<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 18:32:13 +0000</lastBuildDate>
    <item>
      <title>fffaa4fe-d05b-4f8b-8380-8d02559c7239</title>
      <link>https://vulnerability.circl.lu/sighting/fffaa4fe-d05b-4f8b-8380-8d02559c7239/export</link>
      <description>{"uuid": "fffaa4fe-d05b-4f8b-8380-8d02559c7239", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "published-proof-of-concept", "source": "https://t.me/codeby_sec/10039", "content": "\u26a1\ufe0f \u041e\u043a\u043d\u043e \u0430\u0442\u0430\u043a\u0438 \u0441\u0445\u043b\u043e\u043f\u043d\u0443\u043b\u043e\u0441\u044c \u0434\u043e \u043d\u0443\u043b\u044f: \u0447\u0442\u043e \u044d\u0442\u043e \u0437\u043d\u0430\u0447\u0438\u0442 \u0434\u043b\u044f \u0442\u0435\u0431\u044f\n\n\u0412 2018 \u0433\u043e\u0434\u0443 \u043e\u0442 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 CVE \u0434\u043e \u043f\u0435\u0440\u0432\u043e\u0433\u043e \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u043b\u043e \u0432 \u0441\u0440\u0435\u0434\u043d\u0435\u043c 756 \u0434\u043d\u0435\u0439. \u0421\u0435\u0433\u043e\u0434\u043d\u044f \u044d\u0442\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0435\u0442.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c VulnCheck, \u0432 2025 \u0433\u043e\u0434\u0443 28,96% \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u0437 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430 Known Exploited Vulnerabilities \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0434\u0435\u043d\u044c \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 CVE \u0438\u043b\u0438 \u0440\u0430\u043d\u044c\u0448\u0435. \u041d\u0435 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0434\u0435\u043b\u044e. \u041d\u0435 \u0447\u0435\u0440\u0435\u0437 \u0441\u0443\u0442\u043a\u0438. \u0412 \u043c\u043e\u043c\u0435\u043d\u0442, \u043a\u043e\u0433\u0434\u0430 advisory \u0435\u0449\u0451 \u043d\u0435 \u0434\u043e\u0447\u0438\u0442\u0430\u043d. Unit 42 \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u0435\u0442: \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u0441\u0432\u0435\u0436\u0443\u044e CVE \u0441\u0442\u0430\u0440\u0442\u0443\u0435\u0442 \u0447\u0435\u0440\u0435\u0437 15 \u043c\u0438\u043d\u0443\u0442 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0437\u0430\u043f\u0438\u0441\u0438. CrowdStrike \u0437\u0430\u043c\u0435\u0440\u0438\u043b \u0441\u0440\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043b\u0430\u0442\u0435\u0440\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u043f\u043e\u0441\u043b\u0435 \u043f\u0435\u0440\u0432\u0438\u0447\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u2014 29 \u043c\u0438\u043d\u0443\u0442.\n\n\ud83d\udd0d \u041f\u043e\u0447\u0435\u043c\u0443 \u0432\u0441\u0451 \u0442\u0430\u043a \u0443\u0441\u043a\u043e\u0440\u0438\u043b\u043e\u0441\u044c?\n\n\u0422\u0440\u0438 \u0444\u0430\u043a\u0442\u043e\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0438\u043b\u0438 \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0438\u0433\u0440\u044b:\n\n1. Patch diffing \u0441\u0442\u0430\u043b \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u044b\u043c. \u0412\u0435\u043d\u0434\u043e\u0440 \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u0435\u0442 \u043f\u0430\u0442\u0447 \u2014 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u0435\u0442 \u043a\u043e\u043c\u043c\u0438\u0442, \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 diff, \u043d\u0430\u0445\u043e\u0434\u0438\u0442 \u0438\u0437\u043c\u0435\u043d\u0451\u043d\u043d\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438. AI-\u0430\u0441\u0441\u0438\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0441\u043e\u043a\u0440\u0430\u0442\u0438\u043b \u044d\u0442\u043e\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0434\u043e \u0447\u0430\u0441\u043e\u0432. