<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 10:37:53 +0000</lastBuildDate>
    <item>
      <title>667fc334-d4c8-407d-aca6-b8dc4a14f041</title>
      <link>https://vulnerability.circl.lu/sighting/667fc334-d4c8-407d-aca6-b8dc4a14f041/export</link>
      <description>{"uuid": "667fc334-d4c8-407d-aca6-b8dc4a14f041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-2997", "type": "seen", "source": "https://www.twcert.org.tw/en/cp-139-10721-276b6-2.html", "content": "", "creation_timestamp": "2026-02-23T01:49:00.000000Z"}</description>
      <content:encoded>{"uuid": "667fc334-d4c8-407d-aca6-b8dc4a14f041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-2997", "type": "seen", "source": "https://www.twcert.org.tw/en/cp-139-10721-276b6-2.html", "content": "", "creation_timestamp": "2026-02-23T01:49:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/667fc334-d4c8-407d-aca6-b8dc4a14f041/export</guid>
      <pubDate>Mon, 23 Feb 2026 01:49:00 +0000</pubDate>
    </item>
    <item>
      <title>1466504d-d77f-4880-ac0e-4632e22d73c6</title>
      <link>https://vulnerability.circl.lu/sighting/1466504d-d77f-4880-ac0e-4632e22d73c6/export</link>
      <description>{"uuid": "1466504d-d77f-4880-ac0e-4632e22d73c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29976", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhy3rp36cx2j", "content": "", "creation_timestamp": "2026-03-26T17:08:35.977796Z"}</description>
      <content:encoded>{"uuid": "1466504d-d77f-4880-ac0e-4632e22d73c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29976", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mhy3rp36cx2j", "content": "", "creation_timestamp": "2026-03-26T17:08:35.977796Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1466504d-d77f-4880-ac0e-4632e22d73c6/export</guid>
      <pubDate>Thu, 26 Mar 2026 17:08:35 +0000</pubDate>
    </item>
    <item>
      <title>57e41404-873a-4dab-927f-804c08673807</title>
      <link>https://vulnerability.circl.lu/sighting/57e41404-873a-4dab-927f-804c08673807/export</link>
      <description>{"uuid": "57e41404-873a-4dab-927f-804c08673807", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29971", "type": "seen", "source": "https://t.me/GithubRedTeam/77405", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-29971\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Tharooon\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-03-26 22:58:21\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nAn attacker can execute arbitrary JavaScript in the victim's browser, potentially leading to session hijacking or privilege escalation.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-03-26T23:00:04.000000Z"}</description>
      <content:encoded>{"uuid": "57e41404-873a-4dab-927f-804c08673807", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29971", "type": "seen", "source": "https://t.me/GithubRedTeam/77405", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-29971\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Tharooon\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-03-26 22:58:21\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nAn attacker can execute arbitrary JavaScript in the victim's browser, potentially leading to session hijacking or privilege escalation.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-03-26T23:00:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/57e41404-873a-4dab-927f-804c08673807/export</guid>
      <pubDate>Thu, 26 Mar 2026 23:00:04 +0000</pubDate>
    </item>
    <item>
      <title>b1bca6e0-69bf-4c4d-a9c9-dd65ffe1d483</title>
      <link>https://vulnerability.circl.lu/sighting/b1bca6e0-69bf-4c4d-a9c9-dd65ffe1d483/export</link>
      <description>{"uuid": "b1bca6e0-69bf-4c4d-a9c9-dd65ffe1d483", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29971", "type": "published-proof-of-concept", "source": "Telegram/0XiQVvLI9OtTexbSWP04ktWorEJ1qgGSsz80l9L0cFlDChA", "content": "", "creation_timestamp": "2026-03-26T23:00:14.000000Z"}</description>
