<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 12:17:59 +0000</lastBuildDate>
    <item>
      <title>ec76baa3-fb3b-42cd-8d3e-cede07c685bc</title>
      <link>https://vulnerability.circl.lu/sighting/ec76baa3-fb3b-42cd-8d3e-cede07c685bc/export</link>
      <description>{"uuid": "ec76baa3-fb3b-42cd-8d3e-cede07c685bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfa6fkpl6w25", "content": "", "creation_timestamp": "2026-02-19T18:01:13.300845Z"}</description>
      <content:encoded>{"uuid": "ec76baa3-fb3b-42cd-8d3e-cede07c685bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mfa6fkpl6w25", "content": "", "creation_timestamp": "2026-02-19T18:01:13.300845Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ec76baa3-fb3b-42cd-8d3e-cede07c685bc/export</guid>
      <pubDate>Thu, 19 Feb 2026 18:01:13 +0000</pubDate>
    </item>
    <item>
      <title>54642e2a-425c-483e-8dbe-86513b599c76</title>
      <link>https://vulnerability.circl.lu/sighting/54642e2a-425c-483e-8dbe-86513b599c76/export</link>
      <description>{"uuid": "54642e2a-425c-483e-8dbe-86513b599c76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-26030", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mfaifoydgk22", "content": "", "creation_timestamp": "2026-02-19T21:00:15.310049Z"}</description>
      <content:encoded>{"uuid": "54642e2a-425c-483e-8dbe-86513b599c76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-26030", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mfaifoydgk22", "content": "", "creation_timestamp": "2026-02-19T21:00:15.310049Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/54642e2a-425c-483e-8dbe-86513b599c76/export</guid>
      <pubDate>Thu, 19 Feb 2026 21:00:15 +0000</pubDate>
    </item>
    <item>
      <title>ac82f3fe-bfb3-4250-ae75-dea5c755d1dc</title>
      <link>https://vulnerability.circl.lu/sighting/ac82f3fe-bfb3-4250-ae75-dea5c755d1dc/export</link>
      <description>{"uuid": "ac82f3fe-bfb3-4250-ae75-dea5c755d1dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-26030", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116099305500728064", "content": "", "creation_timestamp": "2026-02-19T21:00:27.004464Z"}</description>
      <content:encoded>{"uuid": "ac82f3fe-bfb3-4250-ae75-dea5c755d1dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-26030", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116099305500728064", "content": "", "creation_timestamp": "2026-02-19T21:00:27.004464Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ac82f3fe-bfb3-4250-ae75-dea5c755d1dc/export</guid>
      <pubDate>Thu, 19 Feb 2026 21:00:27 +0000</pubDate>
    </item>
    <item>
      <title>21536600-7094-41df-8b60-45afea940812</title>
      <link>https://vulnerability.circl.lu/sighting/21536600-7094-41df-8b60-45afea940812/export</link>
      <description>{"uuid": "21536600-7094-41df-8b60-45afea940812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://bsky.app/profile/cyber-news-fi.bsky.social/post/3mfb5zqxkdc2q", "content": "", "creation_timestamp": "2026-02-20T03:27:17.267444Z"}</description>
      <content:encoded>{"uuid": "21536600-7094-41df-8b60-45afea940812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://bsky.app/profile/cyber-news-fi.bsky.social/post/3mfb5zqxkdc2q", "content": "", "creation_timestamp": "2026-02-20T03:27:17.267444Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/21536600-7094-41df-8b60-45afea940812/export</guid>
      <pubDate>Fri, 20 Feb 2026 03:27:17 +0000</pubDate>
    </item>
    <item>
      <title>e75093ac-b13e-46b5-a394-cb78b6a08f9a</title>
      <link>https://vulnerability.circl.lu/sighting/e75093ac-b13e-46b5-a394-cb78b6a08f9a/export</link>