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c HiveSecurity, AI-\u0430\u0433\u0435\u043d\u0442\u044b \u0441\u0433\u0435\u043d\u0435\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 40 \u0440\u0430\u0431\u043e\u0447\u0438\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0434\u043b\u044f \u043e\u0434\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430 $50.\n\n2. \u041f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u043e\u0432\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u2014 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043d\u0430\u044f \u0446\u0435\u043b\u044c. \u0424\u0430\u0439\u0440\u0432\u043e\u043b\u044b, VPN, \u043f\u0440\u043e\u043a\u0441\u0438 \u0432\u043e\u0437\u0433\u043b\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u0430\u0442\u0430\u043a\u0443\u0435\u043c\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439 \u0432 2025 \u0433\u043e\u0434\u0443. \u041f\u0440\u0438\u043c\u0435\u0440: CVE-2026-3055 (CVSS 9.3) \u2014 \u0430\u043a\u0442\u0438\u0432\u043d\u0430\u044f \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0430 \u044d\u043d\u0434\u043f\u043e\u0438\u043d\u0442\u0430 /cgi/GetAuthMethods \u043d\u0430\u0447\u0430\u043b\u0430\u0441\u044c \u0447\u0435\u0440\u0435\u0437 3 \u0434\u043d\u044f \u043f\u043e\u0441\u043b\u0435 disclosure, \u0435\u0449\u0451 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u043d\u0435\u0439 CVE \u043f\u043e\u043f\u0430\u043b \u0432 CISA KEV.\n\n3. \u0412\u0435\u043d\u0434\u043e\u0440 \u043f\u0430\u0442\u0447\u0438\u0442 \u0432 \u0441\u0440\u0435\u0434\u043d\u0435\u043c \u0437\u0430 15 \u0434\u043d\u0435\u0439 \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438. \u0420\u0430\u0437\u0440\u044b\u0432 \u043c\u0435\u0436\u0434\u0443 \u00ab\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435\u00bb \u0438 \u00ab\u043f\u0430\u0442\u0447 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d\u00bb \u0438\u0437\u043c\u0435\u0440\u044f\u0435\u0442\u0441\u044f \u043d\u0435\u0434\u0435\u043b\u044f\u043c\u0438. \u0418 \u044d\u0442\u0438 \u043d\u0435\u0434\u0435\u043b\u0438 \u2014 \u0432 \u043f\u043e\u043b\u044c\u0437\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0433\u043e.\n\n\ud83d\udee0 \u041a\u0430\u043a \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0432\u0435\u0439\u0435\u0440 \u0430\u0442\u0430\u043a\u0438?\n\n\u0412\u0435\u0441\u044c \u0446\u0438\u043a\u043b \u043e\u0442 \u0441\u0442\u0440\u043e\u0447\u043a\u0438 \u0432 NVD \u0434\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e \u0448\u0435\u043b\u043b\u0430 \u0443\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0432 \u0441\u0435\u043c\u044c \u0444\u0430\u0437:\n\n\u2022 \u041c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0438 \u0442\u0440\u0438\u0430\u0436 CVE \u043f\u043e CVSS, EPSS, affected products\n\u2022 \u0410\u043d\u0430\u043b\u0438\u0437 advisory \u0438 patch diffing \u0438\u0437\u043c\u0435\u043d\u0451\u043d\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430\n\u2022 \u0412\u043e\u0441\u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u043a\u0440\u0430\u0448\u0430 \u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430 \u043e\u043a\u0440\u0443\u0436\u0435\u043d\u0438\u044f\n\u2022 \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0430 PoC: \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c RIP, ROP-\u0446\u0435\u043f\u043e\u0447\u043a\u0438, \u043e\u0431\u0445\u043e\u0434 \u043c\u0438\u0442\u0438\u0433\u0430\u0446\u0438\u0439\n\u2022 \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0432 \u0432\u0435\u0431\u0435: \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f, SSTI, SSRF-to-RCE\n\u2022 