<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-19T13:28:00.875653+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/9335e0b6-cc05-468f-9164-4e20331c0111/export</id>
    <title>9335e0b6-cc05-468f-9164-4e20331c0111</title>
    <updated>2026-05-19T13:28:00.881788+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "9335e0b6-cc05-468f-9164-4e20331c0111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mlekt3kq262w", "content": "", "creation_timestamp": "2026-05-08T20:25:20.999730Z"}</content>
    <link href="https://db.gcve.eu/sighting/9335e0b6-cc05-468f-9164-4e20331c0111/export"/>
    <published>2026-05-08T20:25:20.999730+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f8f166ee-e562-42de-aef0-79e23c6dd68a/export</id>
    <title>f8f166ee-e562-42de-aef0-79e23c6dd68a</title>
    <updated>2026-05-19T13:28:00.881707+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "f8f166ee-e562-42de-aef0-79e23c6dd68a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mlepsmramd2t", "content": "", "creation_timestamp": "2026-05-08T21:54:33.627576Z"}</content>
    <link href="https://db.gcve.eu/sighting/f8f166ee-e562-42de-aef0-79e23c6dd68a/export"/>
    <published>2026-05-08T21:54:33.627576+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0fe2044c-c367-499b-bbb1-3b12b1012026/export</id>
    <title>0fe2044c-c367-499b-bbb1-3b12b1012026</title>
    <updated>2026-05-19T13:28:00.881622+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "0fe2044c-c367-499b-bbb1-3b12b1012026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://infosec.exchange/users/decio/statuses/116544182422691954", "content": "", "creation_timestamp": "2026-05-09T10:38:17.359819Z"}</content>
    <link href="https://db.gcve.eu/sighting/0fe2044c-c367-499b-bbb1-3b12b1012026/export"/>
    <published>2026-05-09T10:38:17.359819+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/86a593e4-73af-45c1-b36d-d2060df143d7/export</id>
    <title>86a593e4-73af-45c1-b36d-d2060df143d7</title>
    <updated>2026-05-19T13:28:00.881539+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "86a593e4-73af-45c1-b36d-d2060df143d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/hn-frontpage-bot.bsky.social/post/3mlhlj7bx752u", "content": "", "creation_timestamp": "2026-05-10T01:15:42.635061Z"}</content>
    <link href="https://db.gcve.eu/sighting/86a593e4-73af-45c1-b36d-d2060df143d7/export"/>
    <published>2026-05-10T01:15:42.635061+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ebcb888f-219c-44d6-8872-d7b3e518cff0/export</id>
    <title>ebcb888f-219c-44d6-8872-d7b3e518cff0</title>
    <updated>2026-05-19T13:28:00.881451+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "ebcb888f-219c-44d6-8872-d7b3e518cff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mli2inlydw2y", "content": "", "creation_timestamp": "2026-05-10T05:43:50.682083Z"}</content>
    <link href="https://db.gcve.eu/sighting/ebcb888f-219c-44d6-8872-d7b3e518cff0/export"/>
    <published>2026-05-10T05:43:50.682083+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cab3bd09-026a-4935-98b1-a4e016e50fb1/export</id>
    <title>cab3bd09-026a-4935-98b1-a4e016e50fb1</title>
    <updated>2026-05-19T13:28:00.881359+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "cab3bd09-026a-4935-98b1-a4e016e50fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mlizxrgkd32y", "content": "", "creation_timestamp": "2026-05-10T15:07:04.119329Z"}</content>
    <link href="https://db.gcve.eu/sighting/cab3bd09-026a-4935-98b1-a4e016e50fb1/export"/>
    <published>2026-05-10T15:07:04.119329+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d2c510c1-dafd-4e46-afee-e52e3beab9d7/export</id>
    <title>d2c510c1-dafd-4e46-afee-e52e3beab9d7</title>
    <updated>2026-05-19T13:28:00.881266+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "d2c510c1-dafd-4e46-afee-e52e3beab9d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mlizyboth425", "content": "", "creation_timestamp": "2026-05-10T15:07:20.306966Z"}</content>
    <link href="https://db.gcve.eu/sighting/d2c510c1-dafd-4e46-afee-e52e3beab9d7/export"/>
    <published>2026-05-10T15:07:20.306966+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/81cefced-287e-4ee6-9a62-4173c86e0364/export</id>
    <title>81cefced-287e-4ee6-9a62-4173c86e0364</title>
    <updated>2026-05-19T13:28:00.881163+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "81cefced-287e-4ee6-9a62-4173c86e0364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mlj6rgbnzch2", "content": "", "creation_timestamp": "2026-05-10T16:33:03.473626Z"}</content>
    <link href="https://db.gcve.eu/sighting/81cefced-287e-4ee6-9a62-4173c86e0364/export"/>
    <published>2026-05-10T16:33:03.473626+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e007c547-cbda-4161-b02d-fc929616b4cf/export</id>
    <title>e007c547-cbda-4161-b02d-fc929616b4cf</title>
    <updated>2026-05-19T13:28:00.881030+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "e007c547-cbda-4161-b02d-fc929616b4cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3mlljuslwde2l", "content": "", "creation_timestamp": "2026-05-11T14:57:11.009253Z"}</content>
    <link href="https://db.gcve.eu/sighting/e007c547-cbda-4161-b02d-fc929616b4cf/export"/>
    <published>2026-05-11T14:57:11.009253+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bb42c05a-1378-45d8-832e-a655a28c1220/export</id>
    <title>bb42c05a-1378-45d8-832e-a655a28c1220</title>
    <updated>2026-05-19T13:28:00.879681+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "bb42c05a-1378-45d8-832e-a655a28c1220", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-29203", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-multiple-vulnerabilities-cpanel-and-whm-leading-privilege-escalation-patch", "content": "", "creation_timestamp": "2026-05-12T01:21:19.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/bb42c05a-1378-45d8-832e-a655a28c1220/export"/>
    <published>2026-05-12T01:21:19+00:00</published>
  </entry>
</feed>
