<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T07:35:57.335072+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c1bb3419-61ef-4c00-81af-461e3a1221d0/export</id>
    <title>c1bb3419-61ef-4c00-81af-461e3a1221d0</title>
    <updated>2026-05-08T07:35:57.376895+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "c1bb3419-61ef-4c00-81af-461e3a1221d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-27944", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-missing-authentication-vulnerability-nginx-ui-leads-full-system", "content": "", "creation_timestamp": "2026-03-10T15:59:43.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c1bb3419-61ef-4c00-81af-461e3a1221d0/export"/>
    <published>2026-03-10T15:59:43+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e0631175-b844-491f-b2f7-7d7bc1fdbf22/export</id>
    <title>e0631175-b844-491f-b2f7-7d7bc1fdbf22</title>
    <updated>2026-05-08T07:35:57.376782+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e0631175-b844-491f-b2f7-7d7bc1fdbf22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-27944", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/371", "content": "Hello, this is the best type and advanced PoC of CVE-2026-27944 that you ever can find on the Internet , we have developed a lot and it can byp4ss wafs and automatically download exp0sed backups, decrypt them and extract sensitive configuration data, including dbs creds, t0k3ns, and other useful information sometimes stored in backups or memory structures.\n\nFor any problems, or to purchase VIP access and features, please contact: @uncodeboss \n\nFofa: title=\"Nginx UI\" \n\nShodan: http.title:\"Nginx UI\"\n\nEnjoy;\n\nThis content is shared strictly for authorized testing, educational, and research purposes only. It is not intended for malicious use. All techniques, tools, or information provided are meant to demonstrate security concepts and to raise awareness in a controlled and legal environment. Please do not remove or flag this content, as it is shared responsibly for learning and academic purposes.", "creation_timestamp": "2026-03-10T21:53:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e0631175-b844-491f-b2f7-7d7bc1fdbf22/export"/>
    <published>2026-03-10T21:53:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/be79f879-9a8c-4029-992d-d7545befb9d1/export</id>
    <title>be79f879-9a8c-4029-992d-d7545befb9d1</title>
    <updated>2026-05-08T07:35:57.375722+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "be79f879-9a8c-4029-992d-d7545befb9d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-27944", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/actualite/CERTFR-2026-ACT-011/", "content": "", "creation_timestamp": "2026-03-16T00:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/be79f879-9a8c-4029-992d-d7545befb9d1/export"/>
    <published>2026-03-16T00:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f4f8d8f4-dda8-467f-b9c4-d5f7654a3dcb/export</id>
    <title>f4f8d8f4-dda8-467f-b9c4-d5f7654a3dcb</title>
    <updated>2026-05-08T07:35:57.375645+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f4f8d8f4-dda8-467f-b9c4-d5f7654a3dcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-27944", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mhgvmdlioo2h", "content": "", "creation_timestamp": "2026-03-19T21:03:01.692128Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f4f8d8f4-dda8-467f-b9c4-d5f7654a3dcb/export"/>
    <published>2026-03-19T21:03:01.692128+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/67f9acac-f51a-40e8-8109-152340a6e4d2/export</id>
    <title>67f9acac-f51a-40e8-8109-152340a6e4d2</title>
    <updated>2026-05-08T07:35:57.375568+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "67f9acac-f51a-40e8-8109-152340a6e4d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-27944", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhoqw3swrw2i", "content": "", "creation_timestamp": "2026-03-23T00:00:15.112056Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/67f9acac-f51a-40e8-8109-152340a6e4d2/export"/>
    <published>2026-03-23T00:00:15.112056+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e062eae8-0c7b-45fe-8832-96613955cf94/export</id>
    <title>e062eae8-0c7b-45fe-8832-96613955cf94</title>
    <updated>2026-05-08T07:35:57.375478+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e062eae8-0c7b-45fe-8832-96613955cf94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-27944", "type": "seen", "source": "https://bsky.app/profile/0xdf.bsky.social/post/3migk26go5a25", "content": "", "creation_timestamp": "2026-04-01T11:01:10.079846Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e062eae8-0c7b-45fe-8832-96613955cf94/export"/>
    <published>2026-04-01T11:01:10.079846+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7f0447b5-089f-45fc-b88b-8ee12098695e/export</id>
    <title>7f0447b5-089f-45fc-b88b-8ee12098695e</title>
    <updated>2026-05-08T07:35:57.375398+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7f0447b5-089f-45fc-b88b-8ee12098695e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-27944", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mii5vb4mib2l", "content": "", "creation_timestamp": "2026-04-02T02:28:59.260389Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7f0447b5-089f-45fc-b88b-8ee12098695e/export"/>
    <published>2026-04-02T02:28:59.260389+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4530ea92-cdb6-4e73-8c3b-00c670f80aed/export</id>
    <title>4530ea92-cdb6-4e73-8c3b-00c670f80aed</title>
    <updated>2026-05-08T07:35:57.375308+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4530ea92-cdb6-4e73-8c3b-00c670f80aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-27944", "type": "published-proof-of-concept", "source": "Telegram/os88SBnIxm2unq36kG5-IN3u61MzjKGV6jmqq5X9_izXolg", "content": "", "creation_timestamp": "2026-04-03T03:00:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4530ea92-cdb6-4e73-8c3b-00c670f80aed/export"/>
    <published>2026-04-03T03:00:07+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cc4c97a5-eee5-44ee-a212-7d2fa6aafcc5/export</id>
    <title>cc4c97a5-eee5-44ee-a212-7d2fa6aafcc5</title>
    <updated>2026-05-08T07:35:57.375180+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cc4c97a5-eee5-44ee-a212-7d2fa6aafcc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-27944", "type": "seen", "source": "https://t.me/GithubRedTeam/83124", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-27944\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a jake-young-dev\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-06 22:59:29\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nAn educational deep-dive into CVE-2026-27944\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-06T23:00:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cc4c97a5-eee5-44ee-a212-7d2fa6aafcc5/export"/>
    <published>2026-05-06T23:00:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1ebea9b5-6b8c-41f9-81f7-e5e9971b3253/export</id>
    <title>1ebea9b5-6b8c-41f9-81f7-e5e9971b3253</title>
    <updated>2026-05-08T07:35:57.372258+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1ebea9b5-6b8c-41f9-81f7-e5e9971b3253", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-27944", "type": "seen", "source": "https://t.me/GithubRedTeam/83265", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a HTB-Snapped-Writeup\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a karimelsheikh1\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-07 21:16:35\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nHTB Snapped \u2014 Hard Linux machine writeup. CVE-2026-27944 (Nginx UI unauthenticated backup disclosure) chained with CVE-2026-3888 (snapd race condition LPE) to achieve full system compromise.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-07T22:00:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1ebea9b5-6b8c-41f9-81f7-e5e9971b3253/export"/>
    <published>2026-05-07T22:00:05+00:00</published>
  </entry>
</feed>
