<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T11:38:28.665073+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3/export</id>
    <title>0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3</title>
    <updated>2026-05-09T11:38:29.036926+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyiu6f3ct2w", "content": "\ud83d\udd34 CVE-2026-42369 - Critical (10)\n\nGV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance cameras a...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42369/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T01:18:13.364023Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3/export"/>
    <published>2026-05-04T01:18:13.364023+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c610b189-6127-420c-bda1-d7d11c5ca926/export</id>
    <title>c610b189-6127-420c-bda1-d7d11c5ca926</title>
    <updated>2026-05-09T11:38:29.036847+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c610b189-6127-420c-bda1-d7d11c5ca926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkynz6jpjl2h", "content": "CVE-2026-42369 - GeoVision GV-VMS V20 WebCam Server stack overflow vulnerability\nCVE ID : CVE-2026-42369\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : GV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance camer...", "creation_timestamp": "2026-05-04T02:50:29.698799Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c610b189-6127-420c-bda1-d7d11c5ca926/export"/>
    <published>2026-05-04T02:50:29.698799+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/23021fbb-6d7c-4f6e-a906-18b70b69e3ec/export</id>
    <title>23021fbb-6d7c-4f6e-a906-18b70b69e3ec</title>
    <updated>2026-05-09T11:38:29.036754+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "23021fbb-6d7c-4f6e-a906-18b70b69e3ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116514513998786708", "content": "There is a new vulnerability with elevated criticality in GeoVision GV-VMS (CVE-2026-42369) https://vuldb.com/vuln/360931", "creation_timestamp": "2026-05-04T04:53:12.899123Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/23021fbb-6d7c-4f6e-a906-18b70b69e3ec/export"/>
    <published>2026-05-04T04:53:12.899123+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9a201c86-caeb-48ec-9483-929271111868/export</id>
    <title>9a201c86-caeb-48ec-9483-929271111868</title>
    <updated>2026-05-09T11:38:29.036662+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9a201c86-caeb-48ec-9483-929271111868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42369", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkyymwd4po22", "content": "CRITICAL: GeoVision GV-VMS V20.0.2 stack overflow (CVSS 10) lets remote attackers gain SYSTEM access. Restrict remote access &amp;amp; monitor for patches. https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787 #OffSeq #CVE202642369 #cyberalert", "creation_timestamp": "2026-05-04T06:00:31.157787Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9a201c86-caeb-48ec-9483-929271111868/export"/>
    <published>2026-05-04T06:00:31.157787+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a5d8fca9-a16c-4d84-93c5-fa7d437cb448/export</id>
    <title>a5d8fca9-a16c-4d84-93c5-fa7d437cb448</title>
    <updated>2026-05-09T11:38:29.036575+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a5d8fca9-a16c-4d84-93c5-fa7d437cb448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42369", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116514778449951013", "content": "\ud83d\udea8 CVE-2026-42369 (CRITICAL, CVSS 10): GeoVision GV-VMS V20.0.2 stack overflow in gvapi endpoint lets unauthenticated remote attackers execute code as SYSTEM. Restrict remote access, monitor for patches. https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787 #OffSeq #CVE202642369 #infosec #zeroday", "creation_timestamp": "2026-05-04T06:00:31.183284Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a5d8fca9-a16c-4d84-93c5-fa7d437cb448/export"/>
    <published>2026-05-04T06:00:31.183284+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c849bd34-f1b0-424c-bc55-f06ebcf4d98c/export</id>
    <title>c849bd34-f1b0-424c-bc55-f06ebcf4d98c</title>
    <updated>2026-05-09T11:38:29.036466+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c849bd34-f1b0-424c-bc55-f06ebcf4d98c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbmxfeo22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "creation_timestamp": "2026-05-04T08:41:41.153344Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c849bd34-f1b0-424c-bc55-f06ebcf4d98c/export"/>
    <published>2026-05-04T08:41:41.153344+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2d8afbe9-2ebc-4e45-b63c-bbe5b123330f/export</id>
    <title>2d8afbe9-2ebc-4e45-b63c-bbe5b123330f</title>
    <updated>2026-05-09T11:38:29.036337+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2d8afbe9-2ebc-4e45-b63c-bbe5b123330f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbmysrs22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "creation_timestamp": "2026-05-04T08:41:43.094535Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2d8afbe9-2ebc-4e45-b63c-bbe5b123330f/export"/>
    <published>2026-05-04T08:41:43.094535+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a9b500e-07c8-4954-8f32-cc638d52b7a3/export</id>
    <title>4a9b500e-07c8-4954-8f32-cc638d52b7a3</title>
    <updated>2026-05-09T11:38:29.033858+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a9b500e-07c8-4954-8f32-cc638d52b7a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbn3lrh22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "creation_timestamp": "2026-05-04T08:41:43.757601Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a9b500e-07c8-4954-8f32-cc638d52b7a3/export"/>
    <published>2026-05-04T08:41:43.757601+00:00</published>
  </entry>
</feed>
