<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-21T15:43:45.433698+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/f9069381-8517-45f3-a896-c1fad4257a5e/export</id>
    <title>f9069381-8517-45f3-a896-c1fad4257a5e</title>
    <updated>2026-04-21T15:43:45.501829+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "f9069381-8517-45f3-a896-c1fad4257a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32293", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f9069381-8517-45f3-a896-c1fad4257a5e/export"/>
    <published>2026-03-19T03:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/97b3ae9e-d4ee-4379-b270-9214896bbb72/export</id>
    <title>97b3ae9e-d4ee-4379-b270-9214896bbb72</title>
    <updated>2026-04-21T15:43:45.501756+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "97b3ae9e-d4ee-4379-b270-9214896bbb72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32291", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/97b3ae9e-d4ee-4379-b270-9214896bbb72/export"/>
    <published>2026-03-19T03:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7ff6514f-4521-4861-ba18-9756d99dd7cd/export</id>
    <title>7ff6514f-4521-4861-ba18-9756d99dd7cd</title>
    <updated>2026-04-21T15:43:45.501684+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "7ff6514f-4521-4861-ba18-9756d99dd7cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32292", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/7ff6514f-4521-4861-ba18-9756d99dd7cd/export"/>
    <published>2026-03-19T03:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ada87338-c8f8-4d30-8ca0-504613ec31ca/export</id>
    <title>ada87338-c8f8-4d30-8ca0-504613ec31ca</title>
    <updated>2026-04-21T15:43:45.501610+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "ada87338-c8f8-4d30-8ca0-504613ec31ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32298", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ada87338-c8f8-4d30-8ca0-504613ec31ca/export"/>
    <published>2026-03-19T03:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/63e3fe48-7b1a-4142-9387-ca1e264dade5/export</id>
    <title>63e3fe48-7b1a-4142-9387-ca1e264dade5</title>
    <updated>2026-04-21T15:43:45.501529+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "63e3fe48-7b1a-4142-9387-ca1e264dade5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32294", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/63e3fe48-7b1a-4142-9387-ca1e264dade5/export"/>
    <published>2026-03-19T03:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/332efcd4-5e86-4aa2-947f-00c29d9d9cb9/export</id>
    <title>332efcd4-5e86-4aa2-947f-00c29d9d9cb9</title>
    <updated>2026-04-21T15:43:45.501441+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "332efcd4-5e86-4aa2-947f-00c29d9d9cb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32295", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/332efcd4-5e86-4aa2-947f-00c29d9d9cb9/export"/>
    <published>2026-03-19T03:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/c5200b43-6cef-433c-80ed-afc791961383/export</id>
    <title>c5200b43-6cef-433c-80ed-afc791961383</title>
    <updated>2026-04-21T15:43:45.501361+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "c5200b43-6cef-433c-80ed-afc791961383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32296", "type": "seen", "source": "https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html", "creation_timestamp": "2026-03-19T03:00:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/c5200b43-6cef-433c-80ed-afc791961383/export"/>
    <published>2026-03-19T03:00:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6f7326b1-7881-4f5a-b820-417be5a7023a/export</id>
    <title>6f7326b1-7881-4f5a-b820-417be5a7023a</title>
    <updated>2026-04-21T15:43:45.501271+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "6f7326b1-7881-4f5a-b820-417be5a7023a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32299", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhr53alsvy2q", "creation_timestamp": "2026-03-23T22:43:12.582418Z"}</content>
    <link href="https://db.gcve.eu/sighting/6f7326b1-7881-4f5a-b820-417be5a7023a/export"/>
    <published>2026-03-23T22:43:12.582418+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4ffc19de-10c1-414c-b773-61faebdedaf5/export</id>
    <title>4ffc19de-10c1-414c-b773-61faebdedaf5</title>
    <updated>2026-04-21T15:43:45.501128+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "4ffc19de-10c1-414c-b773-61faebdedaf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32299", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mhtzo455hr2i", "creation_timestamp": "2026-03-25T02:20:09.322753Z"}</content>
    <link href="https://db.gcve.eu/sighting/4ffc19de-10c1-414c-b773-61faebdedaf5/export"/>
    <published>2026-03-25T02:20:09.322753+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f9159c36-128b-46d8-b0b1-ee34af316e69/export</id>
    <title>f9159c36-128b-46d8-b0b1-ee34af316e69</title>
    <updated>2026-04-21T15:43:45.498530+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "f9159c36-128b-46d8-b0b1-ee34af316e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-32295", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mj4c36fpfd2v", "creation_timestamp": "2026-04-10T02:37:07.328818Z"}</content>
    <link href="https://db.gcve.eu/sighting/f9159c36-128b-46d8-b0b1-ee34af316e69/export"/>
    <published>2026-04-10T02:37:07.328818+00:00</published>
  </entry>
</feed>
