<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 22:24:05 +0000</lastBuildDate>
    <item>
      <title>88f1148b-e1a7-4e4a-a5e2-00d30119d047</title>
      <link>https://vulnerability.circl.lu/sighting/88f1148b-e1a7-4e4a-a5e2-00d30119d047/export</link>
      <description>{"uuid": "88f1148b-e1a7-4e4a-a5e2-00d30119d047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mi7cr45okr2m", "content": "", "creation_timestamp": "2026-03-29T14:02:10.522812Z"}</description>
      <content:encoded>{"uuid": "88f1148b-e1a7-4e4a-a5e2-00d30119d047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mi7cr45okr2m", "content": "", "creation_timestamp": "2026-03-29T14:02:10.522812Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/88f1148b-e1a7-4e4a-a5e2-00d30119d047/export</guid>
      <pubDate>Sun, 29 Mar 2026 14:02:10 +0000</pubDate>
    </item>
    <item>
      <title>1a3f9b0c-895f-4a0a-846d-b28348ee99e5</title>
      <link>https://vulnerability.circl.lu/sighting/1a3f9b0c-895f-4a0a-846d-b28348ee99e5/export</link>
      <description>{"uuid": "1a3f9b0c-895f-4a0a-846d-b28348ee99e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://t.me/GithubRedTeam/77860", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a teampcp-tools\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Unit221B\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-03-29 21:38:07\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nDetection, eradication, and IOC tools for the TeamPCP/Cipherforce supply chain attack (CVE-2026-33634)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-03-29T22:00:03.000000Z"}</description>
      <content:encoded>{"uuid": "1a3f9b0c-895f-4a0a-846d-b28348ee99e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://t.me/GithubRedTeam/77860", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a teampcp-tools\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Unit221B\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-03-29 21:38:07\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nDetection, eradication, and IOC tools for the TeamPCP/Cipherforce supply chain attack (CVE-2026-33634)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-03-29T22:00:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1a3f9b0c-895f-4a0a-846d-b28348ee99e5/export</guid>
      <pubDate>Sun, 29 Mar 2026 22:00:03 +0000</pubDate>
    </item>
    <item>
      <title>a52728b4-8a7d-4c6e-900e-58d40d30b0ed</title>
      <link>https://vulnerability.circl.lu/sighting/a52728b4-8a7d-4c6e-900e-58d40d30b0ed/export</link>
      <description>{"uuid": "a52728b4-8a7d-4c6e-900e-58d40d30b0ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://t.me/kasperskyb2b/2120", "content": "Trivy \u0438 LiteLLM \u043f\u043e\u0434 \u0443\u0434\u0430\u0440\u043e\u043c, \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u044f BPFdoor \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\ud83d\udd25\u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0441\u0430\u043c\u0430\u044f \u0437\u043d\u0430\u0447\u0438\u043c\u0430\u044f \u043d\u043e\u0432\u043e\u0441\u0442\u044c \u043c\u0435\u0441\u044f\u0446\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0435\u0449\u0451 \u043d\u0435 \u0440\u0430\u0437 \u043d\u0430\u043c \u0430\u0443\u043a\u043d\u0435\u0442\u0441\u044f \u2014 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u043f\u043e \u0440\u0430\u0431\u043e\u0442\u0435 \u0441 \u0418\u0418-\u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438 LiteLLM, \u0441\u043a\u0430\u043d\u0435\u0440\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Trivy \u0438 Checkmarx. \u0418\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0443 \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d CVE-2026-33634 (CVSS 9.4). \u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e, \u043d\u0430\u043f\u043e\u043c\u043d\u0438\u043c, \u0442\u0430\u0449\u0438\u0442 SSH\u2011\u043a\u043b\u044e\u0447\u0438, \u0441\u0435\u043a\u0440\u0435\u0442\u044b CI/CD,  \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 AWS \u0438 GCP, \u0441\u0435\u043a\u0440\u0435\u0442\u044b k8 \u0438 \u0434\u0430\u0436\u0435  \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043e\u0448\u0435\u043b\u044c\u043a\u0438. \u0421\u043b\u0435\u0434\u043e\u043c \u043d\u0430 \u043f\u0440\u043e\u0441\u0442\u043e\u0440\u044b npm \u0431\u044b\u043b \u0432\u044b\u043f\u0443\u0449\u0435\u043d \u0447\u0435\u0440\u0432\u044c CanisterWorm.