<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T05:42:33.274470+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fd9a054c-9a69-42e2-bb63-adf81949a752/export</id>
    <title>fd9a054c-9a69-42e2-bb63-adf81949a752</title>
    <updated>2026-05-10T05:42:33.657809+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fd9a054c-9a69-42e2-bb63-adf81949a752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34546", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3miflzv36xf27", "content": "", "creation_timestamp": "2026-04-01T02:04:07.306109Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fd9a054c-9a69-42e2-bb63-adf81949a752/export"/>
    <published>2026-04-01T02:04:07.306109+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9850dec-370c-4fb0-805a-86b460ec981c/export</id>
    <title>d9850dec-370c-4fb0-805a-86b460ec981c</title>
    <updated>2026-05-10T05:42:33.657721+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9850dec-370c-4fb0-805a-86b460ec981c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34549", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mifm52eyga22", "content": "", "creation_timestamp": "2026-04-01T02:05:53.580988Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9850dec-370c-4fb0-805a-86b460ec981c/export"/>
    <published>2026-04-01T02:05:53.580988+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f757e19c-4741-4600-bb49-0b840891e788/export</id>
    <title>f757e19c-4741-4600-bb49-0b840891e788</title>
    <updated>2026-05-10T05:42:33.657595+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f757e19c-4741-4600-bb49-0b840891e788", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34547", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mifmdyrvnp24", "content": "", "creation_timestamp": "2026-04-01T02:09:46.775596Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f757e19c-4741-4600-bb49-0b840891e788/export"/>
    <published>2026-04-01T02:09:46.775596+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ad650b4-436d-4eaf-91ae-61da93165f84/export</id>
    <title>4ad650b4-436d-4eaf-91ae-61da93165f84</title>
    <updated>2026-05-10T05:42:33.657452+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ad650b4-436d-4eaf-91ae-61da93165f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34548", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mifmly4dqe22", "content": "", "creation_timestamp": "2026-04-01T02:14:14.586542Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ad650b4-436d-4eaf-91ae-61da93165f84/export"/>
    <published>2026-04-01T02:14:14.586542+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d0cd8c7d-a7ce-4104-8f52-48c3cde00431/export</id>
    <title>d0cd8c7d-a7ce-4104-8f52-48c3cde00431</title>
    <updated>2026-05-10T05:42:33.657320+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d0cd8c7d-a7ce-4104-8f52-48c3cde00431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34545", "type": "published-proof-of-concept", "source": "Telegram/W-ZMhqLt3Z16f8AdFiB8UF-gG99_9hpwzW6X3s6aq-w7Q74", "content": "", "creation_timestamp": "2026-04-01T23:27:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d0cd8c7d-a7ce-4104-8f52-48c3cde00431/export"/>
    <published>2026-04-01T23:27:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bf95ee9c-bad9-43db-a8d5-dfcdf1e19e62/export</id>
    <title>bf95ee9c-bad9-43db-a8d5-dfcdf1e19e62</title>
    <updated>2026-05-10T05:42:33.657171+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bf95ee9c-bad9-43db-a8d5-dfcdf1e19e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34543", "type": "published-proof-of-concept", "source": "Telegram/W-ZMhqLt3Z16f8AdFiB8UF-gG99_9hpwzW6X3s6aq-w7Q74", "content": "", "creation_timestamp": "2026-04-01T23:27:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bf95ee9c-bad9-43db-a8d5-dfcdf1e19e62/export"/>
    <published>2026-04-01T23:27:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7e50a9ce-810f-4b5c-affb-3ab2f0b14a65/export</id>
    <title>7e50a9ce-810f-4b5c-affb-3ab2f0b14a65</title>
    <updated>2026-05-10T05:42:33.656978+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7e50a9ce-810f-4b5c-affb-3ab2f0b14a65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34544", "type": "published-proof-of-concept", "source": "Telegram/W-ZMhqLt3Z16f8AdFiB8UF-gG99_9hpwzW6X3s6aq-w7Q74", "content": "", "creation_timestamp": "2026-04-01T23:27:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7e50a9ce-810f-4b5c-affb-3ab2f0b14a65/export"/>
    <published>2026-04-01T23:27:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f5b4f113-c183-4e35-810e-7434f1880a38/export</id>
    <title>f5b4f113-c183-4e35-810e-7434f1880a38</title>
    <updated>2026-05-10T05:42:33.654077+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f5b4f113-c183-4e35-810e-7434f1880a38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3454", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3zismlb22e", "content": "CVE-2026-3454 - GenerateBlocks\nCVE ID : CVE-2026-3454\n \n Published : May 5, 2026, 7:16 a.m. | 1\u00a0hour, 19\u00a0minutes ago\n \n Description : The GenerateBlocks plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.0. This is ...", "creation_timestamp": "2026-05-05T10:54:06.086645Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f5b4f113-c183-4e35-810e-7434f1880a38/export"/>
    <published>2026-05-05T10:54:06.086645+00:00</published>
  </entry>
</feed>
