<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T06:29:11.934876+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/eb04e0d2-a38f-42e6-b490-87e2fd243f2a/export</id>
    <title>eb04e0d2-a38f-42e6-b490-87e2fd243f2a</title>
    <updated>2026-05-05T06:29:11.948437+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "eb04e0d2-a38f-42e6-b490-87e2fd243f2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33626", "type": "exploited", "source": "https://t.me/cibsecurity/89182", "content": "\ud83d\udd8b\ufe0f LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure \ud83d\udd8b\ufe0f\n\nA highseverity security flaw in LMDeploy, an opensource toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public disclosure. The vulnerability, tracked as CVE202633626 CVSS score 7.5, relates to a ServerSide Request Forgery SSRF vulnerability that could be exploited to access sensitive data. \"A serverside.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2026-04-24T18:15:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/eb04e0d2-a38f-42e6-b490-87e2fd243f2a/export"/>
    <published>2026-04-24T18:15:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b3f76359-825e-4982-8158-bbe94e45f8a4/export</id>
    <title>b3f76359-825e-4982-8158-bbe94e45f8a4</title>
    <updated>2026-05-05T06:29:11.948282+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b3f76359-825e-4982-8158-bbe94e45f8a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33626", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mkcbmqna4s2d", "content": "", "creation_timestamp": "2026-04-25T05:10:13.833285Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b3f76359-825e-4982-8158-bbe94e45f8a4/export"/>
    <published>2026-04-25T05:10:13.833285+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3f24733b-43c7-443a-a404-3bca7be3a33b/export</id>
    <title>3f24733b-43c7-443a-a404-3bca7be3a33b</title>
    <updated>2026-05-05T06:29:11.948113+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3f24733b-43c7-443a-a404-3bca7be3a33b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33626", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mkcvomaxj22o", "content": "", "creation_timestamp": "2026-04-25T11:09:11.452902Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3f24733b-43c7-443a-a404-3bca7be3a33b/export"/>
    <published>2026-04-25T11:09:11.452902+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/88a1197a-0ff4-4fcd-841f-9a2db00893ee/export</id>
    <title>88a1197a-0ff4-4fcd-841f-9a2db00893ee</title>
    <updated>2026-05-05T06:29:11.947942+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "88a1197a-0ff4-4fcd-841f-9a2db00893ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33626", "type": "seen", "source": "https://bsky.app/profile/vitobotta.com/post/3mkd23vhifk2z", "content": "", "creation_timestamp": "2026-04-25T12:28:11.616030Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/88a1197a-0ff4-4fcd-841f-9a2db00893ee/export"/>
    <published>2026-04-25T12:28:11.616030+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/afd2660d-ae1a-4bc7-b276-ee6abaa598fe/export</id>
    <title>afd2660d-ae1a-4bc7-b276-ee6abaa598fe</title>
    <updated>2026-05-05T06:29:11.947769+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "afd2660d-ae1a-4bc7-b276-ee6abaa598fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33626", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3mkexpno2322x", "content": "", "creation_timestamp": "2026-04-26T06:50:55.967885Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/afd2660d-ae1a-4bc7-b276-ee6abaa598fe/export"/>
    <published>2026-04-26T06:50:55.967885+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4c258c51-afb1-45a0-b48b-6e39d0e9aba1/export</id>
    <title>4c258c51-afb1-45a0-b48b-6e39d0e9aba1</title>
    <updated>2026-05-05T06:29:11.947576+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4c258c51-afb1-45a0-b48b-6e39d0e9aba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-33626", "type": "seen", "source": "https://bsky.app/profile/clankussy.abu.guru/post/3mkeyugfefv2s", "content": "", "creation_timestamp": "2026-04-26T07:11:26.415954Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4c258c51-afb1-45a0-b48b-6e39d0e9aba1/export"/>
    <published>2026-04-26T07:11:26.415954+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/76dae10f-1656-45c6-b266-1e9bb4e759d2/export</id>
    <title>76dae10f-1656-45c6-b266-1e9bb4e759d2</title>
    <updated>2026-05-05T06:29:11.947388+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "76dae10f-1656-45c6-b266-1e9bb4e759d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33626", "type": "seen", "source": "https://bsky.app/profile/termsofsurrender.bsky.social/post/3mkg7t6ii2k2s", "content": "", "creation_timestamp": "2026-04-26T18:48:40.524796Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/76dae10f-1656-45c6-b266-1e9bb4e759d2/export"/>
    <published>2026-04-26T18:48:40.524796+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/957fdae2-d285-4763-8067-7934b375bafc/export</id>
    <title>957fdae2-d285-4763-8067-7934b375bafc</title>
    <updated>2026-05-05T06:29:11.947194+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "957fdae2-d285-4763-8067-7934b375bafc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33626", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mkhex2ibkh22", "content": "", "creation_timestamp": "2026-04-27T05:53:13.816428Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/957fdae2-d285-4763-8067-7934b375bafc/export"/>
    <published>2026-04-27T05:53:13.816428+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0ceac6fa-70de-4d7d-95cb-7bf3e0cc9037/export</id>
    <title>0ceac6fa-70de-4d7d-95cb-7bf3e0cc9037</title>
    <updated>2026-05-05T06:29:11.946945+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0ceac6fa-70de-4d7d-95cb-7bf3e0cc9037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-33626", "type": "seen", "source": "https://infosec.exchange/users/patrickcmiller/statuses/116483209581294061", "content": "", "creation_timestamp": "2026-04-28T16:12:05.051958Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0ceac6fa-70de-4d7d-95cb-7bf3e0cc9037/export"/>
    <published>2026-04-28T16:12:05.051958+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a195086e-4398-4058-ac67-853e7ac5a24f/export</id>
    <title>a195086e-4398-4058-ac67-853e7ac5a24f</title>
    <updated>2026-05-05T06:29:11.945058+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a195086e-4398-4058-ac67-853e7ac5a24f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33626", "type": "seen", "source": "https://bsky.app/profile/patrickcmiller.bsky.social/post/3mklpi3bfrf23", "content": "", "creation_timestamp": "2026-04-28T23:12:07.589881Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a195086e-4398-4058-ac67-853e7ac5a24f/export"/>
    <published>2026-04-28T23:12:07.589881+00:00</published>
  </entry>
</feed>
