published>2026-02-20T03:27:17.267444+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e75093ac-b13e-46b5-a394-cb78b6a08f9a/export</id>
    <title>e75093ac-b13e-46b5-a394-cb78b6a08f9a</title>
    <updated>2026-05-08T08:08:12.470888+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e75093ac-b13e-46b5-a394-cb78b6a08f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116101670267856847", "content": "", "creation_timestamp": "2026-02-20T07:01:36.997434Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e75093ac-b13e-46b5-a394-cb78b6a08f9a/export"/>
    <published>2026-02-20T07:01:36.997434+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/548c7641-bf4e-40cd-b5e9-89f6ee0fc135/export</id>
    <title>548c7641-bf4e-40cd-b5e9-89f6ee0fc135</title>
    <updated>2026-05-08T08:08:12.470808+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "548c7641-bf4e-40cd-b5e9-89f6ee0fc135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-26030", "type": "seen", "source": "https://bsky.app/profile/cyberlensai.bsky.social/post/3mfxqtp3vty2v", "content": "", "creation_timestamp": "2026-03-01T03:02:30.902970Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/548c7641-bf4e-40cd-b5e9-89f6ee0fc135/export"/>
    <published>2026-03-01T03:02:30.902970+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ff36bd1b-b0e1-425b-ae9d-d6eec78a78f1/export</id>
    <title>ff36bd1b-b0e1-425b-ae9d-d6eec78a78f1</title>
    <updated>2026-05-08T08:08:12.470722+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ff36bd1b-b0e1-425b-ae9d-d6eec78a78f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://www.thezdi.com/blog/2026/3/10/the-march-2026-security-update-review", "content": "", "creation_timestamp": "2026-03-10T16:57:37.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ff36bd1b-b0e1-425b-ae9d-d6eec78a78f1/export"/>
    <published>2026-03-10T16:57:37+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8bf330f8-9244-4af0-b142-46df6c9a3312/export</id>
    <title>8bf330f8-9244-4af0-b142-46df6c9a3312</title>
    <updated>2026-05-08T08:08:12.470602+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "8bf330f8-9244-4af0-b142-46df6c9a3312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+March+2026/32782", "content": "", "creation_timestamp": "2026-03-11T03:00:16.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8bf330f8-9244-4af0-b142-46df6c9a3312/export"/>
    <published>2026-03-11T03:00:16+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dd3d91af-6383-48ac-8aa8-51963842ebb3/export</id>
    <title>dd3d91af-6383-48ac-8aa8-51963842ebb3</title>
    <updated>2026-05-08T08:08:12.468570+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "dd3d91af-6383-48ac-8aa8-51963842ebb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://isc.sans.edu/diary/rss/32782", "content": "", "creation_timestamp": "2026-03-11T03:00:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dd3d91af-6383-48ac-8aa8-51963842ebb3/export"/>
    <published>2026-03-11T03:00:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d7c3e02e-6ff2-4445-babc-743b6caca8c6/export</id>
    <title>d7c3e02e-6ff2-4445-babc-743b6caca8c6</title>
    <updated>2026-05-08T08:08:12.465883+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d7c3e02e-6ff2-4445-babc-743b6caca8c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://swecyb.com/ap/users/116080658609901341/statuses/116535698755654805", "content": "(microsoft.com) Critical Vulnerabilities in Microsoft Semantic Kernel: From Prompt Injection to Remote Code Execution\nCritical vulnerabilities in Microsoft Semantic Kernel (CVE-2026-25592, CVE-2026-26030) enable prompt injection to escalate to host-level RCE or arbitrary file writes, exposing systemic risks in AI agent frameworks.\nIn brief - Two CVEs in Microsoft Semantic Kernel demonstrate how prompt injection can bypass security boundaries, leading to RCE or file writes. Patched via responsible disclosure, but highlights urgent need for secure AI agent architectures.\nTechnically - CVE-2026-26030 exploits unsafe string interpolation in the In-Memory Vector Store\u2019s filter functionality, allowing `eval()`-based RCE via crafted prompts. CVE-2026-25592 abuses exposed `DownloadFileAsync` in the .NET SDK to write files to arbitrary locations, including Startup folders. Exploit chains involve AST traversal and sandbox escape. Mitigations: upgrade, AST allowlists, and tool exposure restrictions. Detection queries provided for post-exploitation activity.\nSource: https://www.microsoft.com/en-us/security/blog/2026/05/07/prompts-become-shells-rce-vulnerabilities-ai-agent-frameworks/\n#Cybersecurity #ThreatIntel", "creation_timestamp": "2026-05-07T22:42:34.934741Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d7c3e02e-6ff2-4445-babc-743b6caca8c6/export"/>
    <published>2026-05-07T22:42:34.934741+00:00</published>
  </entry>
</feed>
