<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T05:35:37.729524+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ef789dbc-5951-4de4-aae6-bd43e6697860/export</id>
    <title>ef789dbc-5951-4de4-aae6-bd43e6697860</title>
    <updated>2026-05-06T05:35:38.127889+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ef789dbc-5951-4de4-aae6-bd43e6697860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "seen", "source": "Telegram/8Tvza3k4qy2IjH2O3f59isxEIVitW69EvgGBkLG1GZexI3E", "content": "", "creation_timestamp": "2026-04-06T21:20:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ef789dbc-5951-4de4-aae6-bd43e6697860/export"/>
    <published>2026-04-06T21:20:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6f3002da-296f-41d4-9f26-4c9e31469a24/export</id>
    <title>6f3002da-296f-41d4-9f26-4c9e31469a24</title>
    <updated>2026-05-06T05:35:38.127819+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6f3002da-296f-41d4-9f26-4c9e31469a24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-35022", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116361542195290387", "content": "", "creation_timestamp": "2026-04-07T04:30:28.205715Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6f3002da-296f-41d4-9f26-4c9e31469a24/export"/>
    <published>2026-04-07T04:30:28.205715+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9c4c3733-3aa4-4e6a-9439-bbfded15b95f/export</id>
    <title>9c4c3733-3aa4-4e6a-9439-bbfded15b95f</title>
    <updated>2026-05-06T05:35:38.127745+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9c4c3733-3aa4-4e6a-9439-bbfded15b95f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-35022", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3miuwz5eh2v26", "content": "", "creation_timestamp": "2026-04-07T04:30:30.318771Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9c4c3733-3aa4-4e6a-9439-bbfded15b95f/export"/>
    <published>2026-04-07T04:30:30.318771+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8f60d848-2de7-4aea-8dfb-230df8767aca/export</id>
    <title>8f60d848-2de7-4aea-8dfb-230df8767aca</title>
    <updated>2026-05-06T05:35:38.127666+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8f60d848-2de7-4aea-8dfb-230df8767aca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3miv42ceude2r", "content": "", "creation_timestamp": "2026-04-07T06:00:37.530701Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8f60d848-2de7-4aea-8dfb-230df8767aca/export"/>
    <published>2026-04-07T06:00:37.530701+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/69e7cfbd-1668-4461-93f1-8fb267d46ec0/export</id>
    <title>69e7cfbd-1668-4461-93f1-8fb267d46ec0</title>
    <updated>2026-05-06T05:35:38.127587+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "69e7cfbd-1668-4461-93f1-8fb267d46ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "seen", "source": "https://bsky.app/profile/crustytldr.bsky.social/post/3mjsuf4rblk25", "content": "", "creation_timestamp": "2026-04-19T02:03:22.999986Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/69e7cfbd-1668-4461-93f1-8fb267d46ec0/export"/>
    <published>2026-04-19T02:03:22.999986+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/621f4319-40e5-48ae-ace6-1cf4d9a982d0/export</id>
    <title>621f4319-40e5-48ae-ace6-1cf4d9a982d0</title>
    <updated>2026-05-06T05:35:38.127490+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "621f4319-40e5-48ae-ace6-1cf4d9a982d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/81827", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a malicious_test\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a pjordann\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-04-27 10:26:45\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nEste es un repositorio para hacer pruebas de seguridad sobre la vulnerabilidad conocida CVE-2026-35022.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-04-27T11:00:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/621f4319-40e5-48ae-ace6-1cf4d9a982d0/export"/>
    <published>2026-04-27T11:00:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/997dbd9a-df24-4a80-9106-6cba4891848a/export</id>
    <title>997dbd9a-df24-4a80-9106-6cba4891848a</title>
    <updated>2026-05-06T05:35:38.127376+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "997dbd9a-df24-4a80-9106-6cba4891848a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "published-proof-of-concept", "source": "Telegram/SPdUhd4HVoLIToB8DVWG5b4lXjNZTDUUT7OIICRBagRYmDU", "content": "", "creation_timestamp": "2026-04-27T15:00:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/997dbd9a-df24-4a80-9106-6cba4891848a/export"/>
    <published>2026-04-27T15:00:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d9d5b96e-79a7-4405-85e9-52cf9d17cbf6/export</id>
    <title>d9d5b96e-79a7-4405-85e9-52cf9d17cbf6</title>
    <updated>2026-05-06T05:35:38.123977+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d9d5b96e-79a7-4405-85e9-52cf9d17cbf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35022", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mknxbunmum2y", "content": "\ud83d\udccc CVE-2026-35022 - Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configura... https://www.cyberhub.blog/cves/CVE-2026-35022", "creation_timestamp": "2026-04-29T20:37:07.440374Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d9d5b96e-79a7-4405-85e9-52cf9d17cbf6/export"/>
    <published>2026-04-29T20:37:07.440374+00:00</published>
  </entry>
</feed>
