<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T14:57:48.160056+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f68d4103-0e8c-4701-a309-ec662e2d730a/export</id>
    <title>f68d4103-0e8c-4701-a309-ec662e2d730a</title>
    <updated>2026-05-04T14:57:48.508722+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f68d4103-0e8c-4701-a309-ec662e2d730a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33555", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/80597", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-33555\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a r3verii\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-04-16 19:54:01\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nOne zero-byte QUIC packet is enough to desynchronize HAProxy's backend connection pool and smuggle HTTP requests across unrelated users \u2014 even users on a completely different frontend protocol.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-04-16T20:00:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f68d4103-0e8c-4701-a309-ec662e2d730a/export"/>
    <published>2026-04-16T20:00:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d03bba76-d254-4ca1-ac03-2d482cf05453/export</id>
    <title>d03bba76-d254-4ca1-ac03-2d482cf05453</title>
    <updated>2026-05-04T14:57:48.508649+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d03bba76-d254-4ca1-ac03-2d482cf05453", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33555", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3mjn7v22bv52o", "content": "", "creation_timestamp": "2026-04-16T20:13:19.249330Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d03bba76-d254-4ca1-ac03-2d482cf05453/export"/>
    <published>2026-04-16T20:13:19.249330+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/74f21d8e-e7a6-453a-9fb5-b4b8ecc455d5/export</id>
    <title>74f21d8e-e7a6-453a-9fb5-b4b8ecc455d5</title>
    <updated>2026-05-04T14:57:48.508576+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "74f21d8e-e7a6-453a-9fb5-b4b8ecc455d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33555", "type": "published-proof-of-concept", "source": "Telegram/LZnB2uRGjvSMX1a86_gYteJhuOo14W3NiFk2b0mfWdXAigg", "content": "", "creation_timestamp": "2026-04-17T09:00:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/74f21d8e-e7a6-453a-9fb5-b4b8ecc455d5/export"/>
    <published>2026-04-17T09:00:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1e7ebd43-8e45-47b4-bab2-9cf57e8bc406/export</id>
    <title>1e7ebd43-8e45-47b4-bab2-9cf57e8bc406</title>
    <updated>2026-05-04T14:57:48.508498+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1e7ebd43-8e45-47b4-bab2-9cf57e8bc406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33555", "type": "published-proof-of-concept", "source": "Telegram/bj8doEkkdNqHpfVQfl8gvA4415dyF2kRdOr9jMxstG-0IPA", "content": "", "creation_timestamp": "2026-04-17T15:00:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1e7ebd43-8e45-47b4-bab2-9cf57e8bc406/export"/>
    <published>2026-04-17T15:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b97a0a79-085f-4475-8498-0db1074154a6/export</id>
    <title>b97a0a79-085f-4475-8498-0db1074154a6</title>
    <updated>2026-05-04T14:57:48.508418+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b97a0a79-085f-4475-8498-0db1074154a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-33555", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mjtr3r5bky2v", "content": "", "creation_timestamp": "2026-04-19T10:37:07.032772Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b97a0a79-085f-4475-8498-0db1074154a6/export"/>
    <published>2026-04-19T10:37:07.032772+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b01fac9a-54bd-4034-97d2-9f4670f4c6c0/export</id>
    <title>b01fac9a-54bd-4034-97d2-9f4670f4c6c0</title>
    <updated>2026-05-04T14:57:48.508316+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b01fac9a-54bd-4034-97d2-9f4670f4c6c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33555", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mk675fasgt2h", "content": "", "creation_timestamp": "2026-04-23T14:15:11.573569Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b01fac9a-54bd-4034-97d2-9f4670f4c6c0/export"/>
    <published>2026-04-23T14:15:11.573569+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/05763ab1-8803-402e-948b-7843e5e7426d/export</id>
    <title>05763ab1-8803-402e-948b-7843e5e7426d</title>
    <updated>2026-05-04T14:57:48.506738+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "05763ab1-8803-402e-948b-7843e5e7426d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33555", "type": "seen", "source": "https://bsky.app/profile/crustytldr.bsky.social/post/3mkfcjep7gs2y", "content": "", "creation_timestamp": "2026-04-26T10:04:12.813956Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/05763ab1-8803-402e-948b-7843e5e7426d/export"/>
    <published>2026-04-26T10:04:12.813956+00:00</published>
  </entry>
</feed>
