<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-25T07:35:52.733091+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/67100855-6b59-426e-8e5c-54a302524236/export</id>
    <title>67100855-6b59-426e-8e5c-54a302524236</title>
    <updated>2026-04-25T07:35:52.790572+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "67100855-6b59-426e-8e5c-54a302524236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34980", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3miyilnoy4x2p", "creation_timestamp": "2026-04-08T14:23:03.957958Z"}</content>
    <link href="https://db.gcve.eu/sighting/67100855-6b59-426e-8e5c-54a302524236/export"/>
    <published>2026-04-08T14:23:03.957958+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/13e2eeca-955c-4919-962b-1ca678c80a5e/export</id>
    <title>13e2eeca-955c-4919-962b-1ca678c80a5e</title>
    <updated>2026-04-25T07:35:52.790520+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "13e2eeca-955c-4919-962b-1ca678c80a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34980", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3miyo67rqzk2f", "creation_timestamp": "2026-04-08T16:02:55.647167Z"}</content>
    <link href="https://db.gcve.eu/sighting/13e2eeca-955c-4919-962b-1ca678c80a5e/export"/>
    <published>2026-04-08T16:02:55.647167+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/db743ffe-4ce2-433d-a082-1edf0018c553/export</id>
    <title>db743ffe-4ce2-433d-a082-1edf0018c553</title>
    <updated>2026-04-25T07:35:52.790467+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "db743ffe-4ce2-433d-a082-1edf0018c553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34985", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mizauftpef22", "creation_timestamp": "2026-04-08T21:37:27.089885Z"}</content>
    <link href="https://db.gcve.eu/sighting/db743ffe-4ce2-433d-a082-1edf0018c553/export"/>
    <published>2026-04-08T21:37:27.089885+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/00a5fe71-448c-4de1-a252-5744c267de32/export</id>
    <title>00a5fe71-448c-4de1-a252-5744c267de32</title>
    <updated>2026-04-25T07:35:52.790401+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "00a5fe71-448c-4de1-a252-5744c267de32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34987", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mj3pzincgu2i", "creation_timestamp": "2026-04-09T21:14:06.502773Z"}</content>
    <link href="https://db.gcve.eu/sighting/00a5fe71-448c-4de1-a252-5744c267de32/export"/>
    <published>2026-04-09T21:14:06.502773+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bf413133-3151-4fb6-9059-7c15b3b397d2/export</id>
    <title>bf413133-3151-4fb6-9059-7c15b3b397d2</title>
    <updated>2026-04-25T07:35:52.790342+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "bf413133-3151-4fb6-9059-7c15b3b397d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34980", "type": "seen", "source": "https://www.acn.gov.it/portale/w/cups-disponibili-poc-per-lo-sfruttamento-di-due-vulnerabilita", "creation_timestamp": "2026-04-10T07:49:57.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/bf413133-3151-4fb6-9059-7c15b3b397d2/export"/>
    <published>2026-04-10T07:49:57+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6482e6f0-828e-4d31-a97f-8400ba0c3259/export</id>
    <title>6482e6f0-828e-4d31-a97f-8400ba0c3259</title>
    <updated>2026-04-25T07:35:52.790291+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "6482e6f0-828e-4d31-a97f-8400ba0c3259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34984", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mjgldfq6c62g", "creation_timestamp": "2026-04-14T04:49:24.324688Z"}</content>
    <link href="https://db.gcve.eu/sighting/6482e6f0-828e-4d31-a97f-8400ba0c3259/export"/>
    <published>2026-04-14T04:49:24.324688+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/6e06df88-d63b-4511-9fa1-c31c66ccdda0/export</id>
    <title>6e06df88-d63b-4511-9fa1-c31c66ccdda0</title>
    <updated>2026-04-25T07:35:52.790239+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "6e06df88-d63b-4511-9fa1-c31c66ccdda0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34986", "type": "seen", "source": "https://gist.github.com/cwayne18/10d2b4d69bdb66cbe87a09b1637dc409", "creation_timestamp": "2026-04-17T17:34:12.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/6e06df88-d63b-4511-9fa1-c31c66ccdda0/export"/>
    <published>2026-04-17T17:34:12+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0c820ad0-f74d-4659-9e29-c7bb16edf8d3/export</id>
    <title>0c820ad0-f74d-4659-9e29-c7bb16edf8d3</title>
    <updated>2026-04-25T07:35:52.790181+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "0c820ad0-f74d-4659-9e29-c7bb16edf8d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34980", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3mjq5442fbv2n", "creation_timestamp": "2026-04-18T00:01:24.252875Z"}</content>
    <link href="https://db.gcve.eu/sighting/0c820ad0-f74d-4659-9e29-c7bb16edf8d3/export"/>
    <published>2026-04-18T00:01:24.252875+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d04f34db-a2f9-4c43-8f65-d89ef991a927/export</id>
    <title>d04f34db-a2f9-4c43-8f65-d89ef991a927</title>
    <updated>2026-04-25T07:35:52.790097+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "d04f34db-a2f9-4c43-8f65-d89ef991a927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34982", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mk4whjasgf2f", "creation_timestamp": "2026-04-23T02:07:07.856475Z"}</content>
    <link href="https://db.gcve.eu/sighting/d04f34db-a2f9-4c43-8f65-d89ef991a927/export"/>
    <published>2026-04-23T02:07:07.856475+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/13514c59-9907-46b2-8ae3-a42f76e2e488/export</id>
    <title>13514c59-9907-46b2-8ae3-a42f76e2e488</title>
    <updated>2026-04-25T07:35:52.788931+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "13514c59-9907-46b2-8ae3-a42f76e2e488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-34982", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mk4whjsj3l27", "creation_timestamp": "2026-04-23T02:07:08.787220Z"}</content>
    <link href="https://db.gcve.eu/sighting/13514c59-9907-46b2-8ae3-a42f76e2e488/export"/>
    <published>2026-04-23T02:07:08.787220+00:00</published>
  </entry>
</feed>