\n\n\ud83d\udcf1APT Red Menshen \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u0442\u044c BPFDoor, \u0441\u043a\u0440\u044b\u0442\u043d\u044b\u0439 Linux\u2011\u0431\u044d\u043a\u0434\u043e\u0440, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u0435\u0442 eBPF \u0438 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u00ab\u0432\u043e\u043b\u0448\u0435\u0431\u043d\u043e\u0433\u043e\u00bb \u043f\u0430\u043a\u0435\u0442\u0430. \u0412 \u043d\u043e\u0432\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 \u0442\u0440\u0438\u0433\u0433\u0435\u0440\u044b \u0432\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0432 HTTPS\u2011\u0442\u0440\u0430\u0444\u0438\u043a, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0434\u0435\u0442\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0437\u0430\u043c\u0435\u0442\u043d\u043e \u0441\u043b\u043e\u0436\u043d\u0435\u0435. \u0413\u0440\u0443\u043f\u043f\u0430 \u0447\u0451\u0442\u043a\u043e \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u0430 \u043d\u0430 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u2011\u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432 \u0438 \u0433\u043e\u0441\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b. \u041f\u0440\u043e\u043d\u0438\u043a\u0430\u044e\u0442  \u0432 \u0441\u0435\u0442\u044c \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043f\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Ivanti, Cisco, Fortinet \u0438 Palo Alto. \u0414\u043b\u044f \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u043d\u044b\u0435 \u0438\u043c\u0435\u043d\u043d\u043e \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0442\u0435\u043b\u0435\u043a\u043e\u043c-\u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430\u043c\u0438. \u041d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 BPFDoor \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b \u0438\u043d\u0441\u043f\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u0440\u0430\u0444\u0438\u043a \u0441\u0438\u0433\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 SCTP,  \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0437\u0430 \u0432\u0441\u0435\u043c\u0438 \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f\u043c\u0438 \u0430\u0431\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0442\u0435\u043b\u0435\u043a\u043e\u043c-\u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430.\n\n\ud83d\udd3b\u0410\u043d\u0430\u043b\u0438\u0437 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432 \u00ab\u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e\u00bb  \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b \u0441\u0432\u044f\u0437\u044c \u043c\u0435\u0436\u0434\u0443 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u2011\u043a\u0438\u0442\u043e\u043c Coruna \u0438 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u00ab\u0422\u0440\u0438\u0430\u043d\u0433\u0443\u043b\u044f\u0446\u0438\u044f\u00bb. \n\n\ud83d\udfe2 \u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u0443\u044e \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044e \u0432 \u042e\u0412\u0410: \u0441\u0432\u044f\u0437\u043a\u0430 \u0431\u044d\u043a\u0434\u043e\u0440\u0430 Brushworm \u0438 \u043a\u0435\u0439\u043b\u043e\u0433\u0433\u0435\u0440\u0430 Brushlogger \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 USB\u2011\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u0438, \u043f\u043e\u0445\u0438\u0449\u0430\u0435\u0442 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u044b \u0438 \u0430\u0440\u0445\u0438\u0432\u044b \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u043f\u043e\u0447\u0442\u044b.