<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T11:38:28.655547+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4016021b-cad1-44ad-9523-d3ab3b3846ba/export</id>
    <title>4016021b-cad1-44ad-9523-d3ab3b3846ba</title>
    <updated>2026-05-09T11:38:29.031807+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4016021b-cad1-44ad-9523-d3ab3b3846ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29972", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlebs4aoxr2q", "content": "\ud83d\udfe0 CVE-2026-29972 - High (8.2)\n\nnanoMODBUS through v1.22.0 has a stack-based buffer overflow in recv_read_registers_res() in nano...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29972/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T17:43:45.881943Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4016021b-cad1-44ad-9523-d3ab3b3846ba/export"/>
    <published>2026-05-08T17:43:45.881943+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb4b35fd-77f8-4338-ae28-ae45884656f7/export</id>
    <title>eb4b35fd-77f8-4338-ae28-ae45884656f7</title>
    <updated>2026-05-09T11:38:29.031686+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb4b35fd-77f8-4338-ae28-ae45884656f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29972", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlee45z3g52p", "content": "CVE-2026-29972 - NanoMODBUS Modbus TCP Server Stack Buffer Overflow Vulnerability\nCVE ID : CVE-2026-29972\n \n Published : May 8, 2026, 4:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : nanoMODBUS through v1.22.0 has a stack-based buffer overflow in recv_read_registers_res() i...", "creation_timestamp": "2026-05-08T18:25:09.100796Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb4b35fd-77f8-4338-ae28-ae45884656f7/export"/>
    <published>2026-05-08T18:25:09.100796+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/90e33b1f-ea8c-4c0b-86fa-b9920b31ffcb/export</id>
    <title>90e33b1f-ea8c-4c0b-86fa-b9920b31ffcb</title>
    <updated>2026-05-09T11:38:29.029473+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "90e33b1f-ea8c-4c0b-86fa-b9920b31ffcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29972", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlegmk3rc72f", "content": "nanoMODBUS v1.22.0\u4ee5\u524d\u3067\u3001Modbus TCP\u30b5\u30fc\u30d0\u30fc\u304b\u3089\u306e\u5fdc\u7b54\u30c7\u30fc\u30bf\u691c\u8a3c\u4e0d\u5099\u306b\u3088\u308a\u3001\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u306e\u53ef\u80fd\u6027\u3002\u30ea\u30e2\u30fc\u30c8\u30b3\u30fc\u30c9\u5b9f\u884c\u306b\u3064\u306a\u304c\u308b\u6050\u308c\u304c\u3042\u308b\u3002\nCVE-2026-29972 CVSS 8.2 | HIGH", "creation_timestamp": "2026-05-08T19:10:06.240052Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/90e33b1f-ea8c-4c0b-86fa-b9920b31ffcb/export"/>
    <published>2026-05-08T19:10:06.240052+00:00</published>
  </entry>
</feed>
