<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-19T11:14:10.143714+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/41f37002-9d94-4fc5-b4cb-9fb2758e02ed/export</id>
    <title>41f37002-9d94-4fc5-b4cb-9fb2758e02ed</title>
    <updated>2026-05-19T11:14:10.155058+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "41f37002-9d94-4fc5-b4cb-9fb2758e02ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116544182422691954", "content": "", "creation_timestamp": "2026-05-09T10:38:17.069005Z"}</content>
    <link href="https://db.gcve.eu/sighting/41f37002-9d94-4fc5-b4cb-9fb2758e02ed/export"/>
    <published>2026-05-09T10:38:17.069005+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bc224517-8a2e-4e01-a48c-e03adfaf197e/export</id>
    <title>bc224517-8a2e-4e01-a48c-e03adfaf197e</title>
    <updated>2026-05-19T11:14:10.154980+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "bc224517-8a2e-4e01-a48c-e03adfaf197e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://bsky.app/profile/technoholic.bsky.social/post/3mlgzzadeim2l", "content": "", "creation_timestamp": "2026-05-09T20:02:32.789309Z"}</content>
    <link href="https://db.gcve.eu/sighting/bc224517-8a2e-4e01-a48c-e03adfaf197e/export"/>
    <published>2026-05-09T20:02:32.789309+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cd4167b3-c43e-460d-85c4-77c88512f9ca/export</id>
    <title>cd4167b3-c43e-460d-85c4-77c88512f9ca</title>
    <updated>2026-05-19T11:14:10.154897+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "cd4167b3-c43e-460d-85c4-77c88512f9ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://bsky.app/profile/hn-frontpage-bot.bsky.social/post/3mlhlj7bx752u", "content": "", "creation_timestamp": "2026-05-10T01:15:42.352667Z"}</content>
    <link href="https://db.gcve.eu/sighting/cd4167b3-c43e-460d-85c4-77c88512f9ca/export"/>
    <published>2026-05-10T01:15:42.352667+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0bde6635-d7a8-4751-84a1-b75ee06f3412/export</id>
    <title>0bde6635-d7a8-4751-84a1-b75ee06f3412</title>
    <updated>2026-05-19T11:14:10.154817+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "0bde6635-d7a8-4751-84a1-b75ee06f3412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mli2inlydw2y", "content": "", "creation_timestamp": "2026-05-10T05:43:50.404246Z"}</content>
    <link href="https://db.gcve.eu/sighting/0bde6635-d7a8-4751-84a1-b75ee06f3412/export"/>
    <published>2026-05-10T05:43:50.404246+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3ef53f68-cef1-4879-9a01-6bd7ec2a975c/export</id>
    <title>3ef53f68-cef1-4879-9a01-6bd7ec2a975c</title>
    <updated>2026-05-19T11:14:10.154733+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "3ef53f68-cef1-4879-9a01-6bd7ec2a975c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mlizxrgkd32y", "content": "", "creation_timestamp": "2026-05-10T15:07:03.814198Z"}</content>
    <link href="https://db.gcve.eu/sighting/3ef53f68-cef1-4879-9a01-6bd7ec2a975c/export"/>
    <published>2026-05-10T15:07:03.814198+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/219db91c-02d5-499b-90ba-b67b6c9dec0d/export</id>
    <title>219db91c-02d5-499b-90ba-b67b6c9dec0d</title>
    <updated>2026-05-19T11:14:10.154650+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "219db91c-02d5-499b-90ba-b67b6c9dec0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mlizyboth425", "content": "", "creation_timestamp": "2026-05-10T15:07:19.748015Z"}</content>
    <link href="https://db.gcve.eu/sighting/219db91c-02d5-499b-90ba-b67b6c9dec0d/export"/>
    <published>2026-05-10T15:07:19.748015+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/31acdaa4-d9dc-42cd-aa3b-2d9de01d1736/export</id>
    <title>31acdaa4-d9dc-42cd-aa3b-2d9de01d1736</title>
    <updated>2026-05-19T11:14:10.154531+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "31acdaa4-d9dc-42cd-aa3b-2d9de01d1736", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mlj6rgbnzch2", "content": "", "creation_timestamp": "2026-05-10T16:33:03.184530Z"}</content>
    <link href="https://db.gcve.eu/sighting/31acdaa4-d9dc-42cd-aa3b-2d9de01d1736/export"/>
    <published>2026-05-10T16:33:03.184530+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d978685c-e91f-4161-99c1-5024075fada9/export</id>
    <title>d978685c-e91f-4161-99c1-5024075fada9</title>
    <updated>2026-05-19T11:14:10.154298+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "d978685c-e91f-4161-99c1-5024075fada9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mlka652tl522", "content": "", "creation_timestamp": "2026-05-11T02:30:39.800228Z"}</content>
    <link href="https://db.gcve.eu/sighting/d978685c-e91f-4161-99c1-5024075fada9/export"/>
    <published>2026-05-11T02:30:39.800228+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ebdba29d-7e64-44bf-9269-2cee9d088bb1/export</id>
    <title>ebdba29d-7e64-44bf-9269-2cee9d088bb1</title>
    <updated>2026-05-19T11:14:10.153987+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "ebdba29d-7e64-44bf-9269-2cee9d088bb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mlljuslwde2l", "content": "", "creation_timestamp": "2026-05-11T14:57:10.626925Z"}</content>
    <link href="https://db.gcve.eu/sighting/ebdba29d-7e64-44bf-9269-2cee9d088bb1/export"/>
    <published>2026-05-11T14:57:10.626925+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/897b10f5-7e28-47a9-9fbd-e96400ad3ecc/export</id>
    <title>897b10f5-7e28-47a9-9fbd-e96400ad3ecc</title>
    <updated>2026-05-19T11:14:10.151425+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "897b10f5-7e28-47a9-9fbd-e96400ad3ecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29201", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-multiple-vulnerabilities-cpanel-and-whm-leading-privilege-escalation-patch", "content": "", "creation_timestamp": "2026-05-12T01:21:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/897b10f5-7e28-47a9-9fbd-e96400ad3ecc/export"/>
    <published>2026-05-12T01:21:19+00:00</published>
  </entry>
</feed>