\n\n\ud83d\udfe2\u0420\u0430\u0437\u0431\u043e\u0440 \u0412\u041f\u041e PRISMEX, \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e APT28. \u041e\u043d\u043e \u0431\u044b\u043b\u043e \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 Microsoft Office (CVE-2026-21509 \u0438 CVE-2026-21513). PRISMEX \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0441\u0442\u0435\u0433\u0430\u043d\u043e\u0433\u0440\u0430\u0444\u0438\u044e, \u0442\u0435\u0445\u043d\u0438\u043a\u0443 COM hijacking \u0434\u043b\u044f \u0437\u0430\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0438\u044f \u0438 \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u0435\u0442 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u043c \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u043c Filen io \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u04212.\n\n\ud83d\udfe3APT Silver Fox \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442 \u0444\u0438\u0448\u0438\u043d\u0433\u043e\u0432\u044b\u0435 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u043e\u0434 \u0432\u0438\u0434\u043e\u043c \u043d\u0430\u043b\u043e\u0433\u043e\u0432\u044b\u0445 \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u0439 \u043f\u043e \u0441\u0442\u0440\u0430\u043d\u0430\u043c \u042e\u0433\u043e\u2011\u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0439 \u0410\u0437\u0438\u0438, \u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f ValleyRAT \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u043c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u043c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0434\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 Gh0st RAT \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c HoldingHands \u0438 \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440 \u043d\u0430 Python, \u0437\u0430\u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043f\u043e\u0434 WhatsApp. \u0413\u0440\u0443\u043f\u043f\u0430 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0441\u043e\u0447\u0435\u0442\u0430\u0442\u044c \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438 \u0441\u043e \u0448\u043f\u0438\u043e\u043d\u0430\u0436\u0435\u043c. \n\n\ud83e\udd2a\u041d\u0435 \u043f\u0443\u0442\u0430\u0435\u043c PaaS \u0438 PaaS!  EvilTokens, \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 \u00ab\u0444\u0438\u0448\u0438\u043d\u0433 \u043a\u0430\u043a \u0443\u0441\u043b\u0443\u0433\u0430\u00bb (Phishing as a Service) \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u0435\u0442 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043e\u0439 \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430 Railway.com (Platform as a Service) \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0442\u043e\u043a\u0435\u043d\u043e\u0432 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 Microsoft 365 \u0443 \u0441\u043e\u0442\u0435\u043d \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u0432 \u0421\u0428\u0410, \u041a\u0430\u043d\u0430\u0434\u0435, \u0410\u0432\u0441\u0442\u0440\u0430\u043b\u0438\u0438, \u041d\u043e\u0432\u043e\u0439 \u0417\u0435\u043b\u0430\u043d\u0434\u0438\u0438 \u0438 \u0413\u0435\u0440\u043c\u0430\u043d\u0438\u0438.\n\n\ud83d\udd34\u0410\u043d\u0430\u043b\u0438\u0437 \u0430\u0442\u0430\u043a \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c PXA Stealer, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443.\n\n\ud83d\udcf1 \u041e\u0431\u0437\u043e\u0440 12 \u043d\u043e\u0432\u044b\u0445 \u0441\u0435\u043c\u0435\u0439\u0441\u0442\u0432 \u0441\u0442\u0438\u043b\u0435\u0440\u043e\u0432, \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u043c\u044b\u0445 \u0447\u0435\u0440\u0435\u0437 Telegram\u2011\u0431\u043e\u0442\u043e\u0432.\n\n#\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 #APT @\u041f2\u0422", "creation_timestamp": "2026-03-30T07:33:05.000000Z"}</description>
