<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 04:50:11 +0000</lastBuildDate>
    <item>
      <title>6e72c41d-5506-4280-8dd9-ee0e9b12ce1a</title>
      <link>https://vulnerability.circl.lu/sighting/6e72c41d-5506-4280-8dd9-ee0e9b12ce1a/export</link>
      <description>{"uuid": "6e72c41d-5506-4280-8dd9-ee0e9b12ce1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-2920", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-26-164/", "content": "", "creation_timestamp": "2026-03-06T05:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "6e72c41d-5506-4280-8dd9-ee0e9b12ce1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-2920", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-26-164/", "content": "", "creation_timestamp": "2026-03-06T05:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6e72c41d-5506-4280-8dd9-ee0e9b12ce1a/export</guid>
      <pubDate>Fri, 06 Mar 2026 05:00:00 +0000</pubDate>
    </item>
    <item>
      <title>cb935c63-4034-4319-9151-e9f067ca5769</title>
      <link>https://vulnerability.circl.lu/sighting/cb935c63-4034-4319-9151-e9f067ca5769/export</link>
      <description>{"uuid": "cb935c63-4034-4319-9151-e9f067ca5769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-2920", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-multiple-critical-vulnerabilities-gstreamer-patch-immediately", "content": "", "creation_timestamp": "2026-03-16T15:47:07.000000Z"}</description>
      <content:encoded>{"uuid": "cb935c63-4034-4319-9151-e9f067ca5769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-2920", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-multiple-critical-vulnerabilities-gstreamer-patch-immediately", "content": "", "creation_timestamp": "2026-03-16T15:47:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cb935c63-4034-4319-9151-e9f067ca5769/export</guid>
      <pubDate>Mon, 16 Mar 2026 15:47:07 +0000</pubDate>
    </item>
    <item>
      <title>04745430-d449-4e58-9409-fb775715c8e2</title>
      <link>https://vulnerability.circl.lu/sighting/04745430-d449-4e58-9409-fb775715c8e2/export</link>
      <description>{"uuid": "04745430-d449-4e58-9409-fb775715c8e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-2920", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhcqhjr63r2l", "content": "", "creation_timestamp": "2026-03-18T05:20:09.854439Z"}</description>
      <content:encoded>{"uuid": "04745430-d449-4e58-9409-fb775715c8e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-2920", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhcqhjr63r2l", "content": "", "creation_timestamp": "2026-03-18T05:20:09.854439Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/04745430-d449-4e58-9409-fb775715c8e2/export</guid>
      <pubDate>Wed, 18 Mar 2026 05:20:09 +0000</pubDate>
    </item>
    <item>
      <title>cfbe9902-9872-4a82-8d3c-ad1d2a807646</title>
      <link>https://vulnerability.circl.lu/sighting/cfbe9902-9872-4a82-8d3c-ad1d2a807646/export</link>
      <description>{"uuid": "cfbe9902-9872-4a82-8d3c-ad1d2a807646", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-29200", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116515132214621660", "content": "\ud83d\udea8 CVE-2026-29200: CRITICAL IDOR in WebPros Comet Backup (20.11.0 \u2013 26.1.1, 26.2.1) lets tenant admins impersonate any end user on the server. No patch yet \u2014 restrict admin access and monitor for suspicious cross-tenant activity. https://radar.offseq.com/threat/cve-2026-29200-cwe-639-insecure-direct-object-refe-d3747bfb #OffSeq #infosec #CVE202629200", "creation_timestamp": "2026-05-04T07:30:25.921366Z"}</description>
      <content:encoded>{"uuid": "cfbe9902-9872-4a82-8d3c-ad1d2a807646", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-29200", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116515132214621660", "content": "\ud83d\udea8 CVE-2026-29200: CRITICAL IDOR in WebPros Comet Backup (20.11.0 \u2013 26.1.1, 26.2.1) lets tenant admins impersonate any end user on the server. No patch yet \u2014 restrict admin access and monitor for suspicious cross-tenant activity. https://radar.offseq.com/threat/cve-2026-29200-cwe-639-insecure-direct-object-refe-d3747bfb #OffSeq #infosec #CVE202629200", "creation_timestamp": "2026-05-04T07:30:25.921366Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cfbe9902-9872-4a82-8d3c-ad1d2a807646/export</guid>
      <pubDate>Mon, 04 May 2026 07:30:25 +0000</pubDate>
    </item>
    <item>
      <title>08159aad-0b0c-4bdc-a771-f3fd527ea78e</title>
      <link>https://vulnerability.circl.lu/sighting/08159aad-0b0c-4bdc-a771-f3fd527ea78e/export</link>
      <description>{"uuid": "08159aad-0b0c-4bdc-a771-f3fd527ea78e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-29200", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkz5ns63hh2o", "content": "CRITICAL: WebPros Comet Backup (20.11.0 \u2013 26.1.1, 26.2.1) has an IDOR flaw letting tenant admins impersonate end users across tenants. No patch yet \u2014 restrict admin rights &amp;amp; monitor activity. https://radar.offseq.com/threat/cve-2026-29200-cwe-639-insecure-direct-object-refe-d3747bfb #OffSeq #CVE2...", "creation_timestamp": "2026-05-04T07:30:28.016407Z"}</description>
      <content:encoded>{"uuid": "08159aad-0b0c-4bdc-a771-f3fd527ea78e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-29200", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkz5ns63hh2o", "content": "CRITICAL: WebPros Comet Backup (20.11.0 \u2013 26.1.1, 26.2.1) has an IDOR flaw letting tenant admins impersonate end users across tenants. No patch yet \u2014 restrict admin rights &amp;amp; monitor activity. https://radar.offseq.com/threat/cve-2026-29200-cwe-639-insecure-direct-object-refe-d3747bfb #OffSeq #CVE2...", "creation_timestamp": "2026-05-04T07:30:28.016407Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/08159aad-0b0c-4bdc-a771-f3fd527ea78e/export</guid>
      <pubDate>Mon, 04 May 2026 07:30:28 +0000</pubDate>
    </item>
    <item>
      <title>b70defb7-4d89-4df7-802d-4a31e363cb92</title>
      <link>https://vulnerability.circl.lu/sighting/b70defb7-4d89-4df7-802d-4a31e363cb92/export</link>
      <description>{"uuid": "b70defb7-4d89-4df7-802d-4a31e363cb92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29200", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mkzp7q7ikj2g", "content": "CVE-2026-29200: A 9.9 CVSS Comet Backup Flaw Granting Total Cross-Tenant Takeover", "creation_timestamp": "2026-05-04T12:44:43.271634Z"}</description>
      <content:encoded>{"uuid": "b70defb7-4d89-4df7-802d-4a31e363cb92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29200", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mkzp7q7ikj2g", "content": "CVE-2026-29200: A 9.9 CVSS Comet Backup Flaw Granting Total Cross-Tenant Takeover", "creation_timestamp": "2026-05-04T12:44:43.271634Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b70defb7-4d89-4df7-802d-4a31e363cb92/export</guid>
      <pubDate>Mon, 04 May 2026 12:44:43 +0000</pubDate>
    </item>
  </channel>
</rss>
