<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T06:59:43.234907+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a42d3122-b416-4935-903c-07e4b265362f/export</id>
    <title>a42d3122-b416-4935-903c-07e4b265362f</title>
    <updated>2026-05-10T06:59:43.608436+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "a42d3122-b416-4935-903c-07e4b265362f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-40978", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/spring-security-advisory-av26-397", "content": "", "creation_timestamp": "2026-04-27T11:57:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a42d3122-b416-4935-903c-07e4b265362f/export"/>
    <published>2026-04-27T11:57:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0e2263d0-11b0-4754-a68c-351a8c28134d/export</id>
    <title>0e2263d0-11b0-4754-a68c-351a8c28134d</title>
    <updated>2026-05-10T06:59:43.608289+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0e2263d0-11b0-4754-a68c-351a8c28134d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40978", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkkkritijh27", "content": "", "creation_timestamp": "2026-04-28T12:17:24.716841Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0e2263d0-11b0-4754-a68c-351a8c28134d/export"/>
    <published>2026-04-28T12:17:24.716841+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cc0763bc-d61e-4cc9-96df-97ded987f5a6/export</id>
    <title>cc0763bc-d61e-4cc9-96df-97ded987f5a6</title>
    <updated>2026-05-10T06:59:43.608114+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cc0763bc-d61e-4cc9-96df-97ded987f5a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40978", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mknsax7juy2p", "content": "\ud83d\udccc CVE-2026-40978 - SQL injection vulnerability in Spring AI's `CosmosDBVectorStore` allows attackers to execute arbitrary SQL queries via crafted document IDs.\n\nAffected... https://www.cyberhub.blog/cves/CVE-2026-40978", "creation_timestamp": "2026-04-29T19:07:08.418684Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cc0763bc-d61e-4cc9-96df-97ded987f5a6/export"/>
    <published>2026-04-29T19:07:08.418684+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8f41f4ef-e7b5-4c10-b6d4-ed0585e26217/export</id>
    <title>8f41f4ef-e7b5-4c10-b6d4-ed0585e26217</title>
    <updated>2026-05-10T06:59:43.605793+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8f41f4ef-e7b5-4c10-b6d4-ed0585e26217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40978", "type": "seen", "source": "https://bsky.app/profile/keiwork35.bsky.social/post/3mldle4pmpc22", "content": "\u3010\u8106\u5f31\u6027\u60c5\u5831\u3011 CVE-2026-40978 vmware\u306espring\u00a0ai\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\n\nSpring AI \u306e `CosmosDBVectorStore` \u306b SQL\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027\u304c\u3042\u308a\u3001\u7d30\u5de5\u3055\u308c\u305f document IDs \u3092\u901a\u3058\u3066\u4efb\u610f\u306e SQL \u30af\u30a8\u30ea\u3092\u5b9f\u884c\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002", "creation_timestamp": "2026-05-08T11:02:12.778213Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8f41f4ef-e7b5-4c10-b6d4-ed0585e26217/export"/>
    <published>2026-05-08T11:02:12.778213+00:00</published>
  </entry>
</feed>