Weaponization \u0447\u0435\u0440\u0435\u0437 ysoserial, phpggc, gadget chains\n\u2022 \u0418\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0438\u044f \u0432 \u043f\u0435\u043d\u0442\u0435\u0441\u0442: \u0441\u0442\u0430\u0431\u0438\u043b\u044c\u043d\u044b\u0439 \u0448\u0435\u043b\u043b \u0432 \u043e\u0431\u0445\u043e\u0434 EDR\n\n\ud83d\udca1 \u0412\u0430\u0436\u043d\u044b\u0439 \u0432\u044b\u0432\u043e\u0434 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u043d\u0438\u043a\u043e\u0432: \u0435\u0441\u043b\u0438 \u0442\u044b \u0441\u0442\u0440\u043e\u0438\u0448\u044c vulnerability management \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 CVSS-\u0441\u043a\u043e\u0440\u0435 \u0438 \u0435\u0436\u0435\u043c\u0435\u0441\u044f\u0447\u043d\u044b\u0445 \u0446\u0438\u043a\u043b\u0430\u0445 \u043f\u0430\u0442\u0447\u0438\u043d\u0433\u0430 \u2014 \u0442\u044b \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u043e \u043e\u043f\u0430\u0437\u0434\u044b\u0432\u0430\u0435\u0448\u044c. \u041f\u0440\u0438\u043e\u0440\u0438\u0442\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u043e \u0444\u0430\u043a\u0442\u0443 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 (CISA KEV, VulnCheck KEV) \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u0435\u0435 \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043e\u0446\u0435\u043d\u043a\u0438 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e\u0441\u0442\u0438.\n\n\u0412 \u0433\u043e\u0434 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0431\u043e\u043b\u0435\u0435 25 000 \u043d\u043e\u0432\u044b\u0445 CVE \u2014 \u043e\u043a\u043e\u043b\u043e 70 \u0432 \u0434\u0435\u043d\u044c. \u041f\u0440\u0438 \u0442\u0430\u043a\u043e\u043c \u043f\u043e\u0442\u043e\u043a\u0435 \u043a\u043b\u044e\u0447\u0435\u0432\u043e\u0439 \u043d\u0430\u0432\u044b\u043a \u2014 \u043d\u0435 \u0447\u0438\u0442\u0430\u0442\u044c \u043a\u0430\u0436\u0434\u0443\u044e \u0437\u0430\u043f\u0438\u0441\u044c, \u0430 \u0434\u0435\u043b\u0430\u0442\u044c \u0431\u044b\u0441\u0442\u0440\u044b\u0439 \u0442\u0440\u0438\u0430\u0436 \u043f\u043e \u043a\u0440\u0438\u0442\u0435\u0440\u0438\u044f\u043c, \u0440\u0435\u043b\u0435\u0432\u0430\u043d\u0442\u043d\u044b\u043c \u0442\u0432\u043e\u0435\u043c\u0443 \u0441\u043a\u043e\u0443\u043f\u0443.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043a\u0430\u0436\u0434\u043e\u0439 \u0444\u0430\u0437\u044b \u2014 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435.\n\nhttps://codeby.net/threads/cve-eksploit-razrabotka-polnyi-tsikl-ot-publikatsii-uyazvimosti-do-rabochego-shella-metodologiya-i-instrumenty-2025-2026.92843/", "creation_timestamp": "2026-04-26T08:29:02.000000Z"}</description>
      <content:encoded>{"uuid": "fffaa4fe-d05b-4f8b-8380-8d02559c7239", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "published-proof-of-concept", "source": "https://t.me/codeby_sec/10039", "content": "\u26a1\ufe0f \u041e\u043a\u043d\u043e \u0430\u0442\u0430\u043a\u0438 \u0441\u0445\u043b\u043e\u043f\u043d\u0443\u043b\u043e\u0441\u044c \u0434\u043e \u043d\u0443\u043b\u044f: \u0447\u0442\u043e \u044d\u0442\u043e \u0437\u043d\u0430\u0447\u0438\u0442 \u0434\u043b\u044f \u0442\u0435\u0431\u044f\n\n\u0412 2018 \u0433\u043e\u0434\u0443 \u043e\u0442 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 CVE \u0434\u043e \u043f\u0435\u0440\u0432\u043e\u0433\u043e \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u043b\u043e \u0432 \u0441\u0440\u0435\u0434\u043d\u0435\u043c 756 \u0434\u043d\u0435\u0439. \u0421\u0435\u0433\u043e\u0434\u043d\u044f \u044d\u0442\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0435\u0442.