<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T04:00:52.128000+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/52f73e34-951c-4a93-b90b-57f3788068e4/export</id>
    <title>52f73e34-951c-4a93-b90b-57f3788068e4</title>
    <updated>2026-05-06T04:00:52.138774+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "52f73e34-951c-4a93-b90b-57f3788068e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkokzbugzf2x", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 53 interactions\nCVE-2026-3854: 48 interactions\nCVE-2026-42208: 22 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 53 interactions\nCVE-2026-3854: 31 interactions\nCVE-2026-5545: 17 interactions\n", "creation_timestamp": "2026-04-30T02:30:14.521566Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/52f73e34-951c-4a93-b90b-57f3788068e4/export"/>
    <published>2026-04-30T02:30:14.521566+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ef26bacd-5247-4d8b-9a8e-faae66d330da/export</id>
    <title>ef26bacd-5247-4d8b-9a8e-faae66d330da</title>
    <updated>2026-05-06T04:00:52.138686+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ef26bacd-5247-4d8b-9a8e-faae66d330da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42208", "type": "seen", "source": "https://infosec.exchange/users/Sempf/statuses/116491594726746257", "content": "This is the issue with AI in criminal hands. Speed to market.\nhttps://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html?m=1", "creation_timestamp": "2026-04-30T03:44:32.065811Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ef26bacd-5247-4d8b-9a8e-faae66d330da/export"/>
    <published>2026-04-30T03:44:32.065811+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/33be73d7-f57e-4347-a7b7-bcb2f3d0a845/export</id>
    <title>33be73d7-f57e-4347-a7b7-bcb2f3d0a845</title>
    <updated>2026-05-06T04:00:52.138602+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "33be73d7-f57e-4347-a7b7-bcb2f3d0a845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42208", "type": "seen", "source": "https://bsky.app/profile/Sempf.infosec.exchange.ap.brid.gy/post/3mkop6eilvc62", "content": "This is the issue with AI in criminal hands. Speed to market.\n\nhttps://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html?m=1", "creation_timestamp": "2026-04-30T03:44:44.560735Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/33be73d7-f57e-4347-a7b7-bcb2f3d0a845/export"/>
    <published>2026-04-30T03:44:44.560735+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/232595ee-ced4-4e63-a6c9-345cee9ba83a/export</id>
    <title>232595ee-ced4-4e63-a6c9-345cee9ba83a</title>
    <updated>2026-05-06T04:00:52.138520+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "232595ee-ced4-4e63-a6c9-345cee9ba83a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/allaboutsecurity.bsky.social/post/3mkovhifykk2s", "content": "LiteLLM-Sicherheitsl\u00fccke CVE-2026-42208: SQL-Injection binnen 36 Stunden nach Ver\u00f6ffentlichung aktiv ausgenutzt\nwww.all-about-security.de/litellm-sich...\n#cve #llm #cybersecurity #itsecurity #itsicherheit", "creation_timestamp": "2026-04-30T05:37:11.383339Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/232595ee-ced4-4e63-a6c9-345cee9ba83a/export"/>
    <published>2026-04-30T05:37:11.383339+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b81f725e-0517-47de-8bbc-56b73f5102ab/export</id>
    <title>b81f725e-0517-47de-8bbc-56b73f5102ab</title>
    <updated>2026-05-06T04:00:52.138434+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b81f725e-0517-47de-8bbc-56b73f5102ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://t.me/cibsecurity/89235", "content": "\ud83d\udd8b\ufe0f LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure \ud83d\udd8b\ufe0f\n\nIn yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowledge. The vulnerability, tracked as CVE202642208 CVSS score 9.3, is an SQL injection that could be exploited to modify the underlying.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2026-04-30T05:50:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b81f725e-0517-47de-8bbc-56b73f5102ab/export"/>
    <published>2026-04-30T05:50:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ca15b137-275c-490d-9d20-8f029835143e/export</id>
    <title>ca15b137-275c-490d-9d20-8f029835143e</title>
    <updated>2026-05-06T04:00:52.138354+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ca15b137-275c-490d-9d20-8f029835143e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/reconbee.bsky.social/post/3mkox5jjzkk2y", "content": "LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure reconbee.com/litellm-cve-...\n\n#LiteLLM #LLM #sqlinjection #SQL #cybersecurity #cyberattack", "creation_timestamp": "2026-04-30T06:07:26.116309Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ca15b137-275c-490d-9d20-8f029835143e/export"/>
    <published>2026-04-30T06:07:26.116309+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f26c8738-f528-4881-91f9-3595bfdea218/export</id>
    <title>f26c8738-f528-4881-91f9-3595bfdea218</title>
    <updated>2026-05-06T04:00:52.138266+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f26c8738-f528-4881-91f9-3595bfdea218", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/ransomnews.online/post/3mkphlxxytx2p", "content": "\ud83d\udea8 LiteLLM was hit 36 hours after disclosure\n\nCVE-2026-42208 is a pre-auth SQLi in #LiteLLM\u2019s proxy key verification flow, and #Sysdig saw attacks 36 hours after advisory indexing targeting API keys, provider credentials and env config.\n\n\ud83d\udd17 read more: www.securityweek.com/fresh-litell...\n\n#ransomNews", "creation_timestamp": "2026-04-30T11:01:46.650129Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f26c8738-f528-4881-91f9-3595bfdea218/export"/>
    <published>2026-04-30T11:01:46.650129+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/246af399-cb3e-4be5-ad39-274d2a3c0208/export</id>
    <title>246af399-cb3e-4be5-ad39-274d2a3c0208</title>
    <updated>2026-05-06T04:00:52.138172+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "246af399-cb3e-4be5-ad39-274d2a3c0208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mkqhpjd6ic2g", "content": "CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure\n\nAttackers quickly exploited a critical LiteLLM flaw (CVE-2026-42208) to access and modify sensitive database data via SQL injection. Attackers rapidly exploited a critical vulnerability in LiteLLM\u00a0Python pac\u2026\n#hackernews #llm #news", "creation_timestamp": "2026-04-30T20:36:25.396863Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/246af399-cb3e-4be5-ad39-274d2a3c0208/export"/>
    <published>2026-04-30T20:36:25.396863+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/326908d6-228f-4f67-9ed3-92044253b5bf/export</id>
    <title>326908d6-228f-4f67-9ed3-92044253b5bf</title>
    <updated>2026-05-06T04:00:52.138040+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "326908d6-228f-4f67-9ed3-92044253b5bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42208", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mkr4ajgl2kvh", "content": "CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure https://securityaffairs.com/191483/hacking/cve-2026-42208-litellm-bug-exploited-36-hours-after-its-disclosure.html", "creation_timestamp": "2026-05-01T02:44:14.799425Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/326908d6-228f-4f67-9ed3-92044253b5bf/export"/>
    <published>2026-05-01T02:44:14.799425+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a67f0e62-1ee1-4e59-8b77-c73493d8b1c0/export</id>
    <title>a67f0e62-1ee1-4e59-8b77-c73493d8b1c0</title>
    <updated>2026-05-06T04:00:52.136406+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a67f0e62-1ee1-4e59-8b77-c73493d8b1c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42208", "type": "seen", "source": "Telegram/T6MjwEy1GXd0xTLgBckUymGQqfeNIMlbkOpXvJPPSDtMl2M", "content": "", "creation_timestamp": "2026-05-03T15:00:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a67f0e62-1ee1-4e59-8b77-c73493d8b1c0/export"/>
    <published>2026-05-03T15:00:06+00:00</published>
  </entry>
</feed>
