<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 17:23:15 +0000</lastBuildDate>
    <item>
      <title>957d540f-dbcb-4347-9a14-7eb43d517a2e</title>
      <link>https://vulnerability.circl.lu/sighting/957d540f-dbcb-4347-9a14-7eb43d517a2e/export</link>
      <description>{"uuid": "957d540f-dbcb-4347-9a14-7eb43d517a2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-40982", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116531411462780607", "content": "\u26a0\ufe0f CRITICAL: CVE-2026-40982 in Spring Cloud Config (3.1.0 \u2013 5.0.0) enables path traversal \u2014 attackers can access arbitrary files via crafted URLs. Upgrade to a safe version ASAP: 3.1.14, 4.1.10, 4.2.7, 4.3.3, or 5.0.3. Details: https://radar.offseq.com/threat/cve-2026-40982-cwe-22-improper-limitation-of-a-pat-df996457 #OffSeq #SpringCloud #CVE202640982", "creation_timestamp": "2026-05-07T04:30:27.681922Z"}</description>
      <content:encoded>{"uuid": "957d540f-dbcb-4347-9a14-7eb43d517a2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-40982", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116531411462780607", "content": "\u26a0\ufe0f CRITICAL: CVE-2026-40982 in Spring Cloud Config (3.1.0 \u2013 5.0.0) enables path traversal \u2014 attackers can access arbitrary files via crafted URLs. Upgrade to a safe version ASAP: 3.1.14, 4.1.10, 4.2.7, 4.3.3, or 5.0.3. Details: https://radar.offseq.com/threat/cve-2026-40982-cwe-22-improper-limitation-of-a-pat-df996457 #OffSeq #SpringCloud #CVE202640982", "creation_timestamp": "2026-05-07T04:30:27.681922Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/957d540f-dbcb-4347-9a14-7eb43d517a2e/export</guid>
      <pubDate>Thu, 07 May 2026 04:30:27 +0000</pubDate>
    </item>
    <item>
      <title>a33aac8e-e2dc-46cb-827d-c85f823555ea</title>
      <link>https://vulnerability.circl.lu/sighting/a33aac8e-e2dc-46cb-827d-c85f823555ea/export</link>
      <description>{"uuid": "a33aac8e-e2dc-46cb-827d-c85f823555ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-40982", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mlaeyqh2um2y", "content": "Spring Cloud Config (3.1.0 \u2013 5.0.0) hit by CRITICAL path traversal flaw \u2014 attackers may access files via crafted URLs. Upgrade to 3.1.14, 4.1.10, 4.2.7, 4.3.3, or 5.0.3 now! https://radar.offseq.com/threat/cve-2026-40982-cwe-22-improper-limitation-of-a-pat-df996457 #OffSeq #SpringCloud #CVE202640982", "creation_timestamp": "2026-05-07T04:30:29.452864Z"}</description>
      <content:encoded>{"uuid": "a33aac8e-e2dc-46cb-827d-c85f823555ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-40982", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mlaeyqh2um2y", "content": "Spring Cloud Config (3.1.0 \u2013 5.0.0) hit by CRITICAL path traversal flaw \u2014 attackers may access files via crafted URLs. Upgrade to 3.1.14, 4.1.10, 4.2.7, 4.3.3, or 5.0.3 now! https://radar.offseq.com/threat/cve-2026-40982-cwe-22-improper-limitation-of-a-pat-df996457 #OffSeq #SpringCloud #CVE202640982", "creation_timestamp": "2026-05-07T04:30:29.452864Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a33aac8e-e2dc-46cb-827d-c85f823555ea/export</guid>
      <pubDate>Thu, 07 May 2026 04:30:29 +0000</pubDate>
    </item>
    <item>
      <title>e1b1f2a3-eed9-4929-957f-a657f69d3c15</title>
      <link>https://vulnerability.circl.lu/sighting/e1b1f2a3-eed9-4929-957f-a657f69d3c15/export</link>
      <description>{"uuid": "e1b1f2a3-eed9-4929-957f-a657f69d3c15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40982", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlai3lq23y2p", "content": "CVE-2026-40982 - Spring Cloud Config Directory Traversal Vulnerability\nCVE ID : CVE-2026-40982\n \n Published : May 7, 2026, 3:49 a.m. | 35\u00a0minutes ago\n \n Description : Spring Cloud Config allows applications to serve arbitrary text and binary files through the spring-cloud-conf...", "creation_timestamp": "2026-05-07T05:25:46.120237Z"}</description>