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c VulnCheck, \u0432 2025 \u0433\u043e\u0434\u0443 28,96% \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u0437 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430 Known Exploited Vulnerabilities \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0434\u0435\u043d\u044c \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 CVE \u0438\u043b\u0438 \u0440\u0430\u043d\u044c\u0448\u0435. \u041d\u0435 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0434\u0435\u043b\u044e. \u041d\u0435 \u0447\u0435\u0440\u0435\u0437 \u0441\u0443\u0442\u043a\u0438. \u0412 \u043c\u043e\u043c\u0435\u043d\u0442, \u043a\u043e\u0433\u0434\u0430 advisory \u0435\u0449\u0451 \u043d\u0435 \u0434\u043e\u0447\u0438\u0442\u0430\u043d. Unit 42 \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u0435\u0442: \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u0441\u0432\u0435\u0436\u0443\u044e CVE \u0441\u0442\u0430\u0440\u0442\u0443\u0435\u0442 \u0447\u0435\u0440\u0435\u0437 15 \u043c\u0438\u043d\u0443\u0442 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0437\u0430\u043f\u0438\u0441\u0438. CrowdStrike \u0437\u0430\u043c\u0435\u0440\u0438\u043b \u0441\u0440\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043b\u0430\u0442\u0435\u0440\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u043f\u043e\u0441\u043b\u0435 \u043f\u0435\u0440\u0432\u0438\u0447\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u2014 29 \u043c\u0438\u043d\u0443\u0442.\n\n\ud83d\udd0d \u041f\u043e\u0447\u0435\u043c\u0443 \u0432\u0441\u0451 \u0442\u0430\u043a \u0443\u0441\u043a\u043e\u0440\u0438\u043b\u043e\u0441\u044c?\n\n\u0422\u0440\u0438 \u0444\u0430\u043a\u0442\u043e\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0438\u043b\u0438 \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0438\u0433\u0440\u044b:\n\n1. Patch diffing \u0441\u0442\u0430\u043b \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u044b\u043c. \u0412\u0435\u043d\u0434\u043e\u0440 \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u0435\u0442 \u043f\u0430\u0442\u0447 \u2014 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u0435\u0442 \u043a\u043e\u043c\u043c\u0438\u0442, \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 diff, \u043d\u0430\u0445\u043e\u0434\u0438\u0442 \u0438\u0437\u043c\u0435\u043d\u0451\u043d\u043d\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438. AI-\u0430\u0441\u0441\u0438\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0441\u043e\u043a\u0440\u0430\u0442\u0438\u043b \u044d\u0442\u043e\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0434\u043e \u0447\u0430\u0441\u043e\u0432. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c HiveSecurity, AI-\u0430\u0433\u0435\u043d\u0442\u044b \u0441\u0433\u0435\u043d\u0435\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 40 \u0440\u0430\u0431\u043e\u0447\u0438\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0434\u043b\u044f \u043e\u0434\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430 $50.\n\n2. \u041f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u043e\u0432\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u2014 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043d\u0430\u044f \u0446\u0435\u043b\u044c. \u0424\u0430\u0439\u0440\u0432\u043e\u043b\u044b, VPN, \u043f\u0440\u043e\u043a\u0441\u0438 \u0432\u043e\u0437\u0433\u043b\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u0430\u0442\u0430\u043a\u0443\u0435\u043c\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439 \u0432 2025 \u0433\u043e\u0434\u0443. \u041f\u0440\u0438\u043c\u0435\u0440: CVE-2026-3055 (CVSS 9.3) \u2014 \u0430\u043a\u0442\u0438\u0432\u043d\u0430\u044f \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0430 \u044d\u043d\u0434\u043f\u043e\u0438\u043d\u0442\u0430 /cgi/GetAuthMethods \u043d\u0430\u0447\u0430\u043b\u0430\u0441\u044c \u0447\u0435\u0440\u0435\u0437 3 \u0434\u043d\u044f \u043f\u043e\u0441\u043b\u0435 disclosure, \u0435\u0449\u0451 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u043d\u0435\u0439 CVE \u043f\u043e\u043f\u0430\u043b \u0432 CISA KEV.