      <content:encoded>{"uuid": "a52728b4-8a7d-4c6e-900e-58d40d30b0ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://t.me/kasperskyb2b/2120", "content": "Trivy \u0438 LiteLLM \u043f\u043e\u0434 \u0443\u0434\u0430\u0440\u043e\u043c, \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u044f BPFdoor \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\ud83d\udd25\u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0441\u0430\u043c\u0430\u044f \u0437\u043d\u0430\u0447\u0438\u043c\u0430\u044f \u043d\u043e\u0432\u043e\u0441\u0442\u044c \u043c\u0435\u0441\u044f\u0446\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0435\u0449\u0451 \u043d\u0435 \u0440\u0430\u0437 \u043d\u0430\u043c \u0430\u0443\u043a\u043d\u0435\u0442\u0441\u044f \u2014 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u043f\u043e \u0440\u0430\u0431\u043e\u0442\u0435 \u0441 \u0418\u0418-\u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438 LiteLLM, \u0441\u043a\u0430\u043d\u0435\u0440\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Trivy \u0438 Checkmarx. \u0418\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0443 \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d CVE-2026-33634 (CVSS 9.4). \u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e, \u043d\u0430\u043f\u043e\u043c\u043d\u0438\u043c, \u0442\u0430\u0449\u0438\u0442 SSH\u2011\u043a\u043b\u044e\u0447\u0438, \u0441\u0435\u043a\u0440\u0435\u0442\u044b CI/CD,  \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 AWS \u0438 GCP, \u0441\u0435\u043a\u0440\u0435\u0442\u044b k8 \u0438 \u0434\u0430\u0436\u0435  \u043a\u0440\u0438\u043f\u0442\u043e\u043a\u043e\u0448\u0435\u043b\u044c\u043a\u0438. \u0421\u043b\u0435\u0434\u043e\u043c \u043d\u0430 \u043f\u0440\u043e\u0441\u0442\u043e\u0440\u044b npm \u0431\u044b\u043b \u0432\u044b\u043f\u0443\u0449\u0435\u043d \u0447\u0435\u0440\u0432\u044c CanisterWorm.\n\n\ud83d\udcf1APT Red Menshen \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u0442\u044c BPFDoor, \u0441\u043a\u0440\u044b\u0442\u043d\u044b\u0439 Linux\u2011\u0431\u044d\u043a\u0434\u043e\u0440, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u0435\u0442 eBPF \u0438 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u00ab\u0432\u043e\u043b\u0448\u0435\u0431\u043d\u043e\u0433\u043e\u00bb \u043f\u0430\u043a\u0435\u0442\u0430. \u0412 \u043d\u043e\u0432\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 \u0442\u0440\u0438\u0433\u0433\u0435\u0440\u044b \u0432\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0432 HTTPS\u2011\u0442\u0440\u0430\u0444\u0438\u043a, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0434\u0435\u0442\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0437\u0430\u043c\u0435\u0442\u043d\u043e \u0441\u043b\u043e\u0436\u043d\u0435\u0435. \u0413\u0440\u0443\u043f\u043f\u0430 \u0447\u0451\u0442\u043a\u043e \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u0430 \u043d\u0430 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u2011\u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432 \u0438 \u0433\u043e\u0441\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b. \u041f\u0440\u043e\u043d\u0438\u043a\u0430\u044e\u0442  \u0432 \u0441\u0435\u0442\u044c \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043f\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Ivanti, Cisco, Fortinet \u0438 Palo Alto. \u0414\u043b\u044f \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u043d\u044b\u0435 \u0438\u043c\u0435\u043d\u043d\u043e \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0442\u0435\u043b\u0435\u043a\u043e\u043c-\u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430\u043c\u0438. \u041d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 BPFDoor \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b \u0438\u043d\u0441\u043f\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u0440\u0430\u0444\u0438\u043a \u0441\u0438\u0433\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 SCTP,  \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0437\u0430 \u0432\u0441\u0435\u043c\u0438 \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f\u043c\u0438 \u0430\u0431\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0442\u0435\u043b\u0435\u043a\u043e\u043c-\u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430.