<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-25T13:58:41.969787+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/7b7109fe-a124-4bfd-b184-79c15c3e339e/export</id>
    <title>7b7109fe-a124-4bfd-b184-79c15c3e339e</title>
    <updated>2026-04-25T13:58:42.027009+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "7b7109fe-a124-4bfd-b184-79c15c3e339e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-41329", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mjyhy5kfs22y", "creation_timestamp": "2026-04-21T07:37:26.351941Z"}</content>
    <link href="https://db.gcve.eu/sighting/7b7109fe-a124-4bfd-b184-79c15c3e339e/export"/>
    <published>2026-04-21T07:37:26.351941+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f82139d2-1aa9-48be-995a-255d827d72f1/export</id>
    <title>f82139d2-1aa9-48be-995a-255d827d72f1</title>
    <updated>2026-04-25T13:58:42.026957+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "f82139d2-1aa9-48be-995a-255d827d72f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-41329", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-privilege-escalation-openclaw-patch-immediately", "creation_timestamp": "2026-04-21T08:02:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f82139d2-1aa9-48be-995a-255d827d72f1/export"/>
    <published>2026-04-21T08:02:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ed54f28e-e4a2-44f9-a8f3-9c8f135a6012/export</id>
    <title>ed54f28e-e4a2-44f9-a8f3-9c8f135a6012</title>
    <updated>2026-04-25T13:58:42.026908+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "ed54f28e-e4a2-44f9-a8f3-9c8f135a6012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-4132", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3mk7lq65bhb24", "creation_timestamp": "2026-04-24T03:33:06.127947Z"}</content>
    <link href="https://db.gcve.eu/sighting/ed54f28e-e4a2-44f9-a8f3-9c8f135a6012/export"/>
    <published>2026-04-24T03:33:06.127947+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8f58a537-9357-4916-92dc-7de3a7fb24fb/export</id>
    <title>8f58a537-9357-4916-92dc-7de3a7fb24fb</title>
    <updated>2026-04-25T13:58:42.026859+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "8f58a537-9357-4916-92dc-7de3a7fb24fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-41323", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mk7t5i243w2n", "creation_timestamp": "2026-04-24T05:45:50.229230Z"}</content>
    <link href="https://db.gcve.eu/sighting/8f58a537-9357-4916-92dc-7de3a7fb24fb/export"/>
    <published>2026-04-24T05:45:50.229230+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/156a7ece-c20f-4d11-a099-a2bc03477eb5/export</id>
    <title>156a7ece-c20f-4d11-a099-a2bc03477eb5</title>
    <updated>2026-04-25T13:58:42.026812+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "156a7ece-c20f-4d11-a099-a2bc03477eb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-41324", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mk7t5odgr62g", "creation_timestamp": "2026-04-24T05:45:56.182456Z"}</content>
    <link href="https://db.gcve.eu/sighting/156a7ece-c20f-4d11-a099-a2bc03477eb5/export"/>
    <published>2026-04-24T05:45:56.182456+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9188c470-1586-4f66-869d-b493510278a8/export</id>
    <title>9188c470-1586-4f66-869d-b493510278a8</title>
    <updated>2026-04-25T13:58:42.026764+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "9188c470-1586-4f66-869d-b493510278a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-41328", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkbbw67je32f", "creation_timestamp": "2026-04-24T19:42:54.486688Z"}</content>
    <link href="https://db.gcve.eu/sighting/9188c470-1586-4f66-869d-b493510278a8/export"/>
    <published>2026-04-24T19:42:54.486688+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ae0f8a0f-24f9-49dc-aae7-d15836e8779a/export</id>
    <title>ae0f8a0f-24f9-49dc-aae7-d15836e8779a</title>
    <updated>2026-04-25T13:58:42.026700+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "ae0f8a0f-24f9-49dc-aae7-d15836e8779a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "cve-2026-41327", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116463109926067503", "creation_timestamp": "2026-04-25T03:00:29.473477Z"}</content>
    <link href="https://db.gcve.eu/sighting/ae0f8a0f-24f9-49dc-aae7-d15836e8779a/export"/>
    <published>2026-04-25T03:00:29.473477+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3c0d70ac-b384-4d4a-bda0-1118b183478f/export</id>
    <title>3c0d70ac-b384-4d4a-bda0-1118b183478f</title>
    <updated>2026-04-25T13:58:42.026603+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "3c0d70ac-b384-4d4a-bda0-1118b183478f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "cve-2026-41327", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkc2esawbu2m", "creation_timestamp": "2026-04-25T03:00:30.930202Z"}</content>
    <link href="https://db.gcve.eu/sighting/3c0d70ac-b384-4d4a-bda0-1118b183478f/export"/>
    <published>2026-04-25T03:00:30.930202+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7291a635-7aea-4c52-a741-63f8f75e4c7e/export</id>
    <title>7291a635-7aea-4c52-a741-63f8f75e4c7e</title>
    <updated>2026-04-25T13:58:42.026377+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "7291a635-7aea-4c52-a741-63f8f75e4c7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "cve-2026-41328", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116463463879285208", "creation_timestamp": "2026-04-25T04:30:29.624344Z"}</content>
    <link href="https://db.gcve.eu/sighting/7291a635-7aea-4c52-a741-63f8f75e4c7e/export"/>
    <published>2026-04-25T04:30:29.624344+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/be9bef6d-af5b-4894-a0a4-072ff71f62ce/export</id>
    <title>be9bef6d-af5b-4894-a0a4-072ff71f62ce</title>
    <updated>2026-04-25T13:58:42.024437+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "be9bef6d-af5b-4894-a0a4-072ff71f62ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "cve-2026-41328", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkc7fquxma2p", "creation_timestamp": "2026-04-25T04:30:31.701876Z"}</content>
    <link href="https://db.gcve.eu/sighting/be9bef6d-af5b-4894-a0a4-072ff71f62ce/export"/>
    <published>2026-04-25T04:30:31.701876+00:00</published>
  </entry>
</feed>