\n\n3. \u0412\u0435\u043d\u0434\u043e\u0440 \u043f\u0430\u0442\u0447\u0438\u0442 \u0432 \u0441\u0440\u0435\u0434\u043d\u0435\u043c \u0437\u0430 15 \u0434\u043d\u0435\u0439 \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438. \u0420\u0430\u0437\u0440\u044b\u0432 \u043c\u0435\u0436\u0434\u0443 \u00ab\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435\u00bb \u0438 \u00ab\u043f\u0430\u0442\u0447 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d\u00bb \u0438\u0437\u043c\u0435\u0440\u044f\u0435\u0442\u0441\u044f \u043d\u0435\u0434\u0435\u043b\u044f\u043c\u0438. \u0418 \u044d\u0442\u0438 \u043d\u0435\u0434\u0435\u043b\u0438 \u2014 \u0432 \u043f\u043e\u043b\u044c\u0437\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0433\u043e.\n\n\ud83d\udee0 \u041a\u0430\u043a \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0432\u0435\u0439\u0435\u0440 \u0430\u0442\u0430\u043a\u0438?\n\n\u0412\u0435\u0441\u044c \u0446\u0438\u043a\u043b \u043e\u0442 \u0441\u0442\u0440\u043e\u0447\u043a\u0438 \u0432 NVD \u0434\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e \u0448\u0435\u043b\u043b\u0430 \u0443\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0432 \u0441\u0435\u043c\u044c \u0444\u0430\u0437:\n\n\u2022 \u041c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0438 \u0442\u0440\u0438\u0430\u0436 CVE \u043f\u043e CVSS, EPSS, affected products\n\u2022 \u0410\u043d\u0430\u043b\u0438\u0437 advisory \u0438 patch diffing \u0438\u0437\u043c\u0435\u043d\u0451\u043d\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430\n\u2022 \u0412\u043e\u0441\u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u043a\u0440\u0430\u0448\u0430 \u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430 \u043e\u043a\u0440\u0443\u0436\u0435\u043d\u0438\u044f\n\u2022 \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0430 PoC: \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c RIP, ROP-\u0446\u0435\u043f\u043e\u0447\u043a\u0438, \u043e\u0431\u0445\u043e\u0434 \u043c\u0438\u0442\u0438\u0433\u0430\u0446\u0438\u0439\n\u2022 \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0432 \u0432\u0435\u0431\u0435: \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f, SSTI, SSRF-to-RCE\n\u2022 Weaponization \u0447\u0435\u0440\u0435\u0437 ysoserial, phpggc, gadget chains\n\u2022 \u0418\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0438\u044f \u0432 \u043f\u0435\u043d\u0442\u0435\u0441\u0442: \u0441\u0442\u0430\u0431\u0438\u043b\u044c\u043d\u044b\u0439 \u0448\u0435\u043b\u043b \u0432 \u043e\u0431\u0445\u043e\u0434 EDR\n\n\ud83d\udca1 \u0412\u0430\u0436\u043d\u044b\u0439 \u0432\u044b\u0432\u043e\u0434 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u043d\u0438\u043a\u043e\u0432: \u0435\u0441\u043b\u0438 \u0442\u044b \u0441\u0442\u0440\u043e\u0438\u0448\u044c vulnerability management \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 CVSS-\u0441\u043a\u043e\u0440\u0435 \u0438 \u0435\u0436\u0435\u043c\u0435\u0441\u044f\u0447\u043d\u044b\u0445 \u0446\u0438\u043a\u043b\u0430\u0445 \u043f\u0430\u0442\u0447\u0438\u043d\u0433\u0430 \u2014 \u0442\u044b \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u043e \u043e\u043f\u0430\u0437\u0434\u044b\u0432\u0430\u0435\u0448\u044c. \u041f\u0440\u0438\u043e\u0440\u0438\u0442\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u043e \u0444\u0430\u043a\u0442\u0443 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 (CISA KEV, VulnCheck KEV) \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u0435\u0435 \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043e\u0446\u0435\u043d\u043a\u0438 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e\u0441\u0442\u0438.