<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-23T14:59:25.116236+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c73ff4f2-242d-44b4-a3ef-3226c7d9cadd/export</id>
    <title>c73ff4f2-242d-44b4-a3ef-3226c7d9cadd</title>
    <updated>2026-05-23T14:59:25.126963+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c73ff4f2-242d-44b4-a3ef-3226c7d9cadd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42897", "type": "seen", "source": "https://bsky.app/profile/kubonai.bsky.social/post/3mma2ux6xuf2s", "content": "CVE-2026-42897: Microsoft Exchange OWA XSS Vulnerability\n\nCVE-2026-42897 is a high-severity cross-site scripting vulnerability in Microsoft Exchange Server Outlook Web Access (OWA). Learn what's affected,...\n\n\ud83d\udd17 https://ipsec.live/blog/cve-2026-42897-exchange-owa-xss\n\n#infosec #cybersecurity", "creation_timestamp": "2026-05-19T18:54:36.010969Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c73ff4f2-242d-44b4-a3ef-3226c7d9cadd/export"/>
    <published>2026-05-19T18:54:36.010969+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/65cb434d-ff06-4629-a434-269cb137fd98/export</id>
    <title>65cb434d-ff06-4629-a434-269cb137fd98</title>
    <updated>2026-05-23T14:59:25.126852+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "65cb434d-ff06-4629-a434-269cb137fd98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42897", "type": "seen", "source": "https://bsky.app/profile/kubonai.bsky.social/post/3mma2v2k3yg2s", "content": "CVE-2026-42897: Microsoft Exchange OWA Zero-Day Actively Exploited\n\nCVE-2026-42897 is an actively exploited XSS/spoofing flaw in Microsoft Exchange Server OWA. CVSS 8.1, affects Exchange 2016/2019/SE...\n\n\ud83d\udd17 https://ipsec.live/blog/cve-2026-42897-exchange-owa-zero-day\n\n#infosec #cybersecurity", "creation_timestamp": "2026-05-19T18:54:39.350546Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/65cb434d-ff06-4629-a434-269cb137fd98/export"/>
    <published>2026-05-19T18:54:39.350546+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c0ac39f-10bc-40be-b059-fb75673fe994/export</id>
    <title>3c0ac39f-10bc-40be-b059-fb75673fe994</title>
    <updated>2026-05-23T14:59:25.126714+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c0ac39f-10bc-40be-b059-fb75673fe994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42897", "type": "seen", "source": "https://bsky.app/profile/kubonai.bsky.social/post/3mma2v45xqv2s", "content": "Microsoft Exchange Zero-Day Under Attack, No Patch Available\n\nCVE-2026-42897 stems from a cross-site scripting (XSS) vulnerability and can allow an attacker to compro...\n\n\ud83d\udd17 https://ipsec.live/blog/2026-05-19-microsoft-exchange-zeroday-under-attack-no-patch-available\n\n#infosec #cybersecurity", "creation_timestamp": "2026-05-19T18:54:40.931053Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c0ac39f-10bc-40be-b059-fb75673fe994/export"/>
    <published>2026-05-19T18:54:40.931053+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f561a235-abe4-4150-97d1-ca2226b904ab/export</id>
    <title>f561a235-abe4-4150-97d1-ca2226b904ab</title>
    <updated>2026-05-23T14:59:25.126585+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f561a235-abe4-4150-97d1-ca2226b904ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42897", "type": "seen", "source": "https://bsky.app/profile/newstecnicas.com/post/3mmakdg7cak2g", "content": "\ud83d\udee1\ufe0f CVE-2026-42897: #CISA advierte #hackeo masivo activo en #MicrosoftExchangeServer (OWA) (+MITIGACI\u00d3N) www.newstecnicas.com/2026/05/cve-...", "creation_timestamp": "2026-05-19T23:31:12.800755Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f561a235-abe4-4150-97d1-ca2226b904ab/export"/>
    <published>2026-05-19T23:31:12.800755+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/011bdc17-2273-4080-a9e5-e8c21cbe1a00/export</id>
    <title>011bdc17-2273-4080-a9e5-e8c21cbe1a00</title>
    <updated>2026-05-23T14:59:25.126460+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "011bdc17-2273-4080-a9e5-e8c21cbe1a00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42897", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mmaueesnqq2x", "content": "Top 3 CVE for last 7 days:\nCVE-2026-42897: 56 interactions\nCVE-2026-46300: 56 interactions\nCVE-2026-42945: 50 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31635: 9 interactions\nCVE-2026-42945: 8 interactions\nCVE-2026-41054: 4 interactions\n", "creation_timestamp": "2026-05-20T02:30:37.098191Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/011bdc17-2273-4080-a9e5-e8c21cbe1a00/export"/>