      <content:encoded>{"uuid": "b1bca6e0-69bf-4c4d-a9c9-dd65ffe1d483", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29971", "type": "published-proof-of-concept", "source": "Telegram/0XiQVvLI9OtTexbSWP04ktWorEJ1qgGSsz80l9L0cFlDChA", "content": "", "creation_timestamp": "2026-03-26T23:00:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b1bca6e0-69bf-4c4d-a9c9-dd65ffe1d483/export</guid>
      <pubDate>Thu, 26 Mar 2026 23:00:14 +0000</pubDate>
    </item>
    <item>
      <title>6247d069-9b75-4d2f-bbc6-92c9791b22c6</title>
      <link>https://vulnerability.circl.lu/sighting/6247d069-9b75-4d2f-bbc6-92c9791b22c6/export</link>
      <description>{"uuid": "6247d069-9b75-4d2f-bbc6-92c9791b22c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29971", "type": "published-proof-of-concept", "source": "Telegram/rhvNMhDEQsDmbO42lBM1UZ6liv8Ut69COJccPHJCHHT9EeA", "content": "", "creation_timestamp": "2026-03-27T03:00:09.000000Z"}</description>
      <content:encoded>{"uuid": "6247d069-9b75-4d2f-bbc6-92c9791b22c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29971", "type": "published-proof-of-concept", "source": "Telegram/rhvNMhDEQsDmbO42lBM1UZ6liv8Ut69COJccPHJCHHT9EeA", "content": "", "creation_timestamp": "2026-03-27T03:00:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6247d069-9b75-4d2f-bbc6-92c9791b22c6/export</guid>
      <pubDate>Fri, 27 Mar 2026 03:00:09 +0000</pubDate>
    </item>
    <item>
      <title>4016021b-cad1-44ad-9523-d3ab3b3846ba</title>
      <link>https://vulnerability.circl.lu/sighting/4016021b-cad1-44ad-9523-d3ab3b3846ba/export</link>
      <description>{"uuid": "4016021b-cad1-44ad-9523-d3ab3b3846ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29972", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlebs4aoxr2q", "content": "\ud83d\udfe0 CVE-2026-29972 - High (8.2)\n\nnanoMODBUS through v1.22.0 has a stack-based buffer overflow in recv_read_registers_res() in nano...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29972/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T17:43:45.881943Z"}</description>
      <content:encoded>{"uuid": "4016021b-cad1-44ad-9523-d3ab3b3846ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29972", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlebs4aoxr2q", "content": "\ud83d\udfe0 CVE-2026-29972 - High (8.2)\n\nnanoMODBUS through v1.22.0 has a stack-based buffer overflow in recv_read_registers_res() in nano...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29972/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T17:43:45.881943Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4016021b-cad1-44ad-9523-d3ab3b3846ba/export</guid>
      <pubDate>Fri, 08 May 2026 17:43:45 +0000</pubDate>
    </item>
    <item>
      <title>eb4b35fd-77f8-4338-ae28-ae45884656f7</title>
      <link>https://vulnerability.circl.lu/sighting/eb4b35fd-77f8-4338-ae28-ae45884656f7/export</link>
      <description>{"uuid": "eb4b35fd-77f8-4338-ae28-ae45884656f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29972", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlee45z3g52p", "content": "CVE-2026-29972 - NanoMODBUS Modbus TCP Server Stack Buffer Overflow Vulnerability\nCVE ID : CVE-2026-29972\n \n Published : May 8, 2026, 4:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : nanoMODBUS through v1.22.0 has a stack-based buffer overflow in recv_read_registers_res() i...", "creation_timestamp": "2026-05-08T18:25:09.100796Z"}</description>
      <content:encoded>{"uuid": "eb4b35fd-77f8-4338-ae28-ae45884656f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29972", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlee45z3g52p", "content": "CVE-2026-29972 - NanoMODBUS Modbus TCP Server Stack Buffer Overflow Vulnerability\nCVE ID : CVE-2026-29972\n \n Published : May 8, 2026, 4:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : nanoMODBUS through v1.22.0 has a stack-based buffer overflow in recv_read_registers_res() i...", "creation_timestamp": "2026-05-08T18:25:09.100796Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eb4b35fd-77f8-4338-ae28-ae45884656f7/export</guid>
      <pubDate>Fri, 08 May 2026 18:25:09 +0000</pubDate>
    </item>
    <item>
      <title>90e33b1f-ea8c-4c0b-86fa-b9920b31ffcb</title>
      <link>https://vulnerability.circl.lu/sighting/90e33b1f-ea8c-4c0b-86fa-b9920b31ffcb/export</link>
