<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 02:21:48 +0000</lastBuildDate>
    <item>
      <title>fa5307ef-e093-4053-8556-0e4d95d10ca6</title>
      <link>https://vulnerability.circl.lu/sighting/fa5307ef-e093-4053-8556-0e4d95d10ca6/export</link>
      <description>{"uuid": "fa5307ef-e093-4053-8556-0e4d95d10ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyivhrpyd2w", "content": "\ud83d\udd34 CVE-2026-42370 - Critical (9)\n\nA stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VM...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42370/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T01:18:56.857528Z"}</description>
      <content:encoded>{"uuid": "fa5307ef-e093-4053-8556-0e4d95d10ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyivhrpyd2w", "content": "\ud83d\udd34 CVE-2026-42370 - Critical (9)\n\nA stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VM...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42370/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T01:18:56.857528Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fa5307ef-e093-4053-8556-0e4d95d10ca6/export</guid>
      <pubDate>Mon, 04 May 2026 01:18:56 +0000</pubDate>
    </item>
    <item>
      <title>0e8aeac6-7721-4530-892f-bf59cf381e52</title>
      <link>https://vulnerability.circl.lu/sighting/0e8aeac6-7721-4530-892f-bf59cf381e52/export</link>
      <description>{"uuid": "0e8aeac6-7721-4530-892f-bf59cf381e52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mkyix5seejv2", "content": "\ud83d\udd34 CVE-2026-42370 - Critical (9) A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VM... https://www.thehackerwire.com/vulnerability/CVE-2026-42370/ #...\n\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-04T01:19:58.303564Z"}</description>
      <content:encoded>{"uuid": "0e8aeac6-7721-4530-892f-bf59cf381e52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mkyix5seejv2", "content": "\ud83d\udd34 CVE-2026-42370 - Critical (9) A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VM... https://www.thehackerwire.com/vulnerability/CVE-2026-42370/ #...\n\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-04T01:19:58.303564Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0e8aeac6-7721-4530-892f-bf59cf381e52/export</guid>
      <pubDate>Mon, 04 May 2026 01:19:58 +0000</pubDate>
    </item>
    <item>
      <title>5f4dc8f3-93d1-4477-9a98-9c9ea59a14b7</title>
      <link>https://vulnerability.circl.lu/sighting/5f4dc8f3-93d1-4477-9a98-9c9ea59a14b7/export</link>
      <description>{"uuid": "5f4dc8f3-93d1-4477-9a98-9c9ea59a14b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42370", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116513716702890146", "content": "\ud83d\udea8 CRITICAL: CVE-2026-42370 affects GeoVision GV-VMS V20.0.2. Stack overflow in WebCam Server Login allows unauthenticated remote code execution via crafted HTTP requests. Patch urgently! https://radar.offseq.com/threat/cve-2026-42370-cwe-787-out-of-bounds-write-in-geov-cb9b994f #OffSeq #GeoVision #Vulnerability", "creation_timestamp": "2026-05-04T01:30:27.192169Z"}</description>
      <content:encoded>{"uuid": "5f4dc8f3-93d1-4477-9a98-9c9ea59a14b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42370", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116513716702890146", "content": "\ud83d\udea8 CRITICAL: CVE-2026-42370 affects GeoVision GV-VMS V20.0.2. Stack overflow in WebCam Server Login allows unauthenticated remote code execution via crafted HTTP requests. Patch urgently! https://radar.offseq.com/threat/cve-2026-42370-cwe-787-out-of-bounds-write-in-geov-cb9b994f #OffSeq #GeoVision #Vulnerability", "creation_timestamp": "2026-05-04T01:30:27.192169Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5f4dc8f3-93d1-4477-9a98-9c9ea59a14b7/export</guid>
      <pubDate>Mon, 04 May 2026 01:30:27 +0000</pubDate>
    </item>
    <item>
      <title>5f34627c-5217-4b98-a07a-d345b52afd3c</title>
      <link>https://vulnerability.circl.lu/sighting/5f34627c-5217-4b98-a07a-d345b52afd3c/export</link>
