<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-03T21:39:03.143549+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/fd136ea4-1ba4-410d-bc08-75603a7e5f87/export</id>
    <title>fd136ea4-1ba4-410d-bc08-75603a7e5f87</title>
    <updated>2026-04-03T21:39:03.200041+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "fd136ea4-1ba4-410d-bc08-75603a7e5f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-33636", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mhwfpdaa5w2s", "creation_timestamp": "2026-03-26T01:00:54.484895Z"}</content>
    <link href="https://db.gcve.eu/sighting/fd136ea4-1ba4-410d-bc08-75603a7e5f87/export"/>
    <published>2026-03-26T01:00:54.484895+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e0047a87-e51e-4402-ba85-e3867f3c33de/export</id>
    <title>e0047a87-e51e-4402-ba85-e3867f3c33de</title>
    <updated>2026-04-03T21:39:03.199957+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "e0047a87-e51e-4402-ba85-e3867f3c33de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-33636", "type": "seen", "source": "https://infosec.exchange/users/harrysintonen/statuses/116296309675649424", "creation_timestamp": "2026-03-26T16:00:58.879569Z"}</content>
    <link href="https://db.gcve.eu/sighting/e0047a87-e51e-4402-ba85-e3867f3c33de/export"/>
    <published>2026-03-26T16:00:58.879569+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ea13188f-a34d-47f0-a69d-535faf2ce2eb/export</id>
    <title>ea13188f-a34d-47f0-a69d-535faf2ce2eb</title>
    <updated>2026-04-03T21:39:03.199875+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "ea13188f-a34d-47f0-a69d-535faf2ce2eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-33636", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mhymxapetc2r", "creation_timestamp": "2026-03-26T22:15:57.146808Z"}</content>
    <link href="https://db.gcve.eu/sighting/ea13188f-a34d-47f0-a69d-535faf2ce2eb/export"/>
    <published>2026-03-26T22:15:57.146808+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8cbc0f2d-1082-478b-82f0-d36ebe936209/export</id>
    <title>8cbc0f2d-1082-478b-82f0-d36ebe936209</title>
    <updated>2026-04-03T21:39:03.199786+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "8cbc0f2d-1082-478b-82f0-d36ebe936209", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-33636", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3mhzgxdyki32e", "creation_timestamp": "2026-03-27T06:01:17.021470Z"}</content>
    <link href="https://db.gcve.eu/sighting/8cbc0f2d-1082-478b-82f0-d36ebe936209/export"/>
    <published>2026-03-27T06:01:17.021470+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a62fcd0b-7825-49bb-ba28-8a2139122868/export</id>
    <title>a62fcd0b-7825-49bb-ba28-8a2139122868</title>
    <updated>2026-04-03T21:39:03.199674+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "a62fcd0b-7825-49bb-ba28-8a2139122868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-33636", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mieg3xyw3g26", "creation_timestamp": "2026-03-31T14:45:18.177938Z"}</content>
    <link href="https://db.gcve.eu/sighting/a62fcd0b-7825-49bb-ba28-8a2139122868/export"/>
    <published>2026-03-31T14:45:18.177938+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/644254d4-dfb7-4d72-8419-d478b763d149/export</id>
    <title>644254d4-dfb7-4d72-8419-d478b763d149</title>
    <updated>2026-04-03T21:39:03.198550+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "644254d4-dfb7-4d72-8419-d478b763d149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-33636", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3milydkdr7q2f", "creation_timestamp": "2026-04-03T15:00:15.187730Z"}</content>
    <link href="https://db.gcve.eu/sighting/644254d4-dfb7-4d72-8419-d478b763d149/export"/>
    <published>2026-04-03T15:00:15.187730+00:00</published>
  </entry>
</feed>