      <description>{"uuid": "e75093ac-b13e-46b5-a394-cb78b6a08f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116101670267856847", "content": "", "creation_timestamp": "2026-02-20T07:01:36.997434Z"}</description>
      <content:encoded>{"uuid": "e75093ac-b13e-46b5-a394-cb78b6a08f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116101670267856847", "content": "", "creation_timestamp": "2026-02-20T07:01:36.997434Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e75093ac-b13e-46b5-a394-cb78b6a08f9a/export</guid>
      <pubDate>Fri, 20 Feb 2026 07:01:36 +0000</pubDate>
    </item>
    <item>
      <title>548c7641-bf4e-40cd-b5e9-89f6ee0fc135</title>
      <link>https://vulnerability.circl.lu/sighting/548c7641-bf4e-40cd-b5e9-89f6ee0fc135/export</link>
      <description>{"uuid": "548c7641-bf4e-40cd-b5e9-89f6ee0fc135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-26030", "type": "seen", "source": "https://bsky.app/profile/cyberlensai.bsky.social/post/3mfxqtp3vty2v", "content": "", "creation_timestamp": "2026-03-01T03:02:30.902970Z"}</description>
      <content:encoded>{"uuid": "548c7641-bf4e-40cd-b5e9-89f6ee0fc135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-26030", "type": "seen", "source": "https://bsky.app/profile/cyberlensai.bsky.social/post/3mfxqtp3vty2v", "content": "", "creation_timestamp": "2026-03-01T03:02:30.902970Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/548c7641-bf4e-40cd-b5e9-89f6ee0fc135/export</guid>
      <pubDate>Sun, 01 Mar 2026 03:02:30 +0000</pubDate>
    </item>
    <item>
      <title>ff36bd1b-b0e1-425b-ae9d-d6eec78a78f1</title>
      <link>https://vulnerability.circl.lu/sighting/ff36bd1b-b0e1-425b-ae9d-d6eec78a78f1/export</link>
      <description>{"uuid": "ff36bd1b-b0e1-425b-ae9d-d6eec78a78f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://www.thezdi.com/blog/2026/3/10/the-march-2026-security-update-review", "content": "", "creation_timestamp": "2026-03-10T16:57:37.000000Z"}</description>
      <content:encoded>{"uuid": "ff36bd1b-b0e1-425b-ae9d-d6eec78a78f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://www.thezdi.com/blog/2026/3/10/the-march-2026-security-update-review", "content": "", "creation_timestamp": "2026-03-10T16:57:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ff36bd1b-b0e1-425b-ae9d-d6eec78a78f1/export</guid>
      <pubDate>Tue, 10 Mar 2026 16:57:37 +0000</pubDate>
    </item>
    <item>
      <title>8bf330f8-9244-4af0-b142-46df6c9a3312</title>
      <link>https://vulnerability.circl.lu/sighting/8bf330f8-9244-4af0-b142-46df6c9a3312/export</link>
      <description>{"uuid": "8bf330f8-9244-4af0-b142-46df6c9a3312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+March+2026/32782", "content": "", "creation_timestamp": "2026-03-11T03:00:16.000000Z"}</description>
      <content:encoded>{"uuid": "8bf330f8-9244-4af0-b142-46df6c9a3312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+March+2026/32782", "content": "", "creation_timestamp": "2026-03-11T03:00:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8bf330f8-9244-4af0-b142-46df6c9a3312/export</guid>
      <pubDate>Wed, 11 Mar 2026 03:00:16 +0000</pubDate>
    </item>
    <item>
      <title>dd3d91af-6383-48ac-8aa8-51963842ebb3</title>
      <link>https://vulnerability.circl.lu/sighting/dd3d91af-6383-48ac-8aa8-51963842ebb3/export</link>
      <description>{"uuid": "dd3d91af-6383-48ac-8aa8-51963842ebb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://isc.sans.edu/diary/rss/32782", "content": "", "creation_timestamp": "2026-03-11T03:00:20.000000Z"}</description>
