<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T05:27:47.168795+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/02ae2229-0bde-4616-8297-424cc374d0ec/export</id>
    <title>02ae2229-0bde-4616-8297-424cc374d0ec</title>
    <updated>2026-05-06T05:27:47.495228+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "02ae2229-0bde-4616-8297-424cc374d0ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34986", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mitrngvcy22w", "content": "", "creation_timestamp": "2026-04-06T17:21:49.098975Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/02ae2229-0bde-4616-8297-424cc374d0ec/export"/>
    <published>2026-04-06T17:21:49.098975+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6dc40c1f-77f1-4ea2-b9da-bf1cc0c6f060/export</id>
    <title>6dc40c1f-77f1-4ea2-b9da-bf1cc0c6f060</title>
    <updated>2026-05-06T05:27:47.495054+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6dc40c1f-77f1-4ea2-b9da-bf1cc0c6f060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34986", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mitvbdh6do2s", "content": "", "creation_timestamp": "2026-04-06T18:26:37.532426Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6dc40c1f-77f1-4ea2-b9da-bf1cc0c6f060/export"/>
    <published>2026-04-06T18:26:37.532426+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9113942-cd9e-45ce-a29a-8145fd1b85a6/export</id>
    <title>d9113942-cd9e-45ce-a29a-8145fd1b85a6</title>
    <updated>2026-05-06T05:27:47.494869+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9113942-cd9e-45ce-a29a-8145fd1b85a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34986", "type": "published-proof-of-concept", "source": "Telegram/ECjdy8s76GZ_Bal_wnIB79ij56tbajMepr_VumTyCn-zmzM", "content": "", "creation_timestamp": "2026-04-06T19:28:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9113942-cd9e-45ce-a29a-8145fd1b85a6/export"/>
    <published>2026-04-06T19:28:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6e06df88-d63b-4511-9fa1-c31c66ccdda0/export</id>
    <title>6e06df88-d63b-4511-9fa1-c31c66ccdda0</title>
    <updated>2026-05-06T05:27:47.494632+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6e06df88-d63b-4511-9fa1-c31c66ccdda0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34986", "type": "seen", "source": "https://gist.github.com/cwayne18/10d2b4d69bdb66cbe87a09b1637dc409", "content": "", "creation_timestamp": "2026-04-17T17:34:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6e06df88-d63b-4511-9fa1-c31c66ccdda0/export"/>
    <published>2026-04-17T17:34:12+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bb0b641c-46b8-4def-9b94-0a6a7fb1f6b1/export</id>
    <title>bb0b641c-46b8-4def-9b94-0a6a7fb1f6b1</title>
    <updated>2026-05-06T05:27:47.492227+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bb0b641c-46b8-4def-9b94-0a6a7fb1f6b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-34986", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3ml2vdqfofc2g", "content": "semaphore 2.18.1 patches CVE-2026-34986\nAdds AWS/Azure secret backends and fixes auth bypass in secret operations.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/semaphoreui-semaphore/v2-18-1", "creation_timestamp": "2026-05-05T00:07:00.037824Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bb0b641c-46b8-4def-9b94-0a6a7fb1f6b1/export"/>
    <published>2026-05-05T00:07:00.037824+00:00</published>
  </entry>
</feed>