\n\n\ud83d\udd3b\u0410\u043d\u0430\u043b\u0438\u0437 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432 \u00ab\u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e\u00bb  \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b \u0441\u0432\u044f\u0437\u044c \u043c\u0435\u0436\u0434\u0443 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u2011\u043a\u0438\u0442\u043e\u043c Coruna \u0438 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u00ab\u0422\u0440\u0438\u0430\u043d\u0433\u0443\u043b\u044f\u0446\u0438\u044f\u00bb. \n\n\ud83d\udfe2 \u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u0443\u044e \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044e \u0432 \u042e\u0412\u0410: \u0441\u0432\u044f\u0437\u043a\u0430 \u0431\u044d\u043a\u0434\u043e\u0440\u0430 Brushworm \u0438 \u043a\u0435\u0439\u043b\u043e\u0433\u0433\u0435\u0440\u0430 Brushlogger \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 USB\u2011\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u0438, \u043f\u043e\u0445\u0438\u0449\u0430\u0435\u0442 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u044b \u0438 \u0430\u0440\u0445\u0438\u0432\u044b \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u043f\u043e\u0447\u0442\u044b.\n\n\ud83d\udfe2\u0420\u0430\u0437\u0431\u043e\u0440 \u0412\u041f\u041e PRISMEX, \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e APT28. \u041e\u043d\u043e \u0431\u044b\u043b\u043e \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 Microsoft Office (CVE-2026-21509 \u0438 CVE-2026-21513). PRISMEX \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0441\u0442\u0435\u0433\u0430\u043d\u043e\u0433\u0440\u0430\u0444\u0438\u044e, \u0442\u0435\u0445\u043d\u0438\u043a\u0443 COM hijacking \u0434\u043b\u044f \u0437\u0430\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0438\u044f \u0438 \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u0435\u0442 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u043c \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u043c Filen io \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u04212.\n\n\ud83d\udfe3APT Silver Fox \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442 \u0444\u0438\u0448\u0438\u043d\u0433\u043e\u0432\u044b\u0435 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u043e\u0434 \u0432\u0438\u0434\u043e\u043c \u043d\u0430\u043b\u043e\u0433\u043e\u0432\u044b\u0445 \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u0439 \u043f\u043e \u0441\u0442\u0440\u0430\u043d\u0430\u043c \u042e\u0433\u043e\u2011\u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0439 \u0410\u0437\u0438\u0438, \u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f ValleyRAT \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u043c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u043c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0434\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 Gh0st RAT \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c HoldingHands \u0438 \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440 \u043d\u0430 Python, \u0437\u0430\u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043f\u043e\u0434 WhatsApp. \u0413\u0440\u0443\u043f\u043f\u0430 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0441\u043e\u0447\u0435\u0442\u0430\u0442\u044c \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438 \u0441\u043e \u0448\u043f\u0438\u043e\u043d\u0430\u0436\u0435\u043c. \n\n\ud83e\udd2a\u041d\u0435 \u043f\u0443\u0442\u0430\u0435\u043c PaaS \u0438 PaaS!  