<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T20:51:24.627736+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e3bedae8-f98d-40e3-9aa0-5f9dbc633178/export</id>
    <title>e3bedae8-f98d-40e3-9aa0-5f9dbc633178</title>
    <updated>2026-05-08T20:51:25.084336+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e3bedae8-f98d-40e3-9aa0-5f9dbc633178", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3281", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mfszl43ipj2u", "content": "", "creation_timestamp": "2026-02-27T05:55:25.518324Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e3bedae8-f98d-40e3-9aa0-5f9dbc633178/export"/>
    <published>2026-02-27T05:55:25.518324+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de9f5e36-bc30-45c4-8206-d4c8494d5dc5/export</id>
    <title>de9f5e36-bc30-45c4-8206-d4c8494d5dc5</title>
    <updated>2026-05-08T20:51:25.084254+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "de9f5e36-bc30-45c4-8206-d4c8494d5dc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32811", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mhhpjmrfhd2x", "content": "", "creation_timestamp": "2026-03-20T04:46:45.020543Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de9f5e36-bc30-45c4-8206-d4c8494d5dc5/export"/>
    <published>2026-03-20T04:46:45.020543+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6a8e525b-3bbf-4a50-8675-61c4eadcc277/export</id>
    <title>6a8e525b-3bbf-4a50-8675-61c4eadcc277</title>
    <updated>2026-05-08T20:51:25.084168+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6a8e525b-3bbf-4a50-8675-61c4eadcc277", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32813", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhmr6y6qgz2u", "content": "", "creation_timestamp": "2026-03-22T04:59:54.043056Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6a8e525b-3bbf-4a50-8675-61c4eadcc277/export"/>
    <published>2026-03-22T04:59:54.043056+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/866596b3-3330-4e36-a21e-3cea8d831c6f/export</id>
    <title>866596b3-3330-4e36-a21e-3cea8d831c6f</title>
    <updated>2026-05-08T20:51:25.084082+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "866596b3-3330-4e36-a21e-3cea8d831c6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32817", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhmr77k4ix2h", "content": "", "creation_timestamp": "2026-03-22T05:00:01.541632Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/866596b3-3330-4e36-a21e-3cea8d831c6f/export"/>
    <published>2026-03-22T05:00:01.541632+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/974c1638-02e9-4c79-93f7-df6a47a47fd1/export</id>
    <title>974c1638-02e9-4c79-93f7-df6a47a47fd1</title>
    <updated>2026-05-08T20:51:25.084002+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "974c1638-02e9-4c79-93f7-df6a47a47fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32817", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhq7u4pdff24", "content": "", "creation_timestamp": "2026-03-23T14:00:14.915440Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/974c1638-02e9-4c79-93f7-df6a47a47fd1/export"/>
    <published>2026-03-23T14:00:14.915440+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e1ae3ce2-dcce-4951-a239-bc89272e2c5b/export</id>
    <title>e1ae3ce2-dcce-4951-a239-bc89272e2c5b</title>
    <updated>2026-05-08T20:51:25.083921+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e1ae3ce2-dcce-4951-a239-bc89272e2c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32813", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhrciltkuh2h", "content": "", "creation_timestamp": "2026-03-24T00:20:08.582698Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e1ae3ce2-dcce-4951-a239-bc89272e2c5b/export"/>
    <published>2026-03-24T00:20:08.582698+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a6be4744-efbf-4824-9f03-e7a5d71ee588/export</id>
    <title>a6be4744-efbf-4824-9f03-e7a5d71ee588</title>
    <updated>2026-05-08T20:51:25.083828+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a6be4744-efbf-4824-9f03-e7a5d71ee588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32810", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3mhzbcbni6i2i", "content": "", "creation_timestamp": "2026-03-27T04:20:01.327646Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a6be4744-efbf-4824-9f03-e7a5d71ee588/export"/>
    <published>2026-03-27T04:20:01.327646+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f0d3adbe-e334-4839-beef-c46e8d067ce2/export</id>
    <title>f0d3adbe-e334-4839-beef-c46e8d067ce2</title>
    <updated>2026-05-08T20:51:25.083689+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f0d3adbe-e334-4839-beef-c46e8d067ce2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32811", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mic2wqet4x23", "content": "", "creation_timestamp": "2026-03-30T16:20:09.657698Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f0d3adbe-e334-4839-beef-c46e8d067ce2/export"/>
    <published>2026-03-30T16:20:09.657698+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb02e89a-a685-40fd-8ab2-46d2e5e6d8c0/export</id>
    <title>eb02e89a-a685-40fd-8ab2-46d2e5e6d8c0</title>
    <updated>2026-05-08T20:51:25.080282+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb02e89a-a685-40fd-8ab2-46d2e5e6d8c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-32812", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlawyv57id2c", "content": "CVE-2026-42194 - Incomplete fix for CVE-2026-32812: SSRF in admidio\nCVE ID : CVE-2026-42194\n \n Published : May 7, 2026, 4:16 a.m. | 4\u00a0hours, 8\u00a0minutes ago\n \n Description : Admidio is an open-source user management solution. Prior to version 5.0.9, the incomplete SSRF fix in Ad...", "creation_timestamp": "2026-05-07T09:52:41.144800Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb02e89a-a685-40fd-8ab2-46d2e5e6d8c0/export"/>
    <published>2026-05-07T09:52:41.144800+00:00</published>
  </entry>
</feed>
