<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-22T19:11:59.884018+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/6ee2aa80-f94f-4220-b81b-757f03e5e14e/export</id>
    <title>6ee2aa80-f94f-4220-b81b-757f03e5e14e</title>
    <updated>2026-04-22T19:11:59.951232+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "6ee2aa80-f94f-4220-b81b-757f03e5e14e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-23651", "type": "seen", "source": "https://isc.sans.edu/diary/rss/32782", "creation_timestamp": "2026-03-11T03:00:20.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6ee2aa80-f94f-4220-b81b-757f03e5e14e/export"/>
    <published>2026-03-11T03:00:20+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c0adecae-51a6-4c5b-b3cc-27d300c2510c/export</id>
    <title>c0adecae-51a6-4c5b-b3cc-27d300c2510c</title>
    <updated>2026-04-22T19:11:59.951156+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "c0adecae-51a6-4c5b-b3cc-27d300c2510c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-23656", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3mguhzym6yq2w", "creation_timestamp": "2026-03-12T13:12:09.166152Z"}</content>
    <link href="https://db.gcve.eu/sighting/c0adecae-51a6-4c5b-b3cc-27d300c2510c/export"/>
    <published>2026-03-12T13:12:09.166152+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f64d75c3-9c9a-4329-b231-da5bc60580c2/export</id>
    <title>f64d75c3-9c9a-4329-b231-da5bc60580c2</title>
    <updated>2026-04-22T19:11:59.951075+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "f64d75c3-9c9a-4329-b231-da5bc60580c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-23659", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhgxe5ernv25", "creation_timestamp": "2026-03-19T21:34:11.249644Z"}</content>
    <link href="https://db.gcve.eu/sighting/f64d75c3-9c9a-4329-b231-da5bc60580c2/export"/>
    <published>2026-03-19T21:34:11.249644+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/772c241f-1a40-4858-b9d4-5ff1a5857280/export</id>
    <title>772c241f-1a40-4858-b9d4-5ff1a5857280</title>
    <updated>2026-04-22T19:11:59.950996+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "772c241f-1a40-4858-b9d4-5ff1a5857280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-23658", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhgxee5tm42s", "creation_timestamp": "2026-03-19T21:34:18.463208Z"}</content>
    <link href="https://db.gcve.eu/sighting/772c241f-1a40-4858-b9d4-5ff1a5857280/export"/>
    <published>2026-03-19T21:34:18.463208+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0ed2b0d5-2dfd-42f7-aafb-303d2aeaab37/export</id>
    <title>0ed2b0d5-2dfd-42f7-aafb-303d2aeaab37</title>
    <updated>2026-04-22T19:11:59.950915+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "0ed2b0d5-2dfd-42f7-aafb-303d2aeaab37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-23659", "type": "seen", "source": "https://bsky.app/profile/index.espresso.cafecito.tech.ap.brid.gy/post/3mhih7bfnpyr2", "creation_timestamp": "2026-03-20T11:50:32.507244Z"}</content>
    <link href="https://db.gcve.eu/sighting/0ed2b0d5-2dfd-42f7-aafb-303d2aeaab37/export"/>
    <published>2026-03-20T11:50:32.507244+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b03fbdf4-da26-479d-85b0-58bc776d2b3b/export</id>
    <title>b03fbdf4-da26-479d-85b0-58bc776d2b3b</title>
    <updated>2026-04-22T19:11:59.950833+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "b03fbdf4-da26-479d-85b0-58bc776d2b3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-23659", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mih2qyjov62a", "creation_timestamp": "2026-04-01T16:00:16.455519Z"}</content>
    <link href="https://db.gcve.eu/sighting/b03fbdf4-da26-479d-85b0-58bc776d2b3b/export"/>
    <published>2026-04-01T16:00:16.455519+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/85198ae6-d1bf-4d42-bac8-6975d95a0db8/export</id>
    <title>85198ae6-d1bf-4d42-bac8-6975d95a0db8</title>
    <updated>2026-04-22T19:11:59.950751+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "85198ae6-d1bf-4d42-bac8-6975d95a0db8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-23653", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0114", "creation_timestamp": "2026-04-14T12:18:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/85198ae6-d1bf-4d42-bac8-6975d95a0db8/export"/>
    <published>2026-04-14T12:18:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2038566b-826f-4c9a-b8d9-bd7028b67d5d/export</id>
    <title>2038566b-826f-4c9a-b8d9-bd7028b67d5d</title>
    <updated>2026-04-22T19:11:59.950664+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "2038566b-826f-4c9a-b8d9-bd7028b67d5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-23657", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0116", "creation_timestamp": "2026-04-14T12:20:56.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/2038566b-826f-4c9a-b8d9-bd7028b67d5d/export"/>
    <published>2026-04-14T12:20:56+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8c631219-66fe-4b56-b55a-1c9408a8c9d9/export</id>
    <title>8c631219-66fe-4b56-b55a-1c9408a8c9d9</title>
    <updated>2026-04-22T19:11:59.950547+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "8c631219-66fe-4b56-b55a-1c9408a8c9d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-23653", "type": "seen", "source": "https://www.thezdi.com/blog/2026/4/14/the-april-2026-security-update-review", "creation_timestamp": "2026-04-14T15:49:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8c631219-66fe-4b56-b55a-1c9408a8c9d9/export"/>
    <published>2026-04-14T15:49:19+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e06b35a2-bb7d-41e4-b1cd-d9bc23552651/export</id>
    <title>e06b35a2-bb7d-41e4-b1cd-d9bc23552651</title>
    <updated>2026-04-22T19:11:59.949085+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "e06b35a2-bb7d-41e4-b1cd-d9bc23552651", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-23657", "type": "seen", "source": "https://www.thezdi.com/blog/2026/4/14/the-april-2026-security-update-review", "creation_timestamp": "2026-04-14T15:49:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e06b35a2-bb7d-41e4-b1cd-d9bc23552651/export"/>
    <published>2026-04-14T15:49:19+00:00</published>
  </entry>
</feed>
