<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T22:24:15.635091+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d74128cc-0b9d-47a0-ac15-6b7ae5f6ca5c/export</id>
    <title>d74128cc-0b9d-47a0-ac15-6b7ae5f6ca5c</title>
    <updated>2026-05-05T22:24:16.027724+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "d74128cc-0b9d-47a0-ac15-6b7ae5f6ca5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-7343", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/google-chrome-multiple-vulnerabilities_20260429", "content": "", "creation_timestamp": "2026-04-28T20:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d74128cc-0b9d-47a0-ac15-6b7ae5f6ca5c/export"/>
    <published>2026-04-28T20:00:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7d9f40d6-0053-4e97-b824-f27c8c368434/export</id>
    <title>7d9f40d6-0053-4e97-b824-f27c8c368434</title>
    <updated>2026-05-05T22:24:16.027622+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7d9f40d6-0053-4e97-b824-f27c8c368434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7343", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkls6yfyxg2p", "content": "", "creation_timestamp": "2026-04-29T00:00:44.112938Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7d9f40d6-0053-4e97-b824-f27c8c368434/export"/>
    <published>2026-04-29T00:00:44.112938+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/61d9bac2-2004-4a78-80b4-c3afb916f533/export</id>
    <title>61d9bac2-2004-4a78-80b4-c3afb916f533</title>
    <updated>2026-05-05T22:24:16.027507+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "61d9bac2-2004-4a78-80b4-c3afb916f533", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7343", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116485052196398684", "content": "", "creation_timestamp": "2026-04-29T00:01:01.038920Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/61d9bac2-2004-4a78-80b4-c3afb916f533/export"/>
    <published>2026-04-29T00:01:01.038920+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e287094f-1ba1-4572-bdac-e18a949c61ac/export</id>
    <title>e287094f-1ba1-4572-bdac-e18a949c61ac</title>
    <updated>2026-05-05T22:24:16.027370+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e287094f-1ba1-4572-bdac-e18a949c61ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7343", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mknk4wvajp2e", "content": "CVE-2026-7343 - Google Chrome Use After Free in Views on Windows\nCVE ID : CVE-2026-7343\n \n Published : April 28, 2026, 11:16 p.m. | 17\u00a0hours ago\n \n Description : Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compr...", "creation_timestamp": "2026-04-29T16:41:43.796362Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e287094f-1ba1-4572-bdac-e18a949c61ac/export"/>
    <published>2026-04-29T16:41:43.796362+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/38efaafc-0d5e-4cf3-a819-ec56d90de023/export</id>
    <title>38efaafc-0d5e-4cf3-a819-ec56d90de023</title>
    <updated>2026-05-05T22:24:16.026360+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "38efaafc-0d5e-4cf3-a819-ec56d90de023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7343", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mkr4wnxty22e", "content": "\u300cChrome\u300d\u306b30\u4ef6\u306e\u8106\u5f31\u6027 - \u300c\u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u300d\u304c4\u4ef6\n\nGoogle\u306f\u73fe\u5730\u6642\u95932026\u5e744\u670828\u65e5\u3001\u540c\u793e\u30d6\u30e9\u30a6\u30b6\u300cChrome\u300d\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3092\u30ea\u30ea\u30fc\u30b9\u3057\u305f\u3002\u91cd\u8981\u5ea6\u304c\u300c\u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u300d\u3068\u3055\u308c\u308b\u3082\u306e\u3082\u542b\u3081\u300130\u4ef6\u306e\u8106\u5f31\u6027\u3092\u89e3\u6d88\u3057\u3066\u3044\u308b\u3002\n\n...\n\n\u300c\u30af\u30ea\u30c6\u30a3\u30ab\u30eb\u300d\u3068\u3055\u308c\u308b\u8106\u5f31\u6027\u3092\u898b\u308b\u3068\u3001\u300cViews\u300d\u300cAccessibility\u300d\u300cCanvas\u300d\u300ciOS\u300d\u306b\u304a\u3044\u3066\u89e3\u653e\u6e08\u307f\u30e1\u30e2\u30ea\u3092\u4f7f\u7528\u3059\u308b\u300cUse After Free\u300d\u306e\u8106\u5f31\u6027\u3092\u4fee\u6b63\u3002\u305d\u308c\u305e\u308c\u300cCVE-2026-7343\u300d\u300cCVE-2026-7344\u300d\u300cCVE-2026-7363\u300d\u300cCVE-2026-7361\u300d\u304c\u5272\u308a\u5f53\u3066...", "creation_timestamp": "2026-05-01T02:56:14.509979Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/38efaafc-0d5e-4cf3-a819-ec56d90de023/export"/>
    <published>2026-05-01T02:56:14.509979+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/464213dd-31d2-4b09-ba79-26d5d1ad5d27/export</id>
    <title>464213dd-31d2-4b09-ba79-26d5d1ad5d27</title>
    <updated>2026-05-05T22:24:16.023895+00:00</updated>
    <author>
      <name>Joseph Lee</name>
      <uri>http://vulnerability.circl.lu/user/syspect</uri>
    </author>
    <content>{"uuid": "464213dd-31d2-4b09-ba79-26d5d1ad5d27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-7343", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20260504", "content": "", "creation_timestamp": "2026-05-03T18:00:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/464213dd-31d2-4b09-ba79-26d5d1ad5d27/export"/>
    <published>2026-05-03T18:00:00+00:00</published>
  </entry>
</feed>