      <description>{"uuid": "5f34627c-5217-4b98-a07a-d345b52afd3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42370", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkyjk3rmks2g", "content": "GeoVision GV-VMS V20.0.2 hit by CRITICAL stack overflow (CVE-2026-42370). Remote code execution possible via unauthenticated HTTP requests. Patch when available! https://radar.offseq.com/threat/cve-2026-42370-cwe-787-out-of-bounds-write-in-geov-cb9b994f #OffSeq #Vulnerability", "creation_timestamp": "2026-05-04T01:30:29.018911Z"}</description>
      <content:encoded>{"uuid": "5f34627c-5217-4b98-a07a-d345b52afd3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42370", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkyjk3rmks2g", "content": "GeoVision GV-VMS V20.0.2 hit by CRITICAL stack overflow (CVE-2026-42370). Remote code execution possible via unauthenticated HTTP requests. Patch when available! https://radar.offseq.com/threat/cve-2026-42370-cwe-787-out-of-bounds-write-in-geov-cb9b994f #OffSeq #Vulnerability", "creation_timestamp": "2026-05-04T01:30:29.018911Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5f34627c-5217-4b98-a07a-d345b52afd3c/export</guid>
      <pubDate>Mon, 04 May 2026 01:30:29 +0000</pubDate>
    </item>
    <item>
      <title>2dca5925-5b7a-44dc-acf6-5237c7078902</title>
      <link>https://vulnerability.circl.lu/sighting/2dca5925-5b7a-44dc-acf6-5237c7078902/export</link>
      <description>{"uuid": "2dca5925-5b7a-44dc-acf6-5237c7078902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyotzvtss2v", "content": "CVE-2026-42370 - GeoVision GV-VMS V20 WebCam Server Login stack overflow vulnerability\nCVE ID : CVE-2026-42370\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVi...", "creation_timestamp": "2026-05-04T03:05:32.614630Z"}</description>
      <content:encoded>{"uuid": "2dca5925-5b7a-44dc-acf6-5237c7078902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyotzvtss2v", "content": "CVE-2026-42370 - GeoVision GV-VMS V20 WebCam Server Login stack overflow vulnerability\nCVE ID : CVE-2026-42370\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVi...", "creation_timestamp": "2026-05-04T03:05:32.614630Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2dca5925-5b7a-44dc-acf6-5237c7078902/export</guid>
      <pubDate>Mon, 04 May 2026 03:05:32 +0000</pubDate>
    </item>
    <item>
      <title>f1e931f1-c744-45c7-9ab2-fbea3cd45cf5</title>
      <link>https://vulnerability.circl.lu/sighting/f1e931f1-c744-45c7-9ab2-fbea3cd45cf5/export</link>
      <description>{"uuid": "f1e931f1-c744-45c7-9ab2-fbea3cd45cf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116514460467704421", "content": "We have just added an important vulnerability affecting GeoVision GV-VMS V20.0.2 (CVE-2026-42370) https://vuldb.com/vuln/360930", "creation_timestamp": "2026-05-04T04:39:35.506030Z"}</description>
      <content:encoded>{"uuid": "f1e931f1-c744-45c7-9ab2-fbea3cd45cf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116514460467704421", "content": "We have just added an important vulnerability affecting GeoVision GV-VMS V20.0.2 (CVE-2026-42370) https://vuldb.com/vuln/360930", "creation_timestamp": "2026-05-04T04:39:35.506030Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f1e931f1-c744-45c7-9ab2-fbea3cd45cf5/export</guid>
      <pubDate>Mon, 04 May 2026 04:39:35 +0000</pubDate>
    </item>
    <item>
      <title>befe0098-76c0-4f5a-a8fc-f232d9372cfd</title>
      <link>https://vulnerability.circl.lu/sighting/befe0098-76c0-4f5a-a8fc-f232d9372cfd/export</link>
      <description>{"uuid": "befe0098-76c0-4f5a-a8fc-f232d9372cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml3g4fqxku2y", "content": "\ud83d\udccc CVE-2026-42370 - A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VMS V20 20.0.2. A specially crafted HTTP request can le... https://www.cyberhub.blog/cves/CVE-2026-42370", "creation_timestamp": "2026-05-05T05:07:07.270374Z"}</description>
      <content:encoded>{"uuid": "befe0098-76c0-4f5a-a8fc-f232d9372cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42370", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml3g4fqxku2y", "content": "\ud83d\udccc CVE-2026-42370 - A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VMS V20 20.0.2. A specially crafted HTTP request can le... https://www.cyberhub.blog/cves/CVE-2026-42370", "creation_timestamp": "2026-05-05T05:07:07.270374Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/befe0098-76c0-4f5a-a8fc-f232d9372cfd/export</guid>
      <pubDate>Tue, 05 May 2026 05:07:07 +0000</pubDate>
    </item>
  </channel>
</rss>
