<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 11:38:26 +0000</lastBuildDate>
    <item>
      <title>0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3</title>
      <link>https://vulnerability.circl.lu/sighting/0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3/export</link>
      <description>{"uuid": "0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyiu6f3ct2w", "content": "\ud83d\udd34 CVE-2026-42369 - Critical (10)\n\nGV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance cameras a...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42369/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T01:18:13.364023Z"}</description>
      <content:encoded>{"uuid": "0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyiu6f3ct2w", "content": "\ud83d\udd34 CVE-2026-42369 - Critical (10)\n\nGV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance cameras a...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42369/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T01:18:13.364023Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3/export</guid>
      <pubDate>Mon, 04 May 2026 01:18:13 +0000</pubDate>
    </item>
    <item>
      <title>c610b189-6127-420c-bda1-d7d11c5ca926</title>
      <link>https://vulnerability.circl.lu/sighting/c610b189-6127-420c-bda1-d7d11c5ca926/export</link>
      <description>{"uuid": "c610b189-6127-420c-bda1-d7d11c5ca926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkynz6jpjl2h", "content": "CVE-2026-42369 - GeoVision GV-VMS V20 WebCam Server stack overflow vulnerability\nCVE ID : CVE-2026-42369\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : GV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance camer...", "creation_timestamp": "2026-05-04T02:50:29.698799Z"}</description>
      <content:encoded>{"uuid": "c610b189-6127-420c-bda1-d7d11c5ca926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkynz6jpjl2h", "content": "CVE-2026-42369 - GeoVision GV-VMS V20 WebCam Server stack overflow vulnerability\nCVE ID : CVE-2026-42369\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : GV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance camer...", "creation_timestamp": "2026-05-04T02:50:29.698799Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c610b189-6127-420c-bda1-d7d11c5ca926/export</guid>
      <pubDate>Mon, 04 May 2026 02:50:29 +0000</pubDate>
    </item>
    <item>
      <title>23021fbb-6d7c-4f6e-a906-18b70b69e3ec</title>
      <link>https://vulnerability.circl.lu/sighting/23021fbb-6d7c-4f6e-a906-18b70b69e3ec/export</link>
      <description>{"uuid": "23021fbb-6d7c-4f6e-a906-18b70b69e3ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116514513998786708", "content": "There is a new vulnerability with elevated criticality in GeoVision GV-VMS (CVE-2026-42369) https://vuldb.com/vuln/360931", "creation_timestamp": "2026-05-04T04:53:12.899123Z"}</description>
      <content:encoded>{"uuid": "23021fbb-6d7c-4f6e-a906-18b70b69e3ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116514513998786708", "content": "There is a new vulnerability with elevated criticality in GeoVision GV-VMS (CVE-2026-42369) https://vuldb.com/vuln/360931", "creation_timestamp": "2026-05-04T04:53:12.899123Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/23021fbb-6d7c-4f6e-a906-18b70b69e3ec/export</guid>
      <pubDate>Mon, 04 May 2026 04:53:12 +0000</pubDate>
    </item>
    <item>
      <title>9a201c86-caeb-48ec-9483-929271111868</title>
      <link>https://vulnerability.circl.lu/sighting/9a201c86-caeb-48ec-9483-929271111868/export</link>
      <description>{"uuid": "9a201c86-caeb-48ec-9483-929271111868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42369", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkyymwd4po22", "content": "CRITICAL: GeoVision GV-VMS V20.0.2 stack overflow (CVSS 10) lets remote attackers gain SYSTEM access. Restrict remote access &amp;amp; monitor for patches. https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787 #OffSeq #CVE202642369 #cyberalert", "creation_timestamp": "2026-05-04T06:00:31.157787Z"}</description>
      <content:encoded>{"uuid": "9a201c86-caeb-48ec-9483-929271111868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42369", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkyymwd4po22", "content": "CRITICAL: GeoVision GV-VMS V20.0.2 stack overflow (CVSS 10) lets remote attackers gain SYSTEM access. Restrict remote access &amp;amp; monitor for patches. https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787 #OffSeq #CVE202642369 #cyberalert", "creation_timestamp": "2026-05-04T06:00:31.157787Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9a201c86-caeb-48ec-9483-929271111868/export</guid>