EvilTokens, \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 \u00ab\u0444\u0438\u0448\u0438\u043d\u0433 \u043a\u0430\u043a \u0443\u0441\u043b\u0443\u0433\u0430\u00bb (Phishing as a Service) \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u0435\u0442 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043e\u0439 \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430 Railway.com (Platform as a Service) \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0442\u043e\u043a\u0435\u043d\u043e\u0432 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 Microsoft 365 \u0443 \u0441\u043e\u0442\u0435\u043d \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u0432 \u0421\u0428\u0410, \u041a\u0430\u043d\u0430\u0434\u0435, \u0410\u0432\u0441\u0442\u0440\u0430\u043b\u0438\u0438, \u041d\u043e\u0432\u043e\u0439 \u0417\u0435\u043b\u0430\u043d\u0434\u0438\u0438 \u0438 \u0413\u0435\u0440\u043c\u0430\u043d\u0438\u0438.\n\n\ud83d\udd34\u0410\u043d\u0430\u043b\u0438\u0437 \u0430\u0442\u0430\u043a \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c PXA Stealer, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443.\n\n\ud83d\udcf1 \u041e\u0431\u0437\u043e\u0440 12 \u043d\u043e\u0432\u044b\u0445 \u0441\u0435\u043c\u0435\u0439\u0441\u0442\u0432 \u0441\u0442\u0438\u043b\u0435\u0440\u043e\u0432, \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u043c\u044b\u0445 \u0447\u0435\u0440\u0435\u0437 Telegram\u2011\u0431\u043e\u0442\u043e\u0432.\n\n#\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 #APT @\u041f2\u0422", "creation_timestamp": "2026-03-30T07:33:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a52728b4-8a7d-4c6e-900e-58d40d30b0ed/export</guid>
      <pubDate>Mon, 30 Mar 2026 07:33:05 +0000</pubDate>
    </item>
    <item>
      <title>bd0e0d3f-0460-45fb-9eed-4c70e1bca284</title>
      <link>https://vulnerability.circl.lu/sighting/bd0e0d3f-0460-45fb-9eed-4c70e1bca284/export</link>
      <description>{"uuid": "bd0e0d3f-0460-45fb-9eed-4c70e1bca284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mibr5g72y22w", "content": "", "creation_timestamp": "2026-03-30T13:24:58.738292Z"}</description>
      <content:encoded>{"uuid": "bd0e0d3f-0460-45fb-9eed-4c70e1bca284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mibr5g72y22w", "content": "", "creation_timestamp": "2026-03-30T13:24:58.738292Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bd0e0d3f-0460-45fb-9eed-4c70e1bca284/export</guid>
      <pubDate>Mon, 30 Mar 2026 13:24:58 +0000</pubDate>
    </item>
    <item>
      <title>41d71be7-872f-468e-8d05-76610f3182c2</title>
      <link>https://vulnerability.circl.lu/sighting/41d71be7-872f-468e-8d05-76610f3182c2/export</link>
      <description>{"uuid": "41d71be7-872f-468e-8d05-76610f3182c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "published-proof-of-concept", "source": "Telegram/GaMGzk6quMfkMjAkzI4lSk6nx3GpyIi67KywiajpwVCnbkI", "content": "", "creation_timestamp": "2026-03-30T21:00:05.000000Z"}</description>
      <content:encoded>{"uuid": "41d71be7-872f-468e-8d05-76610f3182c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "published-proof-of-concept", "source": "Telegram/GaMGzk6quMfkMjAkzI4lSk6nx3GpyIi67KywiajpwVCnbkI", "content": "", "creation_timestamp": "2026-03-30T21:00:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/41d71be7-872f-468e-8d05-76610f3182c2/export</guid>
      <pubDate>Mon, 30 Mar 2026 21:00:05 +0000</pubDate>
    </item>
    <item>
      <title>15a1ae13-6254-47e1-87b3-ddbf78d4a9ed</title>
      <link>https://vulnerability.circl.lu/sighting/15a1ae13-6254-47e1-87b3-ddbf78d4a9ed/export</link>
      <description>{"uuid": "15a1ae13-6254-47e1-87b3-ddbf78d4a9ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-33634", "type": "seen", "source": "https://bsky.app/profile/clankussy.abu.guru/post/3mideo7azyo2r", "content": "", "creation_timestamp": "2026-03-31T04:47:03.778402Z"}</description>