\n\n\u0412 \u0433\u043e\u0434 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0431\u043e\u043b\u0435\u0435 25 000 \u043d\u043e\u0432\u044b\u0445 CVE \u2014 \u043e\u043a\u043e\u043b\u043e 70 \u0432 \u0434\u0435\u043d\u044c. \u041f\u0440\u0438 \u0442\u0430\u043a\u043e\u043c \u043f\u043e\u0442\u043e\u043a\u0435 \u043a\u043b\u044e\u0447\u0435\u0432\u043e\u0439 \u043d\u0430\u0432\u044b\u043a \u2014 \u043d\u0435 \u0447\u0438\u0442\u0430\u0442\u044c \u043a\u0430\u0436\u0434\u0443\u044e \u0437\u0430\u043f\u0438\u0441\u044c, \u0430 \u0434\u0435\u043b\u0430\u0442\u044c \u0431\u044b\u0441\u0442\u0440\u044b\u0439 \u0442\u0440\u0438\u0430\u0436 \u043f\u043e \u043a\u0440\u0438\u0442\u0435\u0440\u0438\u044f\u043c, \u0440\u0435\u043b\u0435\u0432\u0430\u043d\u0442\u043d\u044b\u043c \u0442\u0432\u043e\u0435\u043c\u0443 \u0441\u043a\u043e\u0443\u043f\u0443.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043a\u0430\u0436\u0434\u043e\u0439 \u0444\u0430\u0437\u044b \u2014 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435.\n\nhttps://codeby.net/threads/cve-eksploit-razrabotka-polnyi-tsikl-ot-publikatsii-uyazvimosti-do-rabochego-shella-metodologiya-i-instrumenty-2025-2026.92843/", "creation_timestamp": "2026-04-26T08:29:02.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fffaa4fe-d05b-4f8b-8380-8d02559c7239/export</guid>
      <pubDate>Sun, 26 Apr 2026 08:29:02 +0000</pubDate>
    </item>
    <item>
      <title>c5569ba7-c251-490d-9f6d-ee2b14e2bc2f</title>
      <link>https://vulnerability.circl.lu/sighting/c5569ba7-c251-490d-9f6d-ee2b14e2bc2f/export</link>
      <description>{"uuid": "c5569ba7-c251-490d-9f6d-ee2b14e2bc2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-27)", "content": "", "creation_timestamp": "2026-04-27T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "c5569ba7-c251-490d-9f6d-ee2b14e2bc2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-27)", "content": "", "creation_timestamp": "2026-04-27T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c5569ba7-c251-490d-9f6d-ee2b14e2bc2f/export</guid>
      <pubDate>Mon, 27 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>e0570063-bddb-4829-a8b3-0231de7c1a3f</title>
      <link>https://vulnerability.circl.lu/sighting/e0570063-bddb-4829-a8b3-0231de7c1a3f/export</link>
      <description>{"uuid": "e0570063-bddb-4829-a8b3-0231de7c1a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-27)", "content": "", "creation_timestamp": "2026-04-27T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "e0570063-bddb-4829-a8b3-0231de7c1a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-27)", "content": "", "creation_timestamp": "2026-04-27T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e0570063-bddb-4829-a8b3-0231de7c1a3f/export</guid>
      <pubDate>Mon, 27 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>c1d276af-4354-401b-a950-142c525f710c</title>
      <link>https://vulnerability.circl.lu/sighting/c1d276af-4354-401b-a950-142c525f710c/export</link>
      <description>{"uuid": "c1d276af-4354-401b-a950-142c525f710c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "c1d276af-4354-401b-a950-142c525f710c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c1d276af-4354-401b-a950-142c525f710c/export</guid>
      <pubDate>Wed, 29 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>04b5c32e-ba1f-4fd2-9832-f684fdc8f049</title>
      <link>https://vulnerability.circl.lu/sighting/04b5c32e-ba1f-4fd2-9832-f684fdc8f049/export</link>
