<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-25T14:20:15.589173+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/13554fc4-aae9-4988-b927-44f5b70137e1/export</id>
    <title>13554fc4-aae9-4988-b927-44f5b70137e1</title>
    <updated>2026-04-25T14:20:15.658121+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "13554fc4-aae9-4988-b927-44f5b70137e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35171", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mitv4ynlvh2d", "creation_timestamp": "2026-04-06T18:24:12.133563Z"}</content>
    <link href="https://db.gcve.eu/sighting/13554fc4-aae9-4988-b927-44f5b70137e1/export"/>
    <published>2026-04-06T18:24:12.133563+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/53ad873f-f148-4767-b3dc-ec0e2769851d/export</id>
    <title>53ad873f-f148-4767-b3dc-ec0e2769851d</title>
    <updated>2026-04-25T14:20:15.658047+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "53ad873f-f148-4767-b3dc-ec0e2769851d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35171", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mitv5qkfjp2d", "creation_timestamp": "2026-04-06T18:24:37.344334Z"}</content>
    <link href="https://db.gcve.eu/sighting/53ad873f-f148-4767-b3dc-ec0e2769851d/export"/>
    <published>2026-04-06T18:24:37.344334+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/11ac1e38-44c1-4d2c-989a-36c03a9ea045/export</id>
    <title>11ac1e38-44c1-4d2c-989a-36c03a9ea045</title>
    <updated>2026-04-25T14:20:15.657975+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "11ac1e38-44c1-4d2c-989a-36c03a9ea045", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35174", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mitvb3h7og2h", "creation_timestamp": "2026-04-06T18:26:29.470078Z"}</content>
    <link href="https://db.gcve.eu/sighting/11ac1e38-44c1-4d2c-989a-36c03a9ea045/export"/>
    <published>2026-04-06T18:26:29.470078+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/67c7cf40-3248-4b83-8351-da2a90acef57/export</id>
    <title>67c7cf40-3248-4b83-8351-da2a90acef57</title>
    <updated>2026-04-25T14:20:15.657902+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "67c7cf40-3248-4b83-8351-da2a90acef57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35174", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mitytsqqwp2z", "creation_timestamp": "2026-04-06T19:30:39.386262Z"}</content>
    <link href="https://db.gcve.eu/sighting/67c7cf40-3248-4b83-8351-da2a90acef57/export"/>
    <published>2026-04-06T19:30:39.386262+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/37eb4ce7-0b2a-4fb3-aed7-22fbdd141b24/export</id>
    <title>37eb4ce7-0b2a-4fb3-aed7-22fbdd141b24</title>
    <updated>2026-04-25T14:20:15.657820+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "37eb4ce7-0b2a-4fb3-aed7-22fbdd141b24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35171", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mitz4rbkaw2n", "creation_timestamp": "2026-04-06T19:35:47.805768Z"}</content>
    <link href="https://db.gcve.eu/sighting/37eb4ce7-0b2a-4fb3-aed7-22fbdd141b24/export"/>
    <published>2026-04-06T19:35:47.805768+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/05d85bdc-d149-473e-a1c5-67dc18dd1ea7/export</id>
    <title>05d85bdc-d149-473e-a1c5-67dc18dd1ea7</title>
    <updated>2026-04-25T14:20:15.657627+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "05d85bdc-d149-473e-a1c5-67dc18dd1ea7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35172", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3miv42ixdom2r", "creation_timestamp": "2026-04-07T06:00:44.577126Z"}</content>
    <link href="https://db.gcve.eu/sighting/05d85bdc-d149-473e-a1c5-67dc18dd1ea7/export"/>
    <published>2026-04-07T06:00:44.577126+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/712b5628-c662-40d6-8abf-6bc79a7ceae9/export</id>
    <title>712b5628-c662-40d6-8abf-6bc79a7ceae9</title>
    <updated>2026-04-25T14:20:15.657420+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "712b5628-c662-40d6-8abf-6bc79a7ceae9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35171", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mjhukkboyf2r", "creation_timestamp": "2026-04-14T17:07:08.330803Z"}</content>
    <link href="https://db.gcve.eu/sighting/712b5628-c662-40d6-8abf-6bc79a7ceae9/export"/>
    <published>2026-04-14T17:07:08.330803+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/50507e0e-9439-4705-98f3-169e8306eae8/export</id>
    <title>50507e0e-9439-4705-98f3-169e8306eae8</title>
    <updated>2026-04-25T14:20:15.657195+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "50507e0e-9439-4705-98f3-169e8306eae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-3517", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/progress-security-advisory-av26-371", "creation_timestamp": "2026-04-20T11:13:25.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/50507e0e-9439-4705-98f3-169e8306eae8/export"/>
    <published>2026-04-20T11:13:25+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ad44a37a-def0-4fc4-98f9-83b7f7603c6c/export</id>
    <title>ad44a37a-def0-4fc4-98f9-83b7f7603c6c</title>
    <updated>2026-04-25T14:20:15.656902+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "ad44a37a-def0-4fc4-98f9-83b7f7603c6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-3517", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mjwt7avbvg2e", "creation_timestamp": "2026-04-20T15:52:50.824413Z"}</content>
    <link href="https://db.gcve.eu/sighting/ad44a37a-def0-4fc4-98f9-83b7f7603c6c/export"/>
    <published>2026-04-20T15:52:50.824413+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8111b857-46ad-4254-b2c7-6db8bed2ec6d/export</id>
    <title>8111b857-46ad-4254-b2c7-6db8bed2ec6d</title>
    <updated>2026-04-25T14:20:15.654273+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "8111b857-46ad-4254-b2c7-6db8bed2ec6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-3517", "type": "seen", "source": "https://www.acn.gov.it/portale/w/progress-software-aggiornamenti-di-sicurezza-4", "creation_timestamp": "2026-04-21T06:18:34.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8111b857-46ad-4254-b2c7-6db8bed2ec6d/export"/>
    <published>2026-04-21T06:18:34+00:00</published>
  </entry>
</feed>
