<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-03T23:17:05.504012+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/c44da934-986c-4f09-b9da-e3863fc5db4b/export</id>
    <title>c44da934-986c-4f09-b9da-e3863fc5db4b</title>
    <updated>2026-04-03T23:17:05.560191+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "c44da934-986c-4f09-b9da-e3863fc5db4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-3203", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mfrggtdviy2k", "creation_timestamp": "2026-02-26T14:40:21.255749Z"}</content>
    <link href="https://db.gcve.eu/sighting/c44da934-986c-4f09-b9da-e3863fc5db4b/export"/>
    <published>2026-02-26T14:40:21.255749+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1f962a3c-83b0-4f25-bbf9-434107a826bd/export</id>
    <title>1f962a3c-83b0-4f25-bbf9-434107a826bd</title>
    <updated>2026-04-03T23:17:05.560134+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "1f962a3c-83b0-4f25-bbf9-434107a826bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32038", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhgzu4wctb2s", "creation_timestamp": "2026-03-19T22:18:55.637989Z"}</content>
    <link href="https://db.gcve.eu/sighting/1f962a3c-83b0-4f25-bbf9-434107a826bd/export"/>
    <published>2026-03-19T22:18:55.637989+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/93fcb797-ed81-4ea0-b43a-94728e3bd7a0/export</id>
    <title>93fcb797-ed81-4ea0-b43a-94728e3bd7a0</title>
    <updated>2026-04-03T23:17:05.560075+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "93fcb797-ed81-4ea0-b43a-94728e3bd7a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32038", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhgzuwhqt72c", "creation_timestamp": "2026-03-19T22:19:22.134057Z"}</content>
    <link href="https://db.gcve.eu/sighting/93fcb797-ed81-4ea0-b43a-94728e3bd7a0/export"/>
    <published>2026-03-19T22:19:22.134057+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2a492764-b9ef-4110-a762-3e6bdff6cc19/export</id>
    <title>2a492764-b9ef-4110-a762-3e6bdff6cc19</title>
    <updated>2026-04-03T23:17:05.560003+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "2a492764-b9ef-4110-a762-3e6bdff6cc19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32032", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhs6gob26z2b", "creation_timestamp": "2026-03-24T08:40:09.140340Z"}</content>
    <link href="https://db.gcve.eu/sighting/2a492764-b9ef-4110-a762-3e6bdff6cc19/export"/>
    <published>2026-03-24T08:40:09.140340+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0f8d9298-e6e7-4985-be41-10ed993b93e8/export</id>
    <title>0f8d9298-e6e7-4985-be41-10ed993b93e8</title>
    <updated>2026-04-03T23:17:05.559171+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "0f8d9298-e6e7-4985-be41-10ed993b93e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32038", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mi7q2ssv6o2f", "creation_timestamp": "2026-03-29T18:00:14.933127Z"}</content>
    <link href="https://db.gcve.eu/sighting/0f8d9298-e6e7-4985-be41-10ed993b93e8/export"/>
    <published>2026-03-29T18:00:14.933127+00:00</published>
  </entry>
</feed>
