<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-04-10T15:44:47.560472+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/f2af937a-1a59-49cf-a585-03e7530bd263/export</id>
    <title>f2af937a-1a59-49cf-a585-03e7530bd263</title>
    <updated>2026-04-10T15:44:47.632294+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "f2af937a-1a59-49cf-a585-03e7530bd263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35645", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mj3u4dz3n322", "creation_timestamp": "2026-04-09T22:27:14.374322Z"}</content>
    <link href="https://db.gcve.eu/sighting/f2af937a-1a59-49cf-a585-03e7530bd263/export"/>
    <published>2026-04-09T22:27:14.374322+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2da816a7-9503-455c-a6b5-5004735546a1/export</id>
    <title>2da816a7-9503-455c-a6b5-5004735546a1</title>
    <updated>2026-04-10T15:44:47.632180+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "2da816a7-9503-455c-a6b5-5004735546a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35645", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mj4ra3xsdh2s", "creation_timestamp": "2026-04-10T07:08:19.132939Z"}</content>
    <link href="https://db.gcve.eu/sighting/2da816a7-9503-455c-a6b5-5004735546a1/export"/>
    <published>2026-04-10T07:08:19.132939+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/7dc1b336-a2f5-4270-bc47-794d068837ec/export</id>
    <title>7dc1b336-a2f5-4270-bc47-794d068837ec</title>
    <updated>2026-04-10T15:44:47.632041+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "7dc1b336-a2f5-4270-bc47-794d068837ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35645", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mj4rau3gdz2s", "creation_timestamp": "2026-04-10T07:08:44.242694Z"}</content>
    <link href="https://db.gcve.eu/sighting/7dc1b336-a2f5-4270-bc47-794d068837ec/export"/>
    <published>2026-04-10T07:08:44.242694+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cd87c97e-42a7-4051-aa35-d3208bba8281/export</id>
    <title>cd87c97e-42a7-4051-aa35-d3208bba8281</title>
    <updated>2026-04-10T15:44:47.631878+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "cd87c97e-42a7-4051-aa35-d3208bba8281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35645", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mj4rfi6jbx27", "creation_timestamp": "2026-04-10T07:11:19.707883Z"}</content>
    <link href="https://db.gcve.eu/sighting/cd87c97e-42a7-4051-aa35-d3208bba8281/export"/>
    <published>2026-04-10T07:11:19.707883+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/517c7068-5e9e-4976-82c4-02c0a3015578/export</id>
    <title>517c7068-5e9e-4976-82c4-02c0a3015578</title>
    <updated>2026-04-10T15:44:47.630373+00:00</updated>
    <author>
      <name>sync_user</name>
      <uri>http://db.gcve.eu/user/sync_user</uri>
    </author>
    <content>{"uuid": "517c7068-5e9e-4976-82c4-02c0a3015578", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2026-35645", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mj4rfj46yc2g", "creation_timestamp": "2026-04-10T07:11:20.366302Z"}</content>
    <link href="https://db.gcve.eu/sighting/517c7068-5e9e-4976-82c4-02c0a3015578/export"/>
    <published>2026-04-10T07:11:20.366302+00:00</published>
  </entry>
</feed>