      <content:encoded>{"uuid": "e1b1f2a3-eed9-4929-957f-a657f69d3c15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40982", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlai3lq23y2p", "content": "CVE-2026-40982 - Spring Cloud Config Directory Traversal Vulnerability\nCVE ID : CVE-2026-40982\n \n Published : May 7, 2026, 3:49 a.m. | 35\u00a0minutes ago\n \n Description : Spring Cloud Config allows applications to serve arbitrary text and binary files through the spring-cloud-conf...", "creation_timestamp": "2026-05-07T05:25:46.120237Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e1b1f2a3-eed9-4929-957f-a657f69d3c15/export</guid>
      <pubDate>Thu, 07 May 2026 05:25:46 +0000</pubDate>
    </item>
    <item>
      <title>ee676326-2996-41b8-a279-166e4ff579b1</title>
      <link>https://vulnerability.circl.lu/sighting/ee676326-2996-41b8-a279-166e4ff579b1/export</link>
      <description>{"uuid": "ee676326-2996-41b8-a279-166e4ff579b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-40982", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/spring-security-advisory-av26-431", "content": "", "creation_timestamp": "2026-05-07T06:48:23.000000Z"}</description>
      <content:encoded>{"uuid": "ee676326-2996-41b8-a279-166e4ff579b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-40982", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/spring-security-advisory-av26-431", "content": "", "creation_timestamp": "2026-05-07T06:48:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ee676326-2996-41b8-a279-166e4ff579b1/export</guid>
      <pubDate>Thu, 07 May 2026 06:48:23 +0000</pubDate>
    </item>
    <item>
      <title>c1398d9b-3d96-40b2-ba85-0e5333228e86</title>
      <link>https://vulnerability.circl.lu/sighting/c1398d9b-3d96-40b2-ba85-0e5333228e86/export</link>
      <description>{"uuid": "c1398d9b-3d96-40b2-ba85-0e5333228e86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-40982", "type": "seen", "source": "https://www.acn.gov.it/portale/w/rilevate-vulnerabilita-in-spring-cloud-config", "content": "", "creation_timestamp": "2026-05-07T07:29:50.000000Z"}</description>
      <content:encoded>{"uuid": "c1398d9b-3d96-40b2-ba85-0e5333228e86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-40982", "type": "seen", "source": "https://www.acn.gov.it/portale/w/rilevate-vulnerabilita-in-spring-cloud-config", "content": "", "creation_timestamp": "2026-05-07T07:29:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c1398d9b-3d96-40b2-ba85-0e5333228e86/export</guid>
      <pubDate>Thu, 07 May 2026 07:29:50 +0000</pubDate>
    </item>
    <item>
      <title>bc9e001b-f6fc-4269-9611-e0cf8ec4fb8f</title>
      <link>https://vulnerability.circl.lu/sighting/bc9e001b-f6fc-4269-9611-e0cf8ec4fb8f/export</link>
      <description>{"uuid": "bc9e001b-f6fc-4269-9611-e0cf8ec4fb8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40982", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mlbh3arwaw2e", "content": "\ud83d\udd17 CVE : CVE-2026-40981, CVE-2026-40982, CVE-2026-41002, CVE-2026-41004", "creation_timestamp": "2026-05-07T14:40:20.407806Z"}</description>
      <content:encoded>{"uuid": "bc9e001b-f6fc-4269-9611-e0cf8ec4fb8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-40982", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mlbh3arwaw2e", "content": "\ud83d\udd17 CVE : CVE-2026-40981, CVE-2026-40982, CVE-2026-41002, CVE-2026-41004", "creation_timestamp": "2026-05-07T14:40:20.407806Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bc9e001b-f6fc-4269-9611-e0cf8ec4fb8f/export</guid>
      <pubDate>Thu, 07 May 2026 14:40:20 +0000</pubDate>
    </item>
  </channel>
</rss>