      <content:encoded>{"uuid": "15a1ae13-6254-47e1-87b3-ddbf78d4a9ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-33634", "type": "seen", "source": "https://bsky.app/profile/clankussy.abu.guru/post/3mideo7azyo2r", "content": "", "creation_timestamp": "2026-03-31T04:47:03.778402Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/15a1ae13-6254-47e1-87b3-ddbf78d4a9ed/export</guid>
      <pubDate>Tue, 31 Mar 2026 04:47:03 +0000</pubDate>
    </item>
    <item>
      <title>01382921-5a06-4c56-ad62-95cec57bf4e4</title>
      <link>https://vulnerability.circl.lu/sighting/01382921-5a06-4c56-ad62-95cec57bf4e4/export</link>
      <description>{"uuid": "01382921-5a06-4c56-ad62-95cec57bf4e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://bsky.app/profile/solomonneas.dev/post/3mie4zwukr227", "content": "", "creation_timestamp": "2026-03-31T12:03:03.729218Z"}</description>
      <content:encoded>{"uuid": "01382921-5a06-4c56-ad62-95cec57bf4e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://bsky.app/profile/solomonneas.dev/post/3mie4zwukr227", "content": "", "creation_timestamp": "2026-03-31T12:03:03.729218Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/01382921-5a06-4c56-ad62-95cec57bf4e4/export</guid>
      <pubDate>Tue, 31 Mar 2026 12:03:03 +0000</pubDate>
    </item>
    <item>
      <title>9e0eaebb-0cbc-40ad-8ede-182101eb2077</title>
      <link>https://vulnerability.circl.lu/sighting/9e0eaebb-0cbc-40ad-8ede-182101eb2077/export</link>
      <description>{"uuid": "9e0eaebb-0cbc-40ad-8ede-182101eb2077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://bsky.app/profile/solomonneas.dev/post/3miebkdwc2u2v", "content": "", "creation_timestamp": "2026-03-31T13:23:48.987088Z"}</description>
      <content:encoded>{"uuid": "9e0eaebb-0cbc-40ad-8ede-182101eb2077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "seen", "source": "https://bsky.app/profile/solomonneas.dev/post/3miebkdwc2u2v", "content": "", "creation_timestamp": "2026-03-31T13:23:48.987088Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9e0eaebb-0cbc-40ad-8ede-182101eb2077/export</guid>
      <pubDate>Tue, 31 Mar 2026 13:23:48 +0000</pubDate>
    </item>
    <item>
      <title>803af1f4-b13f-49aa-886f-3cfae7cd90ed</title>
      <link>https://vulnerability.circl.lu/sighting/803af1f4-b13f-49aa-886f-3cfae7cd90ed/export</link>
      <description>{"uuid": "803af1f4-b13f-49aa-886f-3cfae7cd90ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "published-proof-of-concept", "source": "Telegram/Us8JkcdKV6mNpmC49CCSXRO4qTVWF6cCKabwDZ5lsVeRzZU", "content": "", "creation_timestamp": "2026-03-31T15:00:07.000000Z"}</description>
      <content:encoded>{"uuid": "803af1f4-b13f-49aa-886f-3cfae7cd90ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-33634", "type": "published-proof-of-concept", "source": "Telegram/Us8JkcdKV6mNpmC49CCSXRO4qTVWF6cCKabwDZ5lsVeRzZU", "content": "", "creation_timestamp": "2026-03-31T15:00:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/803af1f4-b13f-49aa-886f-3cfae7cd90ed/export</guid>
      <pubDate>Tue, 31 Mar 2026 15:00:07 +0000</pubDate>
    </item>
    <item>
      <title>0ef09a55-282d-419e-a98e-b2cac8177e94</title>
      <link>https://vulnerability.circl.lu/sighting/0ef09a55-282d-419e-a98e-b2cac8177e94/export</link>
      <description>{"uuid": "0ef09a55-282d-419e-a98e-b2cac8177e94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-33634", "type": "seen", "source": "https://bsky.app/profile/ramimacisabird.blueat.net/post/3mkkowhbp6v2z", "content": "", "creation_timestamp": "2026-04-28T13:29:36.235282Z"}</description>
      <content:encoded>{"uuid": "0ef09a55-282d-419e-a98e-b2cac8177e94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-33634", "type": "seen", "source": "https://bsky.app/profile/ramimacisabird.blueat.net/post/3mkkowhbp6v2z", "content": "", "creation_timestamp": "2026-04-28T13:29:36.235282Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0ef09a55-282d-419e-a98e-b2cac8177e94/export</guid>
      <pubDate>Tue, 28 Apr 2026 13:29:36 +0000</pubDate>
    </item>
  </channel>
</rss>
