<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T17:26:14.844276+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d5809b01-08db-4cca-8228-f945a0d855dc/export</id>
    <title>d5809b01-08db-4cca-8228-f945a0d855dc</title>
    <updated>2026-05-05T17:26:14.872726+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d5809b01-08db-4cca-8228-f945a0d855dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35050", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mitxyx7cuz2g", "content": "", "creation_timestamp": "2026-04-06T19:15:37.172141Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d5809b01-08db-4cca-8228-f945a0d855dc/export"/>
    <published>2026-04-06T19:15:37.172141+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/852514c5-f395-4da9-a661-5f6bf57ae579/export</id>
    <title>852514c5-f395-4da9-a661-5f6bf57ae579</title>
    <updated>2026-05-05T17:26:14.872658+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "852514c5-f395-4da9-a661-5f6bf57ae579", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35050", "type": "published-proof-of-concept", "source": "Telegram/0wjdVVOdHVRh-NR-AUdnOvX_Jcqqbi6lE8Vl80iGy2s6Zy0", "content": "", "creation_timestamp": "2026-04-06T19:29:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/852514c5-f395-4da9-a661-5f6bf57ae579/export"/>
    <published>2026-04-06T19:29:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fbb03b13-5e35-4354-ab51-ef75b8035361/export</id>
    <title>fbb03b13-5e35-4354-ab51-ef75b8035361</title>
    <updated>2026-05-05T17:26:14.872590+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fbb03b13-5e35-4354-ab51-ef75b8035361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35050", "type": "seen", "source": "Telegram/RmP7l-K41x9UoCBscD5W8eizA4yDJaP_JqAKKOeWwXNyu-8", "content": "", "creation_timestamp": "2026-04-06T19:29:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fbb03b13-5e35-4354-ab51-ef75b8035361/export"/>
    <published>2026-04-06T19:29:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f2b755f9-1b32-40ae-a20a-dcbdf26a50b1/export</id>
    <title>f2b755f9-1b32-40ae-a20a-dcbdf26a50b1</title>
    <updated>2026-05-05T17:26:14.872517+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f2b755f9-1b32-40ae-a20a-dcbdf26a50b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3505", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mjjywbtahg2a", "content": "", "creation_timestamp": "2026-04-15T13:30:35.766545Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f2b755f9-1b32-40ae-a20a-dcbdf26a50b1/export"/>
    <published>2026-04-15T13:30:35.766545+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/183b9a88-9abf-41e8-b4c5-6797d9d10e9f/export</id>
    <title>183b9a88-9abf-41e8-b4c5-6797d9d10e9f</title>
    <updated>2026-05-05T17:26:14.872448+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "183b9a88-9abf-41e8-b4c5-6797d9d10e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3505", "type": "published-proof-of-concept", "source": "Telegram/uZRx6HZozAc0thMR3KKbNyvZVgKIzeeLzgWMgVKyfbYH8EA", "content": "", "creation_timestamp": "2026-04-15T15:20:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/183b9a88-9abf-41e8-b4c5-6797d9d10e9f/export"/>
    <published>2026-04-15T15:20:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1141ae3b-5ae1-496f-9673-93a3f149586e/export</id>
    <title>1141ae3b-5ae1-496f-9673-93a3f149586e</title>
    <updated>2026-05-05T17:26:14.872372+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1141ae3b-5ae1-496f-9673-93a3f149586e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35052", "type": "seen", "source": "Telegram/KXW7G8PyX_XZwX9Od1pYkShAhyWITcXi61d9qyY3YKOVjQs", "content": "", "creation_timestamp": "2026-04-20T19:17:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1141ae3b-5ae1-496f-9673-93a3f149586e/export"/>
    <published>2026-04-20T19:17:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b27bdd86-3be0-4826-8124-f570aba69372/export</id>
    <title>b27bdd86-3be0-4826-8124-f570aba69372</title>
    <updated>2026-05-05T17:26:14.872298+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b27bdd86-3be0-4826-8124-f570aba69372", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35050", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mk4cdrm6zn2u", "content": "", "creation_timestamp": "2026-04-22T20:07:07.633988Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b27bdd86-3be0-4826-8124-f570aba69372/export"/>
    <published>2026-04-22T20:07:07.633988+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e81e787f-37f1-4a9a-a8d9-849c0d86fed7/export</id>
    <title>e81e787f-37f1-4a9a-a8d9-849c0d86fed7</title>
    <updated>2026-05-05T17:26:14.872205+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e81e787f-37f1-4a9a-a8d9-849c0d86fed7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35051", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkanez5th22k", "content": "", "creation_timestamp": "2026-04-24T13:35:19.101323Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e81e787f-37f1-4a9a-a8d9-849c0d86fed7/export"/>
    <published>2026-04-24T13:35:19.101323+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/37d79dac-d250-4375-b8c6-b3a86e006405/export</id>
    <title>37d79dac-d250-4375-b8c6-b3a86e006405</title>
    <updated>2026-05-05T17:26:14.872103+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "37d79dac-d250-4375-b8c6-b3a86e006405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-35052", "type": "seen", "source": "https://bsky.app/profile/hugovalters.bsky.social/post/3mkq7eyv5f62v", "content": "D-Tale RCE (CVE-2026-35052): Pickle deserialization pop shells unauth over network. CVSS 9.8. Patch to 3.22.0 or get owned. #DevSecOps #RCE #PickleGadgets\n\n https://www.valtersit.com/cve/2026/04/cve-2026-35052/", "creation_timestamp": "2026-04-30T18:07:30.205744Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/37d79dac-d250-4375-b8c6-b3a86e006405/export"/>
    <published>2026-04-30T18:07:30.205744+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/30cd43b2-b9f8-4a37-9135-b9030ac02721/export</id>
    <title>30cd43b2-b9f8-4a37-9135-b9030ac02721</title>
    <updated>2026-05-05T17:26:14.868864+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "30cd43b2-b9f8-4a37-9135-b9030ac02721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3505", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3mkyrwqeocz2x", "content": "dbeaver 26.0.4 patches CVE-2026-3505\nHigh-severity vulnerability in bcpg-jdk18on (CVE-2026-3505) requires upgrade for security.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/dbeaver-dbeaver/26-0-4", "creation_timestamp": "2026-05-04T04:00:43.079090Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/30cd43b2-b9f8-4a37-9135-b9030ac02721/export"/>
    <published>2026-05-04T04:00:43.079090+00:00</published>
  </entry>
</feed>
