<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-19T13:27:42.054098+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/75fd1e25-4fc7-4fcf-8440-de6c1bf42eb2/export</id>
    <title>75fd1e25-4fc7-4fcf-8440-de6c1bf42eb2</title>
    <updated>2026-05-19T13:27:42.063680+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "75fd1e25-4fc7-4fcf-8440-de6c1bf42eb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlekri3yqc2c", "content": "", "creation_timestamp": "2026-05-08T20:24:27.066400Z"}</content>
    <link href="https://db.gcve.eu/sighting/75fd1e25-4fc7-4fcf-8440-de6c1bf42eb2/export"/>
    <published>2026-05-08T20:24:27.066400+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7b4c163e-2911-4f36-a963-6f7109c760c8/export</id>
    <title>7b4c163e-2911-4f36-a963-6f7109c760c8</title>
    <updated>2026-05-19T13:27:42.063580+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "7b4c163e-2911-4f36-a963-6f7109c760c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlepr6ouzy27", "content": "", "creation_timestamp": "2026-05-08T21:53:45.606743Z"}</content>
    <link href="https://db.gcve.eu/sighting/7b4c163e-2911-4f36-a963-6f7109c760c8/export"/>
    <published>2026-05-08T21:53:45.606743+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6eb39437-4102-4b72-8edd-a0cf7bbcc8b0/export</id>
    <title>6eb39437-4102-4b72-8edd-a0cf7bbcc8b0</title>
    <updated>2026-05-19T13:27:42.063481+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "6eb39437-4102-4b72-8edd-a0cf7bbcc8b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116544182422691954", "content": "", "creation_timestamp": "2026-05-09T10:38:17.215832Z"}</content>
    <link href="https://db.gcve.eu/sighting/6eb39437-4102-4b72-8edd-a0cf7bbcc8b0/export"/>
    <published>2026-05-09T10:38:17.215832+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/936e1748-82ab-4ac1-935d-090fb98579d7/export</id>
    <title>936e1748-82ab-4ac1-935d-090fb98579d7</title>
    <updated>2026-05-19T13:27:42.063380+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "936e1748-82ab-4ac1-935d-090fb98579d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://bsky.app/profile/hn-frontpage-bot.bsky.social/post/3mlhlj7bx752u", "content": "", "creation_timestamp": "2026-05-10T01:15:42.494363Z"}</content>
    <link href="https://db.gcve.eu/sighting/936e1748-82ab-4ac1-935d-090fb98579d7/export"/>
    <published>2026-05-10T01:15:42.494363+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0b01fb39-9ba2-4fb2-a209-6338b9edcc70/export</id>
    <title>0b01fb39-9ba2-4fb2-a209-6338b9edcc70</title>
    <updated>2026-05-19T13:27:42.063278+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "0b01fb39-9ba2-4fb2-a209-6338b9edcc70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mli2inlydw2y", "content": "", "creation_timestamp": "2026-05-10T05:43:50.542455Z"}</content>
    <link href="https://db.gcve.eu/sighting/0b01fb39-9ba2-4fb2-a209-6338b9edcc70/export"/>
    <published>2026-05-10T05:43:50.542455+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/9e06791a-87b4-4546-9632-7da43814735d/export</id>
    <title>9e06791a-87b4-4546-9632-7da43814735d</title>
    <updated>2026-05-19T13:27:42.063174+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "9e06791a-87b4-4546-9632-7da43814735d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mlizxrgkd32y", "content": "", "creation_timestamp": "2026-05-10T15:07:03.971742Z"}</content>
    <link href="https://db.gcve.eu/sighting/9e06791a-87b4-4546-9632-7da43814735d/export"/>
    <published>2026-05-10T15:07:03.971742+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/09de2881-d4c4-47d0-bced-c50bade9412f/export</id>
    <title>09de2881-d4c4-47d0-bced-c50bade9412f</title>
    <updated>2026-05-19T13:27:42.063051+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "09de2881-d4c4-47d0-bced-c50bade9412f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mlizyboth425", "content": "", "creation_timestamp": "2026-05-10T15:07:20.035768Z"}</content>
    <link href="https://db.gcve.eu/sighting/09de2881-d4c4-47d0-bced-c50bade9412f/export"/>
    <published>2026-05-10T15:07:20.035768+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/91b80695-2b64-4591-a6b3-d4386926ca88/export</id>
    <title>91b80695-2b64-4591-a6b3-d4386926ca88</title>
    <updated>2026-05-19T13:27:42.062937+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "91b80695-2b64-4591-a6b3-d4386926ca88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mlj6rgbnzch2", "content": "", "creation_timestamp": "2026-05-10T16:33:03.327148Z"}</content>
    <link href="https://db.gcve.eu/sighting/91b80695-2b64-4591-a6b3-d4386926ca88/export"/>
    <published>2026-05-10T16:33:03.327148+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d826eac8-51e6-4ad3-9956-fba6e5fd62b4/export</id>
    <title>d826eac8-51e6-4ad3-9956-fba6e5fd62b4</title>
    <updated>2026-05-19T13:27:42.062778+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "d826eac8-51e6-4ad3-9956-fba6e5fd62b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mlljuslwde2l", "content": "", "creation_timestamp": "2026-05-11T14:57:10.840233Z"}</content>
    <link href="https://db.gcve.eu/sighting/d826eac8-51e6-4ad3-9956-fba6e5fd62b4/export"/>
    <published>2026-05-11T14:57:10.840233+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/de09d939-8adb-47fe-ae5d-1e70b00426a9/export</id>
    <title>de09d939-8adb-47fe-ae5d-1e70b00426a9</title>
    <updated>2026-05-19T13:27:42.061339+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "de09d939-8adb-47fe-ae5d-1e70b00426a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29202", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-multiple-vulnerabilities-cpanel-and-whm-leading-privilege-escalation-patch", "content": "", "creation_timestamp": "2026-05-12T01:21:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/de09d939-8adb-47fe-ae5d-1e70b00426a9/export"/>
    <published>2026-05-12T01:21:19+00:00</published>
  </entry>
</feed>
