<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-24T10:34:37.886921+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/bb00f627-ac63-41e4-b64c-e770c08226ab/export</id>
    <title>bb00f627-ac63-41e4-b64c-e770c08226ab</title>
    <updated>2026-04-24T10:34:37.938961+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "bb00f627-ac63-41e4-b64c-e770c08226ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-31898", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhdj4o4jp72s", "creation_timestamp": "2026-03-18T12:41:28.950615Z"}</content>
    <link href="https://db.gcve.eu/sighting/bb00f627-ac63-41e4-b64c-e770c08226ab/export"/>
    <published>2026-03-18T12:41:28.950615+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2111b164-bc5a-442e-9120-5fd01e5707ee/export</id>
    <title>2111b164-bc5a-442e-9120-5fd01e5707ee</title>
    <updated>2026-04-24T10:34:37.938757+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "2111b164-bc5a-442e-9120-5fd01e5707ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-31898", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhdj5oxa7f2u", "creation_timestamp": "2026-03-18T12:42:03.129689Z"}</content>
    <link href="https://db.gcve.eu/sighting/2111b164-bc5a-442e-9120-5fd01e5707ee/export"/>
    <published>2026-03-18T12:42:03.129689+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4c4ed5fd-1569-42fe-b842-4d87a8a363a3/export</id>
    <title>4c4ed5fd-1569-42fe-b842-4d87a8a363a3</title>
    <updated>2026-04-24T10:34:37.938544+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "4c4ed5fd-1569-42fe-b842-4d87a8a363a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-31898", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mhdj5pycu52i", "creation_timestamp": "2026-03-18T12:42:07.177602Z"}</content>
    <link href="https://db.gcve.eu/sighting/4c4ed5fd-1569-42fe-b842-4d87a8a363a3/export"/>
    <published>2026-03-18T12:42:07.177602+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f26aa82c-c527-4bc6-a7af-60bc41309333/export</id>
    <title>f26aa82c-c527-4bc6-a7af-60bc41309333</title>
    <updated>2026-04-24T10:34:37.938258+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "f26aa82c-c527-4bc6-a7af-60bc41309333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-31898", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhjadfywye2m", "creation_timestamp": "2026-03-20T19:20:09.741222Z"}</content>
    <link href="https://db.gcve.eu/sighting/f26aa82c-c527-4bc6-a7af-60bc41309333/export"/>
    <published>2026-03-20T19:20:09.741222+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/01455c3d-5925-43ee-acf3-9bfa3be4e36a/export</id>
    <title>01455c3d-5925-43ee-acf3-9bfa3be4e36a</title>
    <updated>2026-04-24T10:34:37.936168+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "01455c3d-5925-43ee-acf3-9bfa3be4e36a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-31898", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mhq6xrrn2s22", "creation_timestamp": "2026-03-23T13:44:25.472207Z"}</content>
    <link href="https://db.gcve.eu/sighting/01455c3d-5925-43ee-acf3-9bfa3be4e36a/export"/>
    <published>2026-03-23T13:44:25.472207+00:00</published>
  </entry>
</feed>