      <description>{"uuid": "04b5c32e-ba1f-4fd2-9832-f684fdc8f049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "04b5c32e-ba1f-4fd2-9832-f684fdc8f049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/04b5c32e-ba1f-4fd2-9832-f684fdc8f049/export</guid>
      <pubDate>Wed, 29 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>c9e623b7-4d5e-4b8a-be2e-99423efbb3c7</title>
      <link>https://vulnerability.circl.lu/sighting/c9e623b7-4d5e-4b8a-be2e-99423efbb3c7/export</link>
      <description>{"uuid": "c9e623b7-4d5e-4b8a-be2e-99423efbb3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-30)", "content": "", "creation_timestamp": "2026-04-30T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "c9e623b7-4d5e-4b8a-be2e-99423efbb3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-30)", "content": "", "creation_timestamp": "2026-04-30T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c9e623b7-4d5e-4b8a-be2e-99423efbb3c7/export</guid>
      <pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>dac5e192-9b1b-4596-a21c-6e5268a60afa</title>
      <link>https://vulnerability.circl.lu/sighting/dac5e192-9b1b-4596-a21c-6e5268a60afa/export</link>
      <description>{"uuid": "dac5e192-9b1b-4596-a21c-6e5268a60afa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-30)", "content": "", "creation_timestamp": "2026-04-30T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "dac5e192-9b1b-4596-a21c-6e5268a60afa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-30)", "content": "", "creation_timestamp": "2026-04-30T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dac5e192-9b1b-4596-a21c-6e5268a60afa/export</guid>
      <pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>ac1d15f3-141c-479d-8756-f71111d2a83a</title>
      <link>https://vulnerability.circl.lu/sighting/ac1d15f3-141c-479d-8756-f71111d2a83a/export</link>
      <description>{"uuid": "ac1d15f3-141c-479d-8756-f71111d2a83a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-02)", "content": "", "creation_timestamp": "2026-05-02T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "ac1d15f3-141c-479d-8756-f71111d2a83a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-02)", "content": "", "creation_timestamp": "2026-05-02T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ac1d15f3-141c-479d-8756-f71111d2a83a/export</guid>
      <pubDate>Sat, 02 May 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>aecc322d-286f-43ad-8e60-ca5039cfad46</title>
      <link>https://vulnerability.circl.lu/sighting/aecc322d-286f-43ad-8e60-ca5039cfad46/export</link>
      <description>{"uuid": "aecc322d-286f-43ad-8e60-ca5039cfad46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-02)", "content": "", "creation_timestamp": "2026-05-02T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "aecc322d-286f-43ad-8e60-ca5039cfad46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-02)", "content": "", "creation_timestamp": "2026-05-02T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aecc322d-286f-43ad-8e60-ca5039cfad46/export</guid>
      <pubDate>Sat, 02 May 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>38a4bc50-e9c9-4f0c-87a3-19e33ae2f5ac</title>
      <link>https://vulnerability.circl.lu/sighting/38a4bc50-e9c9-4f0c-87a3-19e33ae2f5ac/export</link>
      <description>{"uuid": "38a4bc50-e9c9-4f0c-87a3-19e33ae2f5ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-03)", "content": "", "creation_timestamp": "2026-05-03T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "38a4bc50-e9c9-4f0c-87a3-19e33ae2f5ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3055", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-03)", "content": "", "creation_timestamp": "2026-05-03T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/38a4bc50-e9c9-4f0c-87a3-19e33ae2f5ac/export</guid>
      <pubDate>Sun, 03 May 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