    <published>2026-05-20T02:30:37.098191+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c07dc97-b1ef-4f1e-be72-df14108638ee/export</id>
    <title>3c07dc97-b1ef-4f1e-be72-df14108638ee</title>
    <updated>2026-05-23T14:59:25.126331+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c07dc97-b1ef-4f1e-be72-df14108638ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42897", "type": "seen", "source": "https://bsky.app/profile/newstecnicas.com/post/3mmdakbn7kc2i", "content": "\ud83d\udee1\ufe0f CVE-2026-42897: CISA advierte hackeo masivo activo en Microsoft Exchange Server (OWA) (+MITIGACI\u00d3N) www.newstecnicas.com/2026/05/cve-...", "creation_timestamp": "2026-05-21T01:14:04.608102Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c07dc97-b1ef-4f1e-be72-df14108638ee/export"/>
    <published>2026-05-21T01:14:04.608102+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5e1aaf29-a12e-4709-8635-f164242fd160/export</id>
    <title>5e1aaf29-a12e-4709-8635-f164242fd160</title>
    <updated>2026-05-23T14:59:25.126221+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5e1aaf29-a12e-4709-8635-f164242fd160", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42897", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mmdetqhuk22x", "content": "Top 3 CVE for last 7 days:\nCVE-2026-45584: 64 interactions\nCVE-2026-42897: 56 interactions\nCVE-2026-46300: 46 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-45584: 64 interactions\nCVE-2026-46727: 21 interactions\nCVE-2026-42462: 11 interactions\n", "creation_timestamp": "2026-05-21T02:33:02.183201Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5e1aaf29-a12e-4709-8635-f164242fd160/export"/>
    <published>2026-05-21T02:33:02.183201+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/de004bb9-72a6-40f8-97d6-e36ca069f8de/export</id>
    <title>de004bb9-72a6-40f8-97d6-e36ca069f8de</title>
    <updated>2026-05-23T14:59:25.126090+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "de004bb9-72a6-40f8-97d6-e36ca069f8de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42897", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mmfvchcwo22h", "content": "Top 3 CVE for last 7 days:\nCVE-2026-45584: 64 interactions\nCVE-2026-45250: 63 interactions\nCVE-2026-42897: 43 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-45250: 63 interactions\nCVE-2026-41091: 8 interactions\nCVE-2026-45498: 8 interactions\n", "creation_timestamp": "2026-05-22T02:30:45.985453Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/de004bb9-72a6-40f8-97d6-e36ca069f8de/export"/>
    <published>2026-05-22T02:30:45.985453+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/035fa1a8-b0ff-429b-a46a-1602ed085e9a/export</id>
    <title>035fa1a8-b0ff-429b-a46a-1602ed085e9a</title>
    <updated>2026-05-23T14:59:25.125938+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "035fa1a8-b0ff-429b-a46a-1602ed085e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42897", "type": "seen", "source": "https://bsky.app/profile/aegisbot.bsky.social/post/3mmhlcgr2r42v", "content": "\ud83d\udd0d Top signals this week:\n\nCVEs: CVE-2026-20182, CVE-2026-42897, CVE-2026-45585, CVE-2026-42945, CVE-2026-9082\nActors: Ransomware, Apt, Play\n\nFull intel: https://matlock.ca/cybersecnews", "creation_timestamp": "2026-05-22T18:37:06.602611Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/035fa1a8-b0ff-429b-a46a-1602ed085e9a/export"/>
    <published>2026-05-22T18:37:06.602611+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8a4c11af-57f5-4786-abdc-b19b4bf4d18d/export</id>
    <title>8a4c11af-57f5-4786-abdc-b19b4bf4d18d</title>
    <updated>2026-05-23T14:59:25.123937+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8a4c11af-57f5-4786-abdc-b19b4bf4d18d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42897", "type": "seen", "source": "https://bsky.app/profile/newstecnicas.com/post/3mmhvibg62c2h", "content": "\ud83d\udee1\ufe0f CVE-2026-42897: #CISA advierte #hackeo masivo activo en Microsoft Exchange Server (OWA) (+MITIGACI\u00d3N) www.newstecnicas.com/2026/05/cve-...", "creation_timestamp": "2026-05-22T21:39:23.020520Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8a4c11af-57f5-4786-abdc-b19b4bf4d18d/export"/>
    <published>2026-05-22T21:39:23.020520+00:00</published>
  </entry>
</feed>