      <description>{"uuid": "90e33b1f-ea8c-4c0b-86fa-b9920b31ffcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29972", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlegmk3rc72f", "content": "nanoMODBUS v1.22.0\u4ee5\u524d\u3067\u3001Modbus TCP\u30b5\u30fc\u30d0\u30fc\u304b\u3089\u306e\u5fdc\u7b54\u30c7\u30fc\u30bf\u691c\u8a3c\u4e0d\u5099\u306b\u3088\u308a\u3001\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u306e\u53ef\u80fd\u6027\u3002\u30ea\u30e2\u30fc\u30c8\u30b3\u30fc\u30c9\u5b9f\u884c\u306b\u3064\u306a\u304c\u308b\u6050\u308c\u304c\u3042\u308b\u3002\nCVE-2026-29972 CVSS 8.2 | HIGH", "creation_timestamp": "2026-05-08T19:10:06.240052Z"}</description>
      <content:encoded>{"uuid": "90e33b1f-ea8c-4c0b-86fa-b9920b31ffcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29972", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlegmk3rc72f", "content": "nanoMODBUS v1.22.0\u4ee5\u524d\u3067\u3001Modbus TCP\u30b5\u30fc\u30d0\u30fc\u304b\u3089\u306e\u5fdc\u7b54\u30c7\u30fc\u30bf\u691c\u8a3c\u4e0d\u5099\u306b\u3088\u308a\u3001\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u306e\u53ef\u80fd\u6027\u3002\u30ea\u30e2\u30fc\u30c8\u30b3\u30fc\u30c9\u5b9f\u884c\u306b\u3064\u306a\u304c\u308b\u6050\u308c\u304c\u3042\u308b\u3002\nCVE-2026-29972 CVSS 8.2 | HIGH", "creation_timestamp": "2026-05-08T19:10:06.240052Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/90e33b1f-ea8c-4c0b-86fa-b9920b31ffcb/export</guid>
      <pubDate>Fri, 08 May 2026 19:10:06 +0000</pubDate>
    </item>
    <item>
      <title>6032e557-f300-4ccd-983c-7779672599ff</title>
      <link>https://vulnerability.circl.lu/sighting/6032e557-f300-4ccd-983c-7779672599ff/export</link>
      <description>{"uuid": "6032e557-f300-4ccd-983c-7779672599ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29974", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlejazmdsl2z", "content": "\ud83d\udfe0 CVE-2026-29974 - High (7.5)\n\nAn issue was discovered in kosma minmea 0.3.0. The minmea_scan functions format specifier copies ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29974/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T19:57:21.609757Z"}</description>
      <content:encoded>{"uuid": "6032e557-f300-4ccd-983c-7779672599ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29974", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlejazmdsl2z", "content": "\ud83d\udfe0 CVE-2026-29974 - High (7.5)\n\nAn issue was discovered in kosma minmea 0.3.0. The minmea_scan functions format specifier copies ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29974/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T19:57:21.609757Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6032e557-f300-4ccd-983c-7779672599ff/export</guid>
      <pubDate>Fri, 08 May 2026 19:57:21 +0000</pubDate>
    </item>
    <item>
      <title>519534c8-e1e7-4f1c-983b-45e57e7e4335</title>
      <link>https://vulnerability.circl.lu/sighting/519534c8-e1e7-4f1c-983b-45e57e7e4335/export</link>
      <description>{"uuid": "519534c8-e1e7-4f1c-983b-45e57e7e4335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29975", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlejbb5kei2n", "content": "\ud83d\udfe0 CVE-2026-29975 - High (7.5)\n\nlwjson 1.8.1 contains an improper input validation vulnerability in the streaming JSON parser (lw...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29975/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T19:57:29.285308Z"}</description>
      <content:encoded>{"uuid": "519534c8-e1e7-4f1c-983b-45e57e7e4335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29975", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlejbb5kei2n", "content": "\ud83d\udfe0 CVE-2026-29975 - High (7.5)\n\nlwjson 1.8.1 contains an improper input validation vulnerability in the streaming JSON parser (lw...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29975/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-08T19:57:29.285308Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/519534c8-e1e7-4f1c-983b-45e57e7e4335/export</guid>
      <pubDate>Fri, 08 May 2026 19:57:29 +0000</pubDate>
    </item>
  </channel>
</rss>
