<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T00:04:20.724660+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7a0af0d0-7330-4d34-9147-429e0326bfe9/export</id>
    <title>7a0af0d0-7330-4d34-9147-429e0326bfe9</title>
    <updated>2026-05-09T00:04:20.755812+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7a0af0d0-7330-4d34-9147-429e0326bfe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4261", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhlt3htlrr2c", "content": "", "creation_timestamp": "2026-03-21T20:01:03.865188Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7a0af0d0-7330-4d34-9147-429e0326bfe9/export"/>
    <published>2026-03-21T20:01:03.865188+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/befbce68-b4be-481c-b8a0-72c10e0bb604/export</id>
    <title>befbce68-b4be-481c-b8a0-72c10e0bb604</title>
    <updated>2026-05-09T00:04:20.755709+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "befbce68-b4be-481c-b8a0-72c10e0bb604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4261", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhlu2equlm2k", "content": "", "creation_timestamp": "2026-03-21T20:18:21.234207Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/befbce68-b4be-481c-b8a0-72c10e0bb604/export"/>
    <published>2026-03-21T20:18:21.234207+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/00151546-ce0e-4756-bc61-48aa4851444c/export</id>
    <title>00151546-ce0e-4756-bc61-48aa4851444c</title>
    <updated>2026-05-09T00:04:20.755594+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "00151546-ce0e-4756-bc61-48aa4851444c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4261", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhlu3adohb2h", "content": "", "creation_timestamp": "2026-03-21T20:18:50.039882Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/00151546-ce0e-4756-bc61-48aa4851444c/export"/>
    <published>2026-03-21T20:18:50.039882+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7cbe6c09-ab92-4b98-babb-4a67bdc32c25/export</id>
    <title>7cbe6c09-ab92-4b98-babb-4a67bdc32c25</title>
    <updated>2026-05-09T00:04:20.755477+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7cbe6c09-ab92-4b98-babb-4a67bdc32c25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42615", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116486112913156870", "content": "", "creation_timestamp": "2026-04-29T04:30:26.640658Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7cbe6c09-ab92-4b98-babb-4a67bdc32c25/export"/>
    <published>2026-04-29T04:30:26.640658+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/94876535-1e2b-4727-bdc7-1f37997afc09/export</id>
    <title>94876535-1e2b-4727-bdc7-1f37997afc09</title>
    <updated>2026-05-09T00:04:20.755375+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "94876535-1e2b-4727-bdc7-1f37997afc09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42615", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkmbbdun6a2o", "content": "", "creation_timestamp": "2026-04-29T04:30:28.523222Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/94876535-1e2b-4727-bdc7-1f37997afc09/export"/>
    <published>2026-04-29T04:30:28.523222+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/31037e6d-ddb6-4a50-8d9b-68594d5290a5/export</id>
    <title>31037e6d-ddb6-4a50-8d9b-68594d5290a5</title>
    <updated>2026-05-09T00:04:20.755266+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "31037e6d-ddb6-4a50-8d9b-68594d5290a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42615", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/116486156060132683", "content": "", "creation_timestamp": "2026-04-29T04:41:25.031940Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/31037e6d-ddb6-4a50-8d9b-68594d5290a5/export"/>
    <published>2026-04-29T04:41:25.031940+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4fb7d9d1-5dc8-4614-a5c9-88d9c55400df/export</id>
    <title>4fb7d9d1-5dc8-4614-a5c9-88d9c55400df</title>
    <updated>2026-05-09T00:04:20.755152+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4fb7d9d1-5dc8-4614-a5c9-88d9c55400df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42615", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkmic4ocay2h", "content": "CVE-2026-42615 - GCHQ CyberChef XSS Vulnerability\nCVE ID : CVE-2026-42615\n \n Published : April 29, 2026, 4:16 a.m. | 2\u00a0hours ago\n \n Description : GCHQ CyberChef before 11.0.0 allows XSS via Show Base64 offsets, as demonstrated by the /#recipe=Show_Base64_offsets('%3Cscript sub...", "creation_timestamp": "2026-04-29T06:36:10.233238Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4fb7d9d1-5dc8-4614-a5c9-88d9c55400df/export"/>
    <published>2026-04-29T06:36:10.233238+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/694dcd33-ad84-430e-a9bc-1fc0dc7fef75/export</id>
    <title>694dcd33-ad84-430e-a9bc-1fc0dc7fef75</title>
    <updated>2026-05-09T00:04:20.755032+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "694dcd33-ad84-430e-a9bc-1fc0dc7fef75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42615", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkmpehp25s26", "content": "\ud83c\udfaf High severity XSS uncovered in GCHQ CyberChef \u26a0\ufe0f\n\nA flaw in the \u201cShow Base64 offsets\u201d feature allows script injection via crafted input (CVE-2026-42615).\n\n\ud83d\udd17 basefortify.eu/cve_reports/...\n\n#CyberSecurity #CVE #GCHQ #XSS", "creation_timestamp": "2026-04-29T08:42:58.794536Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/694dcd33-ad84-430e-a9bc-1fc0dc7fef75/export"/>
    <published>2026-04-29T08:42:58.794536+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4943c4c3-42ab-470b-bcbb-f4478103d99c/export</id>
    <title>4943c4c3-42ab-470b-bcbb-f4478103d99c</title>
    <updated>2026-05-09T00:04:20.754858+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4943c4c3-42ab-470b-bcbb-f4478103d99c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42615", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkmpeld32c26", "content": "\ud83c\udfaf High severity XSS uncovered in GCHQ CyberChef \u26a0\ufe0f\n\nA flaw in the \u201cShow Base64 offsets\u201d feature allows script injection via crafted input (CVE-2026-42615).\n\n\ud83d\udd17 basefortify.eu/cve_reports/...\n\n#CyberSecurity #CVE #GCHQ #XSS", "creation_timestamp": "2026-04-29T08:42:59.297975Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4943c4c3-42ab-470b-bcbb-f4478103d99c/export"/>
    <published>2026-04-29T08:42:59.297975+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9012f565-037f-4a78-8692-5da133ea1372/export</id>
    <title>9012f565-037f-4a78-8692-5da133ea1372</title>
    <updated>2026-05-09T00:04:20.753072+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9012f565-037f-4a78-8692-5da133ea1372", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42615", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkmpesoyu226", "content": "\ud83c\udfaf High severity XSS uncovered in GCHQ CyberChef \u26a0\ufe0f\n\nA flaw in the \u201cShow Base64 offsets\u201d feature allows script injection via crafted input (CVE-2026-42615).\n\n\ud83d\udd17 basefortify.eu/cve_reports/...\n\n#CyberSecurity #CVE #GCHQ #XSS", "creation_timestamp": "2026-04-29T08:42:59.811225Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9012f565-037f-4a78-8692-5da133ea1372/export"/>
    <published>2026-04-29T08:42:59.811225+00:00</published>
  </entry>
</feed>