      <pubDate>Mon, 04 May 2026 06:00:31 +0000</pubDate>
    </item>
    <item>
      <title>a5d8fca9-a16c-4d84-93c5-fa7d437cb448</title>
      <link>https://vulnerability.circl.lu/sighting/a5d8fca9-a16c-4d84-93c5-fa7d437cb448/export</link>
      <description>{"uuid": "a5d8fca9-a16c-4d84-93c5-fa7d437cb448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42369", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116514778449951013", "content": "\ud83d\udea8 CVE-2026-42369 (CRITICAL, CVSS 10): GeoVision GV-VMS V20.0.2 stack overflow in gvapi endpoint lets unauthenticated remote attackers execute code as SYSTEM. Restrict remote access, monitor for patches. https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787 #OffSeq #CVE202642369 #infosec #zeroday", "creation_timestamp": "2026-05-04T06:00:31.183284Z"}</description>
      <content:encoded>{"uuid": "a5d8fca9-a16c-4d84-93c5-fa7d437cb448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42369", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116514778449951013", "content": "\ud83d\udea8 CVE-2026-42369 (CRITICAL, CVSS 10): GeoVision GV-VMS V20.0.2 stack overflow in gvapi endpoint lets unauthenticated remote attackers execute code as SYSTEM. Restrict remote access, monitor for patches. https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787 #OffSeq #CVE202642369 #infosec #zeroday", "creation_timestamp": "2026-05-04T06:00:31.183284Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a5d8fca9-a16c-4d84-93c5-fa7d437cb448/export</guid>
      <pubDate>Mon, 04 May 2026 06:00:31 +0000</pubDate>
    </item>
    <item>
      <title>c849bd34-f1b0-424c-bc55-f06ebcf4d98c</title>
      <link>https://vulnerability.circl.lu/sighting/c849bd34-f1b0-424c-bc55-f06ebcf4d98c/export</link>
      <description>{"uuid": "c849bd34-f1b0-424c-bc55-f06ebcf4d98c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbmxfeo22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "creation_timestamp": "2026-05-04T08:41:41.153344Z"}</description>
      <content:encoded>{"uuid": "c849bd34-f1b0-424c-bc55-f06ebcf4d98c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbmxfeo22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "creation_timestamp": "2026-05-04T08:41:41.153344Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c849bd34-f1b0-424c-bc55-f06ebcf4d98c/export</guid>
      <pubDate>Mon, 04 May 2026 08:41:41 +0000</pubDate>
    </item>
    <item>
      <title>2d8afbe9-2ebc-4e45-b63c-bbe5b123330f</title>
      <link>https://vulnerability.circl.lu/sighting/2d8afbe9-2ebc-4e45-b63c-bbe5b123330f/export</link>
      <description>{"uuid": "2d8afbe9-2ebc-4e45-b63c-bbe5b123330f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbmysrs22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "creation_timestamp": "2026-05-04T08:41:43.094535Z"}</description>
      <content:encoded>{"uuid": "2d8afbe9-2ebc-4e45-b63c-bbe5b123330f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbmysrs22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "creation_timestamp": "2026-05-04T08:41:43.094535Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2d8afbe9-2ebc-4e45-b63c-bbe5b123330f/export</guid>
      <pubDate>Mon, 04 May 2026 08:41:43 +0000</pubDate>
    </item>
    <item>
      <title>4a9b500e-07c8-4954-8f32-cc638d52b7a3</title>
      <link>https://vulnerability.circl.lu/sighting/4a9b500e-07c8-4954-8f32-cc638d52b7a3/export</link>
      <description>{"uuid": "4a9b500e-07c8-4954-8f32-cc638d52b7a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbn3lrh22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "creation_timestamp": "2026-05-04T08:41:43.757601Z"}</description>
      <content:encoded>{"uuid": "4a9b500e-07c8-4954-8f32-cc638d52b7a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42369", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbn3lrh22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "creation_timestamp": "2026-05-04T08:41:43.757601Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4a9b500e-07c8-4954-8f32-cc638d52b7a3/export</guid>
      <pubDate>Mon, 04 May 2026 08:41:43 +0000</pubDate>
    </item>
  </channel>
</rss>
