<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T10:03:18.537611+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/10a25e04-b595-4078-982b-0ab089afcabc/export</id>
    <title>10a25e04-b595-4078-982b-0ab089afcabc</title>
    <updated>2026-05-07T10:03:18.905234+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "10a25e04-b595-4078-982b-0ab089afcabc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34059", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzwbqp6w52h", "content": "", "creation_timestamp": "2026-05-04T14:51:06.701291Z"}</content>
    <link href="https://db.gcve.eu/sighting/10a25e04-b595-4078-982b-0ab089afcabc/export"/>
    <published>2026-05-04T14:51:06.701291+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e83ff810-56c1-4779-b521-834b29490e14/export</id>
    <title>e83ff810-56c1-4779-b521-834b29490e14</title>
    <updated>2026-05-07T10:03:18.905180+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "e83ff810-56c1-4779-b521-834b29490e14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34059", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzyjg7ozk2z", "content": "", "creation_timestamp": "2026-05-04T15:31:12.153463Z"}</content>
    <link href="https://db.gcve.eu/sighting/e83ff810-56c1-4779-b521-834b29490e14/export"/>
    <published>2026-05-04T15:31:12.153463+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/32926063-38ce-43fe-8b4f-a54c975a618c/export</id>
    <title>32926063-38ce-43fe-8b4f-a54c975a618c</title>
    <updated>2026-05-07T10:03:18.905121+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "32926063-38ce-43fe-8b4f-a54c975a618c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34059", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2a3ar7on22", "content": "", "creation_timestamp": "2026-05-04T17:46:26.163408Z"}</content>
    <link href="https://db.gcve.eu/sighting/32926063-38ce-43fe-8b4f-a54c975a618c/export"/>
    <published>2026-05-04T17:46:26.163408+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/af965a54-8cf5-47f4-9680-89382f811630/export</id>
    <title>af965a54-8cf5-47f4-9680-89382f811630</title>
    <updated>2026-05-07T10:03:18.905068+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "af965a54-8cf5-47f4-9680-89382f811630", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34059", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116518129197995419", "content": "", "creation_timestamp": "2026-05-04T20:12:36.531872Z"}</content>
    <link href="https://db.gcve.eu/sighting/af965a54-8cf5-47f4-9680-89382f811630/export"/>
    <published>2026-05-04T20:12:36.531872+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3c0d51de-31dc-4086-8973-27c2106b54de/export</id>
    <title>3c0d51de-31dc-4086-8973-27c2106b54de</title>
    <updated>2026-05-07T10:03:18.905013+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "3c0d51de-31dc-4086-8973-27c2106b54de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34059", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2iz7we2x", "content": "", "creation_timestamp": "2026-05-05T00:01:49.907937Z"}</content>
    <link href="https://db.gcve.eu/sighting/3c0d51de-31dc-4086-8973-27c2106b54de/export"/>
    <published>2026-05-05T00:01:49.907937+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bba62e02-085a-4b32-ad5f-a16d63ca2b0c/export</id>
    <title>bba62e02-085a-4b32-ad5f-a16d63ca2b0c</title>
    <updated>2026-05-07T10:03:18.904954+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "bba62e02-085a-4b32-ad5f-a16d63ca2b0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34059", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3ml4fuvyyd22w", "content": "", "creation_timestamp": "2026-05-05T14:35:37.971382Z"}</content>
    <link href="https://db.gcve.eu/sighting/bba62e02-085a-4b32-ad5f-a16d63ca2b0c/export"/>
    <published>2026-05-05T14:35:37.971382+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/adad3313-0f9f-4cf5-b6fb-22e7cdb0759b/export</id>
    <title>adad3313-0f9f-4cf5-b6fb-22e7cdb0759b</title>
    <updated>2026-05-07T10:03:18.904871+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "adad3313-0f9f-4cf5-b6fb-22e7cdb0759b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34059", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-multiple-vulnerabilities-apache-http-server-can-lead-remote-code-execution-patch", "content": "", "creation_timestamp": "2026-05-06T09:37:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/adad3313-0f9f-4cf5-b6fb-22e7cdb0759b/export"/>
    <published>2026-05-06T09:37:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e76fa174-b3aa-4990-8cea-16d16f74136a/export</id>
    <title>e76fa174-b3aa-4990-8cea-16d16f74136a</title>
    <updated>2026-05-07T10:03:18.902850+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "e76fa174-b3aa-4990-8cea-16d16f74136a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34059", "type": "seen", "source": "https://t.me/true_secator/8179", "content": "", "creation_timestamp": "2026-05-06T18:50:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/e76fa174-b3aa-4990-8cea-16d16f74136a/export"/>
    <published>2026-05-06T18:50:06+00:00</published>
  </entry>
</feed>