      <content:encoded>{"uuid": "dd3d91af-6383-48ac-8aa8-51963842ebb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://isc.sans.edu/diary/rss/32782", "content": "", "creation_timestamp": "2026-03-11T03:00:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dd3d91af-6383-48ac-8aa8-51963842ebb3/export</guid>
      <pubDate>Wed, 11 Mar 2026 03:00:20 +0000</pubDate>
    </item>
    <item>
      <title>d7c3e02e-6ff2-4445-babc-743b6caca8c6</title>
      <link>https://vulnerability.circl.lu/sighting/d7c3e02e-6ff2-4445-babc-743b6caca8c6/export</link>
      <description>{"uuid": "d7c3e02e-6ff2-4445-babc-743b6caca8c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://swecyb.com/ap/users/116080658609901341/statuses/116535698755654805", "content": "(microsoft.com) Critical Vulnerabilities in Microsoft Semantic Kernel: From Prompt Injection to Remote Code Execution\nCritical vulnerabilities in Microsoft Semantic Kernel (CVE-2026-25592, CVE-2026-26030) enable prompt injection to escalate to host-level RCE or arbitrary file writes, exposing systemic risks in AI agent frameworks.\nIn brief - Two CVEs in Microsoft Semantic Kernel demonstrate how prompt injection can bypass security boundaries, leading to RCE or file writes. Patched via responsible disclosure, but highlights urgent need for secure AI agent architectures.\nTechnically - CVE-2026-26030 exploits unsafe string interpolation in the In-Memory Vector Store\u2019s filter functionality, allowing `eval()`-based RCE via crafted prompts. CVE-2026-25592 abuses exposed `DownloadFileAsync` in the .NET SDK to write files to arbitrary locations, including Startup folders. Exploit chains involve AST traversal and sandbox escape. Mitigations: upgrade, AST allowlists, and tool exposure restrictions. Detection queries provided for post-exploitation activity.\nSource: https://www.microsoft.com/en-us/security/blog/2026/05/07/prompts-become-shells-rce-vulnerabilities-ai-agent-frameworks/\n#Cybersecurity #ThreatIntel", "creation_timestamp": "2026-05-07T22:42:34.934741Z"}</description>
      <content:encoded>{"uuid": "d7c3e02e-6ff2-4445-babc-743b6caca8c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-26030", "type": "seen", "source": "https://swecyb.com/ap/users/116080658609901341/statuses/116535698755654805", "content": "(microsoft.com) Critical Vulnerabilities in Microsoft Semantic Kernel: From Prompt Injection to Remote Code Execution\nCritical vulnerabilities in Microsoft Semantic Kernel (CVE-2026-25592, CVE-2026-26030) enable prompt injection to escalate to host-level RCE or arbitrary file writes, exposing systemic risks in AI agent frameworks.\nIn brief - Two CVEs in Microsoft Semantic Kernel demonstrate how prompt injection can bypass security boundaries, leading to RCE or file writes. Patched via responsible disclosure, but highlights urgent need for secure AI agent architectures.\nTechnically - CVE-2026-26030 exploits unsafe string interpolation in the In-Memory Vector Store\u2019s filter functionality, allowing `eval()`-based RCE via crafted prompts. CVE-2026-25592 abuses exposed `DownloadFileAsync` in the .NET SDK to write files to arbitrary locations, including Startup folders. Exploit chains involve AST traversal and sandbox escape. Mitigations: upgrade, AST allowlists, and tool exposure restrictions. Detection queries provided for post-exploitation activity.\nSource: https://www.microsoft.com/en-us/security/blog/2026/05/07/prompts-become-shells-rce-vulnerabilities-ai-agent-frameworks/\n#Cybersecurity #ThreatIntel", "creation_timestamp": "2026-05-07T22:42:34.934741Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d7c3e02e-6ff2-4445-babc-743b6caca8c6/export</guid>
      <pubDate>Thu, 07 May 2026 22:42:34 +0000</pubDate>
    </item>
  </channel>
</rss>
